BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
data access
Google data access

Tag #data access

267 papers:

ASPLOSASPLOS-2020-AyersLKR #memory management
Classifying Memory Access Patterns for Prefetching (GA, HL, CK, PR), pp. 513–526.
CIKMCIKM-2018-CalvaneseX #integration #semantics
Semantic Technologies for Data Access and Integration (DC, GX0), pp. 2303–2304.
ICMLICML-2018-HashemiSSALCKR #learning #memory management
Learning Memory Access Patterns (MH, KS, JAS, GA, HL, JC, CK, PR), pp. 1924–1933.
ASEASE-2018-FadhelBB #modelling #policy #runtime
Model-driven run-time enforcement of complex role-based access control policies (ABF, DB, LCB), pp. 248–258.
ASEASE-2018-LinWLSZW #concurrent #debugging #memory management #named
PFix: fixing concurrency bugs based on memory access patterns (HL, ZW, SL, JS0, DZ, GW), pp. 589–600.
SANERSANER-2017-YanoM #legacy #maintenance #visualisation
Data access visualization for legacy application maintenance (KY, AM), pp. 546–550.
SEFMSEFM-2017-KumarS #generative #modelling
A Complete Generative Label Model for Lattice-Based Access Control Models (NVNK, RKS), pp. 35–53.
CIKMCIKM-2016-0001MDLMRSZU #database
Analyzing Data Relevance and Access Patterns of Live Production Database Systems (MB0, CAM, TD, JL, KM, PR, TS, TZ, MU), pp. 2473–2475.
MoDELSMoDELS-2016-BergmannDRV #bidirectional #collaboration #modelling #using
Query-based access control for secure collaborative modeling using bidirectional transformations (GB, CD, IR, DV), pp. 351–361.
OOPSLAOOPSLA-2016-MooreDFFC #contract
Extensible access control with authorization contracts (SM, CD, RBF, MF, SC), pp. 214–233.
PPDPPPDP-2016-BertolissiTV #analysis #policy
Analysis of access control policy updates through narrowing (CB, JMT, DV), pp. 62–75.
ASEASE-2016-BocicB #debugging #web
Finding access control bugs in web applications with CanCheck (IB, TB), pp. 155–166.
ICSE-2016-NearJ #debugging #security #using #web
Finding security bugs in web applications using a catalog of access control patterns (JPN, DJ0), pp. 947–958.
SIGMODSIGMOD-2015-HangKD #named #query
ENKI: Access Control for Encrypted Query Processing (IH, FK, ED), pp. 183–196.
SIGMODSIGMOD-2015-MoffittSAM #collaboration
Collaborative Access Control in WebdamLog (VZM, JS, SA, GM), pp. 197–211.
VLDBVLDB-2015-BenediktLT #constraints #query
Querying with Access Patterns and Integrity Constraints (MB, JL, ET), pp. 690–701.
ITiCSEITiCSE-2015-WangMSLCW #education #named #using #visualisation
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
ICEISICEIS-v2-2015-MazurKW #modelling #on the #performance #security
On the Modelling of the Influence of Access Control Management to the System Security and Performance (KM, BK, AW), pp. 346–354.
CIKMCIKM-2015-AlamoudiGCB
External Data Access And Indexing In AsterixDB (AAA, RG, MJC0, VRB), pp. 3–12.
SEKESEKE-2015-PeiYF #in the cloud #performance #policy
Achieving Efficient Access Control via XACML Policy in Cloud Computing (XP, HY, GF), pp. 110–115.
SEKESEKE-2015-PereiraRA #database #distributed #stack
Secure, Dynamic and Distributed Access Control Stack for Database Applications (ÓMP, DDR, RLA), pp. 364–369.
POPLPOPL-2015-ElangoRPRS #complexity #on the #source code
On Characterizing the Data Access Complexity of Programs (VE, FR, LNP, JR, PS), pp. 567–580.
ICSEICSE-v2-2015-Hachem #analysis #architecture #modelling #towards
Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
SACSAC-2015-BusseSDNH #memory management #virtual machine
Partial coscheduling of virtual machines based on memory access patterns (AB, JHS, MD, POAN, HUH), pp. 2033–2038.
SACSAC-2015-DecatBLJ #as a service #middleware #multitenancy #named #performance
Amusa: middleware for efficient access control management of multi-tenant SaaS applications (MD, JB, BL, WJ), pp. 2141–2148.
SACSAC-2015-ThionLB #data flow #relational
Tuple-based access control: a provenance-based information flow control for relational data (RT, FL, MBGT), pp. 2165–2170.
CASECASE-2015-QiuSL #realtime
Real time access control of patient service in the pediatrics department (YQ, JS, ZL), pp. 734–739.
DACDAC-2015-LiuKDK #network #reduction
Network footprint reduction through data access and computation placement in NoC-based manycores (JL, JK, WD, MTK), p. 6.
DACDAC-2015-MengYOLW #array #clustering #memory management #parallel #performance
Efficient memory partitioning for parallel data access in multidimensional arrays (CM, SY, PO, LL, SW), p. 6.
LCTESLCTES-2015-BardizbanyanSWL #performance #using
Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
ITiCSEITiCSE-2014-WangCMSW #education #multi #named #security #using #visualisation
MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
ICSMEICSME-2014-GauthierMST #evolution #maintenance #modelling #web
Supporting Maintenance and Evolution of Access Control Models in Web Applications (FG, EM, ES, DT), pp. 506–510.
