• Aucun résultat trouvé

[PDF] Top 20 SHI3LD: an Access Control Framework for the Mobile Web of Data

Has 10000 "SHI3LD: an Access Control Framework for the Mobile Web of Data" found on our website. Below are the top 20 most common "SHI3LD: an Access Control Framework for the Mobile Web of Data".

SHI3LD: an Access Control Framework for the Mobile Web of Data

SHI3LD: an Access Control Framework for the Mobile Web of Data

... 2. THE FRAMEWORK The access control model is built over the notion of Named Graph [2], thus supporting fine-grained access control policies, including ... Voir le document complet

3

Access Control for HTTP Operations on Linked Data

Access Control for HTTP Operations on Linked Data

... Abstract. Access control is a recognized open issue when interacting with RDF using HTTP ...basic access control lists, thus resulting in limited policy ...how the Shi3ld ... Voir le document complet

16

Context-aware access control and presentation of linked data

Context-aware access control and presentation of linked data

... and the Environment in which the action is performed. The challenge of context- aware presentation for Linked Data brought to the design of ...selects the ... Voir le document complet

145

Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores

Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores

... model the mobile context in which linked data consumption takes ...combine the access control model and the contextual vocabulary into context-aware access ... Voir le document complet

9

An End-User Development approach for Mobile Web Augmentation

An End-User Development approach for Mobile Web Augmentation

... the adopted end-user programming technique; the capability of the tool to solve different domain problems and to specify control flows, and the contemplation of ... Voir le document complet

29

Un Framework à base d’agent mobile, méta-donnée et profil utilisateur pour service Web

Un Framework à base d’agent mobile, méta-donnée et profil utilisateur pour service Web

... services Web doivent agir automatiquement avec le minimum d’intervention humaine; ils doivent être capables de découvrir d’autres services qui ont des capacités particulières et réalisent des tâches précises ... Voir le document complet

169

"An Alternative Access Control Architecture for IP over ATM Networks"

"An Alternative Access Control Architecture for IP over ATM Networks"

... all the devices are protected. • Realistic inform ation about the flow ...echanism of data collection w hich is fundam entally flaw ..., the system w atches all the traffic on ... Voir le document complet

15

JASPAR 2018: update of the open-access database of transcription factor binding profiles and its web framework

JASPAR 2018: update of the open-access database of transcription factor binding profiles and its web framework

... USER-FRIENDLY WEB IN- TERFACE A new web interface The JASPAR 2018 release comes with a completely re- designed web interface that meets modern web ...interactive web ... Voir le document complet

8

The case for Access Control on XML relationships

The case for Access Control on XML relationships

... Role-based access control (RBAC) models for XML [18,35] suffer from the same limitation wrt access control on XML ...allows for relationships among XML documents, ... Voir le document complet

24

JASPAR 2018: update of the open-access database of transcription factor binding profiles and its web framework

JASPAR 2018: update of the open-access database of transcription factor binding profiles and its web framework

... framework Aziz Khan 1, † , Oriol Fornes 2, † , Arnaud Stigliani 3, † , Marius Gheorghe 1 , Jaime A. Castro-Mondragon 1 , Robin van der Lee 2 , Adrien Bessy 3 , Jeanne Ch `eneby 4,5 , Shubhada R. Kulkarni 6,7,8 , ... Voir le document complet

2

Reverse-Engineering and Analysis of Access Control Models in Web Applications

Reverse-Engineering and Analysis of Access Control Models in Web Applications

... developed the Pixy tool for the detection of cross-site scripting vulnerabilities in PHP ...uses an inter-procedural, context and flow-sensitive analysis to propagate taint information ... Voir le document complet

201

A predictive control framework for edge following: Application to two types of mobile robots

A predictive control framework for edge following: Application to two types of mobile robots

... predictive control framework for edge following: Application to two types of mobile robots Guillaume Picard 1,2 , Roland Lenain 1 , Jean Laneurit 1 , Benoit Thuilot 2 and Christophe ... Voir le document complet

8

Framework definition for the design of a mobile manufacturing system

Framework definition for the design of a mobile manufacturing system

... during the embodiment design phase concerns the whole production system defined by all its ...modules. The assessment of technical equipment and human modules mobility is based on different  ... Voir le document complet

9

Access control policies and companies data transmission management

Access control policies and companies data transmission management

... Coverage of the main hybrid solutions regarding our ...presented Access Control ...can access what" and has been proposed within computer systems in the last 50 ...against ... Voir le document complet

159

An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

... from the FM Reusing the layer that con- cretizes the tests issued from the FM (see section ...that the tests given by the SPM are brought to the same abstraction level as ... Voir le document complet

18

Data access for the 1,000 Plants (1KP) project

Data access for the 1,000 Plants (1KP) project

... to the totality of the public databases. The 1KP project began as a public-private partnership, with 75% of the funding provided by the Government of Alberta and ... Voir le document complet

11

"An Asynchronous Distributed Access Control Architecture For IP Over ATM Networks"

"An Asynchronous Distributed Access Control Architecture For IP Over ATM Networks"

... Keywords: Access Control, Management, Security, ATM, Agents, ...In the recent past, much attention has been paid developing security services for ATM ...in the creation of many ... Voir le document complet

9

PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds

PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds

... with an attribute revo- cation extension (DACC). The DACC solution con- sists of using one or several key distribution centers responsible for issuing keys to data owners and users ... Voir le document complet

15

WikiNEXT: a wiki for exploiting the web of data

WikiNEXT: a wiki for exploiting the web of data

... wikis The semantic web is about adding formal semantics (metadata, knowledge) to the web content for the purpose of more efficient access and ...definitions ... Voir le document complet

8

Requirements for future control room and visualisation features in the Web-of-Cells framework defined in the ELECTRA project

Requirements for future control room and visualisation features in the Web-of-Cells framework defined in the ELECTRA project

... outlines an overview of the general requirements for the control rooms of the future power systems ...(2030+). The roles and activities in the future ... Voir le document complet

5

Show all 10000 documents...