ICFPICFP-2014-MarlowBCP #abstraction #concurrent #performance
There is no fork: an abstraction for efficient, concurrent, and concise data access (SM, LB, JC, JP), pp. 325–337.
CAiSECAiSE-2014-KayesHC #framework #named
PO-SAAC: A Purpose-Oriented Situation-Aware Access Control Framework for Software Services (ASMK, JH, AC), pp. 58–74.
ICEISICEIS-v2-2014-WeiRT #policy
Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
SEKESEKE-2014-LiLWC #automation #generative #policy #testing
Automatic XACML requests generation for testing access control policies (YL, YL, LW, GC), pp. 217–222.
LOPSTRLOPSTR-2014-AlvesDF #metamodelling #semantics
Access Control and Obligations in the Category-Based Metamodel: A Rewrite-Based Semantics (SA, AD, MF), pp. 148–163.
SACSAC-2014-WangH #fine-grained #performance
An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan (MW, YH), pp. 1511–1516.
LCTESLCTES-2014-Guo #co-evolution #design #energy #performance
Energy efficient data access and storage through HW/SW co-design (MG), p. 83.
LCTESLCTES-2014-Whalley #energy #performance
Energy efficient data access techniques (DBW), p. 1.
CAVCAV-2014-FerraraMNP #named #policy #verification
Vac — Verifier of Administrative Role-Based Access Control Policies (ALF, PM, TLN, GP), pp. 184–191.
JCDLJCDL-2013-AlNoamanyWN #web
Access patterns for robots and humans in web archives (YA, MCW, MLN), pp. 339–348.
PODSPODS-2013-BienvenuCLW #case study #csp #datalog #ontology
Ontology-based data access: a study through disjunctive datalog, CSP, and MMSNP (MB, BtC, CL, FW), pp. 213–224.
PODSPODS-2013-RudolphK #query
Flag & check: data access with monadically defined queries (SR, MK), pp. 151–162.
VLDBVLDB-2013-CiviliCGLLLMPRRSS #ontology
MASTRO STUDIO: Managing Ontology-Based Data Access applications (CC, MC, GDG, DL, ML, LL, RM, AP, RR, MR, VS, DFS), pp. 1314–1317.
SEKESEKE-2013-PereiraAS #policy #relational #runtime
Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
OOPSLAOOPSLA-2013-RichardsHNJV #flexibility #javascript
Flexible access control for javascript (GR, CH, FZN, SJ, JV), pp. 305–322.
ICSEICSE-2013-GauthierM #case study #fault #modelling #php #semantics #smell
Semantic smells and errors in access control models: a case study in PHP (FG, EM), pp. 1169–1172.
ICSEICSE-2013-NistorSML #detection #named #performance #problem
Toddler: detecting performance problems via similar memory-access patterns (AN, LS, DM, SL), pp. 562–571.
ICSEICSE-2013-Slankas #database #implementation #natural language #policy
Implementing database access control policy from unconstrained natural language text (JS), pp. 1357–1360.
SACSAC-2013-SouzaRB #clustering #metric #performance
Faster construction of ball-partitioning-based metric access methods (JAdS, HLR, MCNB), pp. 8–12.
CGOCGO-2013-BardizbanyanGWSLMS #performance #using
Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
DATEDATE-2013-ChenL #2d #architecture #memory management
Dual-addressing memory architecture for two-dimensional memory access patterns (YHC, YYL), pp. 71–76.
DATEDATE-2013-LagraaTP #concurrent #data mining #identification #memory management #mining #simulation
Data mining MPSoC simulation traces to identify concurrent memory access patterns (SL, AT, FP), pp. 755–760.
HPDCHPDC-2013-NicolaeC #adaptation #incremental #memory management #named
AI-Ckpt: leveraging memory access patterns for adaptive asynchronous incremental checkpointing (BN, FC), pp. 155–166.
TACASTACAS-2013-FerraraMP #analysis #policy #self
Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACASTACAS-2013-KoleiniRR #model checking #policy
Model Checking Agent Knowledge in Dynamic Access Control Policies (MK, ER, MR), pp. 448–462.
CADECADE-2013-BaaderBL #ontology
Temporalizing Ontology-Based Data Access (FB, SB, ML), pp. 330–344.
ISSTAISSTA-2013-ParkHV #comprehension #concurrent #debugging #named
Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugs (SP, MJH, RWV), pp. 134–144.
HTHT-2012-CostabelloVDG #framework #mobile #named #web
SHI3LD: an access control framework for the mobile web of data (LC, SV, ND, FG), pp. 311–312.
CSMRCSMR-2012-GauthierM #case study #concept analysis #modelling
Investigation of Access Control Models with Formal Concept Analysis: A Case Study (FG, EM), pp. 397–402.
ICSMEICSM-2012-Song0XS #api
Inferring the data access from the clients of generic APIs (HS, GH, YX, YS), pp. 388–397.
WCREWCRE-2012-GauthierM #detection #performance #php
Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
CHICHI-2012-KlempererLMSUBCGR #exclamation #using
Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
SEKESEKE-2012-PereiraAS #adaptation #architecture #named
ACADA: Access Control-driven Architecture with Dynamic Adaptation (ÓMP, RLA, MYS), pp. 387–393.
SACSAC-2012-AnwarF #network #policy #social #visualisation
A visualization tool for evaluating access control policies in facebook-style social network systems (MMA, PWLF), pp. 1443–1450.
SACSAC-2012-CrassK #coordination
A coordination-based access control model for space-based computing (SC, EK), pp. 1560–1562.
SACSAC-2012-RajeDFRR #implementation #ontology #using
Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SACSAC-2012-SchrecklingPH #android #named
Constroid: data-centric access control for android (DS, JP, DH), pp. 1478–1485.
ASPLOSASPLOS-2012-CheritonFSSA #architecture #named #performance
HICAMP: architectural support for efficient concurrency-safe shared structured data access (DRC, AF, AS, JPS, OA), pp. 287–300.
CGOCGO-2012-MajoG #memory management
Matching memory access patterns and data placement for NUMA systems (ZM, TRG), pp. 230–241.
CGOCGO-2012-MatosevicA #analysis #bottom-up #performance #summary
Efficient bottom-up heap analysis for symbolic path-based data access summaries (IM, TSA), pp. 252–263.
DACDAC-2012-GhosalLRTPWTA #analysis #data flow #semantics
Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
DATEDATE-2012-StipicTZCUV #hardware #metadata #named #performance
TagTM — accelerating STMs with hardware tags for fast meta-data access (SS, ST, FZ, AC, OSÜ, MV), pp. 39–44.
OSDIOSDI-2012-KotlaRRSW #hardware #named #using
Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
ICLPICLP-2012-0002KZPM #approach #logic programming #rdf
A Logic Programming approach for Access Control over RDF (NL, SK, AZ, AP, AM), pp. 381–392.
CHICHI-2011-EgelmanOK #facebook #fault
Oops, I did it again: mitigating repeated access control errors on facebook (SE, AO, SK), pp. 2295–2304.
CHICHI-2011-MazurekKSTBC
Exploring reactive access control (MLM, PFK, RS, HT, LB, LFC), pp. 2085–2094.
KEODKEOD-2011-GuerreiroVT #ontology #transaction
Dynamic Business Transactions Control — An Ontological Example: Organizational Access Control with DEMO (SG, AV, JMT), pp. 549–554.
ASEASE-2011-RobinsonNS #flexibility #named
GitBAC: Flexible access control for non-modular concerns (MR, JN, MS), pp. 500–503.
ESEC-FSEESEC-FSE-2011-MontrieuxWY #specification #tool support #uml #verification
Tool support for UML-based specification and verification of role-based access control properties (LM, MW, YY), pp. 456–459.
SACSAC-2011-CherifIR #collaboration #distributed #editing
Optimistic access control for distributed collaborative editors (AC, AI, MR), pp. 861–868.
SACSAC-2011-ShiC #authoring #interface #natural language #policy
A controlled natural language interface for authoring access control policies (LLS, DWC), pp. 1524–1530.
DACDAC-2011-KimS #memory management #named
CuMAPz: a tool to analyze memory access patterns in CUDA (YK, AS), pp. 128–133.
HPDCHPDC-2011-ZhangLWK #energy #scheduling
Software-directed data access scheduling for reducing disk energy consumption (YZ, JL, EHW, MTK), pp. 281–282.
ESOPESOP-2011-CairesPSVF #type system
Type-Based Access Control in Data-Centric Systems (LC, JAP, JCS, HTV, LF), pp. 136–155.
CSLCSL-2011-Wolter #constraints #ontology
Ontology-Based Data Access and Constraint Satisfaction (FW), p. 4.
CHICHI-2010-MazurekABGIJLLOSSVBCGR #social
Access control for home data sharing: evaluating social acceptability (MLM, JPA, JB, NG, II, CJ, DL, YL, JO, BS, RS, KV, LB, LFC, GRG, MKR), pp. 645–654.
ICEISICEIS-DISI-2010-AzevedoPTBC #flexibility #framework
A Flexible Framework for Applying Data Access Authorization Business Rules (LGA, SP, RT, FAB, CC), pp. 275–280.
ICEISICEIS-DISI-2010-BorovskiyKZ #enterprise #flexibility
Flexible Data Access in ERP Systems (VB, WK, AZ), pp. 96–104.
ICEISICEIS-ISAS-2010-BezerraHS #collaboration
An Access Control Model for Massive Collaborative Edition (JdMB, CMH, EMdS), pp. 135–140.
ICEISICEIS-ISAS-2010-ZhangJ #challenge #comprehension #multi
Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments (YZ, JBDJ), pp. 356–361.
ICEISICEIS-J-2010-BorovskiyKZ10a #api #enterprise #query
Business Object Query Language as Data Access API in ERP Systems (VB, WK, AZ), pp. 135–148.
ICPRICPR-2010-ArslanSATY #comparison #image #multi #retrieval
Comparison of Multidimensional Data Access Methods for Feature-Based Image Retrieval (SA, AS, EA, IHT, AY), pp. 3260–3263.
SEKESEKE-2010-ElabdCH #approach #implementation #web #web service
Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control (EE, EC, MSH), pp. 235–240.
SACSAC-2010-MabuchiSHSK #named
CapaCon: access control mechanism for inter-device communications through TCP connections (MM, YS, KH, AS, KK), pp. 706–712.
SACSAC-2010-MatthysAHMJH #fine-grained #network #towards
Towards fine-grained and application-centric access control for wireless sensor networks (NM, SRA, CH, SM, WJ, DH), pp. 793–794.
DACDAC-2010-LeeSC #fine-grained #mobile
Fine-grained I/O access control based on Xen virtualization for 3G/4G mobile devices (SML, SBS, JDC), pp. 108–113.
HPDCHPDC-2010-SehrishMWB #framework #named #novel
MRAP: a novel MapReduce-based framework to support HPC analytics applications with access patterns (SS, GM, JW, JB), pp. 107–118.
HPDCHPDC-2010-ShibataCT #data-driven #distributed #workflow
File-access patterns of data-intensive workflow applications and their implications to distributed filesystems (TS, SC, KT), pp. 746–755.
FASEFASE-2010-KimLK #approach #configuration management #modelling
A Verifiable Modeling Approach to Configurable Role-Based Access Control (DKK, LL, SK), pp. 188–202.
SIGMODSIGMOD-2009-BorkarCELRSTW #framework #platform
Access control in the aqualogic data services platform (VRB, MJC, DE, DL, PR, JS, ST, TW), pp. 939–946.
SIGMODSIGMOD-2009-ViegasW #visualisation
Transforming data access through public visualization (FBV, MW), pp. 3–4.
WCREWCRE-1999-YangPZ99a #concept analysis #feature model #multi #semantics #using
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
LATALATA-2009-Moore #documentation #generative #problem
The Halting Problem and Undecidability of Document Generation under Access Control for Tree Updates (NM), pp. 601–613.
KMISKMIS-2009-EvdokimovFK #challenge
Challenges for Access Control in Knowledge Federations (SE, BF, SK), pp. 224–229.
ECOOPECOOP-2009-FischerMMM #fine-grained
Fine-Grained Access Control with Object-Sensitive Roles (JF, DM, RM, TDM), pp. 173–194.
CGOCGO-2009-LiWH #evaluation
An Evaluation of Misaligned Data Access Handling Mechanisms in Dynamic Binary Translation Systems (JL, CW, WCH), pp. 180–189.
TACASTACAS-2009-GofmanLSZYS #analysis #named #policy
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
FATESTestCom-FATES-2009-MarchandDJ #automation #security #testing
Automatic Testing of Access Control for Security Properties (HM, JD, TJ), pp. 113–128.
CBSECBSE-2008-SunHM #validation
Validating Access Control Configurations in J2EE Applications (LS, GH, HM), pp. 64–79.
JCDLJCDL-2008-ViegasW
Shakespeare, god, and lonely hearts: transforming data access with many eyes (FBV, MW), pp. 145–146.
SIGMODSIGMOD-2008-HeS #database #graph #named #query
Graphs-at-a-time: query language and access methods for graph databases (HH, AKS), pp. 405–418.
VLDBVLDB-2008-RastogiSW #nondeterminism
Access control over uncertain data (VR, DS, EW), pp. 821–832.
CHICHI-2008-ToomimZFL #testing
Access control by testing for shared knowledge (MT, XZ, JF, JAL), pp. 193–196.
EDOCEDOC-2008-RahamanRS #distributed #documentation #xml
Distributed Access Control For XML Document Centric Collaborations (MAR, YR, AS), pp. 267–276.
ICEISICEIS-DISI-2008-MuldnerML #dataset #policy #xml
Succinct Access Control Policies for Published XML Datasets (TM, JKM, GL), pp. 380–385.
CIKMCIKM-2008-RazenteBTFT #approach #metric #novel #optimisation #process #query #similarity
A novel optimization approach to efficiently process aggregate similarity queries in metric access methods (HLR, MCNB, AJMT, CF, CTJ), pp. 193–202.
SEKESEKE-2008-TekbacakTD #approach #certification #security #semantics #using
A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
PPDPPPDP-2008-BertolissiF #composition #framework #policy
A rewriting framework for the composition of access control policies (CB, MF), pp. 217–225.
SACSAC-2008-BuenoTT #algorithm #effectiveness #metric #optimisation
An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
SACSAC-2008-FonsecaVM #detection #online #using
Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
CGOCGO-2008-KetterlinC #predict #recognition
Prediction and trace compression of data access addresses through nested loop recognition (AK, PC), pp. 94–103.
LCTESLCTES-2008-ChoPIDPK #array #compilation #layout #optimisation
Compiler driven data layout optimization for regular/irregular array access patterns (DC, SP, II, ND, YP, SK), pp. 41–50.
FoSSaCSFoSSaCS-2008-GargA #logic
A Modal Deconstruction of Access Control Logics (DG, MA), pp. 216–230.
ICSTICST-2008-PretschnerMT #modelling #policy #testing
Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
ICSTICST-2008-TraonMPB #assessment #legacy #testing
Test-Driven Assessment of Access Control in Legacy Applications (YLT, TM, AP, BB), pp. 238–247.
SIGMODSIGMOD-2007-MurthyS #flexibility #performance
Flexible and efficient access control in oracle (RM, ES), pp. 973–980.
VLDBVLDB-2007-VimercatiFJPS #evolution #named #outsourcing
Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
VLDBVLDB-2007-Vogels #framework #platform
Data Access Patterns in The Amazon.com Technology Platform (WV), p. 1.
VLDBVLDB-2007-WangYLLBIB #correctness #database #fine-grained #on the #relational
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases (QW, TY, NL, JL, EB, KI, JWB), pp. 555–566.
HCIHCI-IPT-2007-HuaP #mobile
WAP Access Methods on Mobile Phones (ZH, CYP), pp. 320–325.
RecSysRecSys-2007-FreyneFC #recommendation #social #towards
Toward the exploitation of social access patterns for recommendation (JF, RF, MC), pp. 179–182.
PPDPPPDP-2007-Skalka #type safety #virtual machine
Type safe dynamic linking for JVM access control (CS), pp. 51–62.
ICSEICSE-2007-LiuM #uml
Ownership and Immutability Inference for UML-Based Object Access Control (YL, AM), pp. 323–332.
CCCC-2007-JeonSH #layout #using
Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
PDPPDP-2007-SinghICGC #locality #multi
Multiple-Phase Collective I/O Technique for Improving Data Access Locality (DES, FI, AC, FG, JC), pp. 534–542.
SIGMODSIGMOD-2006-KabraRS #fine-grained #information management
Redundancy and information leakage in fine-grained access control (GK, RR, SS), pp. 133–144.
SIGMODSIGMOD-2006-LeeLWZX #mobile
CS cache engine: data access accelerator for location-based service in mobile environments (KCKL, WCL, JW, BZ, JX), pp. 787–789.
SIGMODSIGMOD-2006-SignerNGBDW #database #mobile
Paper-based mobile access to databases (BS, MCN, MG, RB, CD, NW), pp. 763–765.
VLDBVLDB-2006-MohanW #approach #interactive #named
IPAC — An Interactive Approach to Access Control for Semi-structured Data (SM, YW), pp. 1147–1150.
ICALPICALP-v2-2006-JagadeesanJPR #named #programming
λ-RBAC: Programming with Role-Based Access Control (RJ, AJ, CP, JR), pp. 456–467.
ICFPICFP-2006-Abadi #calculus #dependence
Access control in a core calculus of dependency (MA), pp. 263–273.
PEPMPEPM-2006-LiuWGRCZZ #implementation #performance
Core role-based access control: efficient implementations by transformations (YAL, CW, MG, TR, YC, YZ, JZ), pp. 112–120.
SACSAC-2006-DamianiB #architecture
Architectural issues for a location-aware role-based access control system (MLD, EB), pp. 1184–1185.
SACSAC-2006-ZhaiLL #mobile #statistics #streaming
Statistical buffering for streaming media data access in a mobile environment (JZ, XL, QL), pp. 1161–1165.
DATEDATE-2006-ChenOKK #array #memory management
Dynamic scratch-pad memory management for irregular array access patterns (GC, ÖÖ, MTK, MK), pp. 931–936.
ISSTAISSTA-2006-CentonzeNFP #consistency #validation
Role-Based access control consistency validation (PC, GN, SJF, MP), pp. 121–132.
VLDBVLDB-2005-BartaCM #multi #query #summary #xml
Benefits of Path Summaries in an XML Query Optimizer Supporting Multiple Access Methods (AB, MPC, AOM), pp. 133–144.
VLDBVLDB-2005-LiBRHN #information management
QoS-based Data Access and Placement for Federated Information Systems (WSL, VSB, VR, WH, IN), pp. 1358–1362.
ICEISICEIS-v1-2005-RamachandranSR
Dynamic Pre-fetching of Views Based on User-Access Patterns in an OLAP System (KR, BS, VVR), pp. 60–67.
ICEISICEIS-v3-2005-Henning
Metapolicies and Context-Based Access Control (RRH), pp. 355–359.
ICEISICEIS-v3-2005-NasserBLGB #grid
Access Control Model for Grid Virtual Organizations (BN, AB, RL, FG, FB), pp. 152–158.
ICEISICEIS-v3-2005-WhiteJM #adaptation #ubiquitous
User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments (MW, BJ, SvdM), pp. 349–354.
CIKMCIKM-2005-FinanceMP #xml
The case for access control on XML relationships (BF, SM, PP), pp. 107–114.
CIKMCIKM-2005-MohanSW #approach #query #xml
Access control for XML: a dynamic query rewriting approach (SM, AS, YW), pp. 251–252.
CIKMCIKM-2005-QiKMP #database #xml
A function-based access control model for XML databases (NQ, MK, JM, HP), pp. 115–122.
ECIRECIR-2005-SkopalM #metric #performance
Modified LSI Model for Efficient Search by Metric Access Methods (TS, PM), pp. 245–259.
MODELSMoDELS-2005-BordbarDHSW #development #migration #modelling
Integrated Model-Based Software Development, Data Access, and Data Migration (BB, DD, MH, IS, GW), pp. 382–396.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #framework #programming #using
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MODELSMoDELS-2005-BordbarDHSW #development #migration #modelling
Integrated Model-Based Software Development, Data Access, and Data Migration (BB, DD, MH, IS, GW), pp. 382–396.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #framework #programming #using
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
ECOOPECOOP-2005-BiermanMS
The Essence of Data Access in Cω (GMB, EM, WS), pp. 287–311.
SACSAC-2005-AloisioCFQ #architecture
A grid-based architecture for earth observation data access (GA, MC, SF, GQ), pp. 701–705.
SACSAC-2005-ChinoVTT #comprehension #metric #named #visual notation
MAMView: a visual tool for exploring and understanding metric access methods (FJTC, MRV, AJMT, CTJ), pp. 1218–1223.
HPDCHPDC-2005-AnastasiadisWC #flexibility #framework #named
Lerna: an active storage framework for flexible data access and management (SVA, RW, JSC), pp. 176–187.
HPDCHPDC-2005-VijayakumarLP #data type #grid #named
Calder: enabling grid access to data streams (NNV, YL, BP), pp. 283–284.
FoSSaCSFoSSaCS-2005-BartolettDF #policy
History-Based Access Control with Local Policies (MB, PD, GLF), pp. 316–332.
PODSPODS-2004-NashL #first-order #query
Processing First-Order Queries under Limited Access Patterns (AN, BL), pp. 307–318.
SIGMODSIGMOD-2004-RizviMSR #fine-grained #query
Extending Query Rewriting Techniques for Fine-Grained Access Control (SR, AOM, SS, PR), pp. 551–562.
VLDBVLDB-2004-BouganimNP #documentation #xml
Client-Based Access Control Management for XML documents (LB, FDN, PP), pp. 84–95.
VLDBVLDB-2004-RjaibiB #database #implementation #multi #relational
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems (WR, PB), pp. 1010–1020.
ICGTICGT-2004-Sandhu #graph #modelling
A Perspective on Graphs and Access Control Models (RSS), pp. 2–12.
ICEISICEIS-v3-2004-DomingosRV #perspective #workflow
Workflow Access Control from a Business Perspective (DD, ARS, PV), pp. 18–25.
CIKMCIKM-2004-Banaei-KashaniS #named #network #peer-to-peer #product line
SWAM: a family of access methods for similarity-search in peer-to-peer data networks (FBK, CS), pp. 304–313.
CIKMCIKM-2004-LuoLLL #fine-grained #named #query #runtime #xml
QFilter: fine-grained run-time XML access control via NFA-based query rewriting (BL, DL, WCL, PL), pp. 543–552.
PEPMPEPM-2004-BarkerLV #flexibility #logic programming #performance
Efficient and flexible access control via logic program specialisation (SB, ML, MV), pp. 190–199.
FASEFASE-2004-KimRFL #modelling #uml #using
Modeling Role-Based Access Control Using Parameterized UML Models (DKK, IR, RBF, NL), pp. 180–193.
VLDBVLDB-2003-BouganimNPW #encryption
Chip-Secured Data Access: Reconciling Access Rights with Data Encryption (LB, FDN, PP, LW), pp. 1133–1136.
ICFPICFP-2003-HiguchiO #static typing #type system #virtual machine
A static type system for JVM access control (TH, AO), pp. 227–237.
EDOCEDOC-2003-BurtBROA #modelling #security #unification
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control (CCB, BRB, RRR, AMO, MA), pp. 159–173.
ICEISICEIS-v3-2003-DomingosV #adaptation #workflow
A Dynamic Role Based Access Control Model for Adaptive Workflow Management Systems (DD, PV), pp. 167–173.
ICEISICEIS-v3-2003-YangZ #enterprise #xml
An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment (CY, CNZ), pp. 646–649.
CIKMCIKM-2003-YeeN #multi #performance #source code
Efficient data access to multi-channel broadcast programs (WGY, SBN), pp. 153–160.
SEKESEKE-2003-LaiLB #database #mining #object-oriented
Mining Access Patterns for Enhancing Navigational Access in Object-Oriented Database (CL, SL, JB), pp. 679–684.
UMLUML-2003-AlghathbarW #case study #consistency #policy
Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
AdaSIGAda-2003-Gantsou #self
A DSA model for data access in self-organizing systems (DG), pp. 25–28.
SACSAC-2003-YangZ #approach #data flow #object-oriented
An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model (CY, CNZ), pp. 302–306.
LICSLICS-2003-Abadi #logic
Logic in Access Control (MA), p. 228–?.
TPDLECDL-2002-BertinoFP #library #prototype #web
An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration (EB, EF, AP), pp. 656–657.
VLDBVLDB-2002-BouganimP
Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
VLDBVLDB-2002-KounevB
Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services (SK, APB), pp. 574–585.
VLDBVLDB-2002-YuSLJ #performance #xml
Compressed Accessibility Map: Efficient Access Control for XML (TY, DS, LVSL, HVJ), pp. 478–489.
CSCWCSCW-2002-StevensW #bound #maintenance
A new dimension in access control: studying maintenance engineering across organizational boundaries (GS, VW), pp. 196–205.
CIKMCIKM-2002-ChenLS #categorisation
Categorizing information objects from user access patterns (MC, ASL, JPS), pp. 365–372.
CIKMCIKM-2002-TrainaTFF #how #metric
How to improve the pruning ability of dynamic metric access methods (CTJ, AJMT, RFSF, CF), pp. 219–226.
POPLPOPL-2002-BanerjeeN #independence #representation
Representation independence, confinement and access control [extended abstract] (AB, DAN), pp. 166–177.
SACSAC-2002-Ungureanu #e-commerce
An agreement centric access control mechanism for business to business e-commerce (VU), pp. 1160–1164.
FoSSaCSFoSSaCS-2002-KochMP #detection #policy #specification
Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
ICLPICLP-2002-Barker #database #deduction #logic programming
Access Control for Deductive Databases by Logic Programming (SB), pp. 54–69.
VLDBVLDB-2001-AnSVKIG #behaviour #energy
Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
CIKMCIKM-2001-FuCJ #web
Reorganizing Web Sites Based on User Access Patterns (YF, MC, CJ), pp. 583–585.
CIKMCIKM-2001-RosenthalW #documentation #question
Document Release versus Data Access Controls: Two Sides of the Same Coin? (AR, GW), pp. 544–546.
CIKMCIKM-2001-XiaKCRB #concurrent #database #in memory #memory management #version control
Dynamic Versioning Concurrency Control for Index-Based Data Access in Main Memory Database Systems (YX, SHK, SKC, KWR, HYB), pp. 550–552.
DACDAC-2001-Dervisoglu #architecture
A Unified DFT Architecture for Use with IEEE 1149.1 and VSIA/IEEE P1500 Compliant Test Access Controllers (BID), pp. 53–58.
HPDCHPDC-2001-TerekhovPWLLTVVWS #distributed #resource management
Distributed Data Access and Resource Management in the D0 SAM System (IT, RP, VW, LL, LLC, JT, SV, MV, SW, HS), p. 87–?.
ESOPESOP-2001-PottierSS #approach
A Systematic Approach to Static Access Control (FP, CS, SFS), pp. 30–45.
FoSSaCSFoSSaCS-2001-KochMP #approach #graph #policy #specification
Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
PODSPODS-2000-AtallahP #parallel #query
(Almost) Optimal Parallel Block Access for Range Queries (MJA, SP), pp. 205–215.
SIGMODSIGMOD-2000-BlakeleyD #named #tutorial
Tutorial: Data Access (JAB, AD), p. 579.
CIKMCIKM-2000-BertinoHAE #database #video
An Access Control Model for Video Database Systems (EB, MAH, WGA, AKE), pp. 336–343.
SACSAC-2000-TousidouM #comparison #performance
A Performance Comparison of Quadtree-Based Access Methods for Thematic Maps (ET, YM), pp. 381–388.
HPDCHPDC-2000-TerekhovW #distributed #empirical
Distributed Data Access in the Sequential Access Model in the D0 Experiment at Fermilab (IT, VW), pp. 310–311.
HTHT-1999-Wang #hypermedia
Team-and-RoleBbased Organizational Context and Access Control for Cooperative Hypermedia Environments (WW), pp. 37–46.
SIGMODSIGMOD-1999-ChakrabartiM #concurrent #multi #performance
Efficient Concurrency Control in Multidimensional Access Methods (KC, SM), pp. 25–36.
SIGMODSIGMOD-1999-FlorescuLMS #optimisation #query
Query Optimization in the Presence of Limited Access Patterns (DF, AYL, IM, DS), pp. 311–322.
FMFM-v2-1999-Droschl #requirements #using
Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
ICEISICEIS-1999-FrantiDSS #automaton #using
Using Intelligent Retina with Cellular Automata in Access Control (EF, MD, GS, MS), pp. 219–224.
ICEISICEIS-1999-YooYP #internet
A New Method to Block Access to Illegal and Harmful Content on the Internet (BJY, HGY, MSP), pp. 732–739.
ECOOPECOOP-1999-PandeyH #fine-grained #java #source code
Providing Fine-grained Access Control for Java Programs (RP, BH), pp. 449–473.
TOOLSTOOLS-USA-1999-CrichtonDW #mobile #trust
When to Trust Mobile Objects: Access Control in the Jini(tm) Software System (CC, JD, JW), pp. 116–125.
ADLADL-1998-ZaianeXH #data mining #mining #roadmap #web
Discovering Web Access Patterns and Trends by Applying OLAP and Data Mining Technology on Web Logs (ORZ, MX, JH), pp. 19–29.
DL-1998-BaruR #library
A Hierarchical Access Control Scheme for Digital Libraries (CKB, AR), pp. 275–276.
DL-1998-BrowneDHMW #repository
Technologies for Repository Interoperation and Access Control (SB, JD, JH, PM, SW), pp. 40–48.
SIGMODSIGMOD-1998-BlakeleyP #framework #platform
Microsoft Universal Data Access Platform (JAB, MP), pp. 502–503.
SIGMODSIGMOD-1998-ReinwaldP #semistructured data #sql
SQL Open Heterogeneous Data Access (BR, HP), pp. 506–507.
SIGMODSIGMOD-1998-WhiteCF #enterprise #framework #java #platform
Enterprise Java Platform Data Access (SJW, RGGC, SJF), pp. 504–505.
VLDBVLDB-1998-MuthOPW #design #implementation #performance
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
TOOLSTOOLS-USA-1998-BallH #corba
Data Access and Transportation Services for the CORBA Environment (CHB, SH), p. 269–?.
TOOLSTOOLS-USA-1998-HsiehPFGB #interactive #object-oriented
The Interaction of Access Control and Object-Orientation in Extensible Systems (WCH, PP, MEF, CG, BNB), pp. 320–332.
PLDIPLDI-1998-PaekHP #array #compilation #optimisation
Simplification of Array Access Patterns for Compiler Optimizations (YP, JH, DAP), pp. 60–71.
SIGMODSIGMOD-1997-JajodiaSSB #framework #multi #policy
A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
VLDBVLDB-1997-SellisRF #multi
Multidimensional Access Methods: Trees Have Grown Everywhere (TKS, NR, CF), pp. 13–14.
ICMLICML-1997-SakrLCHG #learning #memory management #modelling #multi #predict
Predicting Multiprocessor Memory Access Patterns with Learning Models (MFS, SPL, DMC, BGH, CLG), pp. 305–312.
SACSAC-1997-TsaurHC #approach #authentication #distributed #geometry #using
An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
SIGMODSIGMOD-1996-Blakeley
Data Access for the Masses through OLE DB (JAB), pp. 161–172.
VLDBVLDB-1996-BerckenS #multi #query
Query Processing Techniques for Multiversion Access Methods (JVdB, BS), pp. 168–179.
VLDBVLDB-1996-BertinoBFS #database #reasoning
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control (EB, CB, EF, PS), pp. 472–483.
CHICHI-1995-RoeslerM #online #taxonomy #what
What Help Do Users Need?: Taxonomies for On-Line Information Needs and Access Methods (AWR, SGM), pp. 437–441.
PPoPPPPoPP-1995-CarlsonD #distributed
Distributed Data Access in AC (WWC, JMD), pp. 39–47.
VLDBVLDB-1994-FrohnLU
Access to Objects by Path Expressions and Rules (JF, GL, HU), pp. 273–284.
ASPLOSASPLOS-1994-SchoinasFLRLW #distributed #memory management
Fine-grain Access Control for Distributed Shared Memory (IS, BF, ARL, SKR, JRL, DAW), pp. 297–306.
SIGMODSIGMOD-1992-Dozier
Access to Data in NASA’s Earth Observing System (JD), p. 1.
CSCWCSCW-1992-ShenD #collaboration
Access Control for Collaborative Environments (HS, PD), pp. 51–58.
OOPSLAOOPSLA-1991-SimmelG #semantics #transaction
The Kala Basket: A Semantic Primitive Unifying Object Transactions, Access Control, Versions, and Configurations (SSS, IG), pp. 230–246.
SIGMODSIGMOD-1990-KemperM
Access Support in Object Bases (AK, GM), pp. 364–374.
VLDBVLDB-1990-DanDY
The Effect of Skewed Data Access on Buffer Hits and Data Contention an a Data Sharing Environment (AD, DMD, PSY), pp. 419–431.
VLDBVLDB-1990-KemperM #query #using
Advanced Query Processing in Object Bases Using Access Support Relations (AK, GM), pp. 290–301.
SIGMODSIGMOD-1989-LometS #multi
Access Methods for Multiversion Data (DBL, BS), pp. 315–324.
SIGIRSIGIR-1989-ChangLL #clustering #multi
Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
SIGIRSIGIR-1989-ChristodoulakisF
File Organizations and Access Methods for CLV Optical Disks (SC, DAF), pp. 152–159.
PLDIPLDI-1989-BalasundaramK #parallel
A Technique for Summarizing Data Access and Its Use in Parallelism Enhancing Transformations (VB, KK), pp. 41–53.
VLDBVLDB-1988-FaloutsosC #comparison #design #performance #scalability
Fast Text Access Methods for Optical and Large Magnetic Disks: Designs and Performance Comparison (CF, RC), pp. 280–293.
VLDBVLDB-1988-SeegerK #design #implementation #performance
Techniques for Design and Implementation of Efficient Spatial Access Methods (BS, HPK), pp. 360–371.
SIGMODSIGMOD-1987-FaloutsosSR #analysis #object-oriented
Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
VLDBVLDB-1986-ZandenTB #correlation
Estimating Block Accessses when Attributes are Correlated (BTVZ, HMT, DB), pp. 119–127.
DACDAC-1985-BarabinoBBM
A module for improving data access and management in an integrated CAD environment (GPB, GSB, GB, MM), pp. 577–583.
VLDBVLDB-1984-BrzezinskiGRS #database #named
UNIBASE — An Integrated Access to Databases (ZB, JRG, JR, WS), pp. 388–396.
SIGIRSIGIR-1984-RabittiZ #documentation #evaluation
Evaluation of Access Methods to Text Document in Office Systems (FR, JZ), pp. 21–40.
DACDAC-1982-TamminenS #geometry #performance
The excell method for efficient geometric access to data (MT, RS), pp. 345–351.
ICSEICSE-1981-Hulten
An Index Organization for Applications with Highly Skewed Access Patterns (CH), pp. 71–78.
VLDBVLDB-1977-Sagalowicz #named
IDA: An Intelligent Data Access Program (DS), pp. 293–302.
VLDBVLDB-1976-SenkoA #abstraction #physics
DIAM II and Levels of Abstraction — The Physical Device Level: A General Model for Access Methods (MES, EBA), pp. 79–94.
AdaDIPL-1976-FischerL #runtime
Run-time checking of data access in Pascal-like languages (CNF, RJL), pp. 215–230.
ICSEICSE-1976-JonesL
A Language Extension for Controlling Access to Shared Data (AKJ, BL), p. 235.
SIGMODSIGFIDET-1972-Parker #information retrieval
File Structures and Access Methods for a Geographic Information Retrieval System (JLP), pp. 383–393.
SIGMODSIGFIDET-1971-BrowneS
A Model for Access Control (PSB, DDS), pp. 241–262.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.