Tag #data access
267 papers:
ASPLOS-2020-AyersLKR #memory management- Classifying Memory Access Patterns for Prefetching (GA, HL, CK, PR), pp. 513–526.
CIKM-2018-CalvaneseX #integration #semantics- Semantic Technologies for Data Access and Integration (DC, GX0), pp. 2303–2304.
ICML-2018-HashemiSSALCKR #learning #memory management- Learning Memory Access Patterns (MH, KS, JAS, GA, HL, JC, CK, PR), pp. 1924–1933.
ASE-2018-FadhelBB #modelling #policy #runtime- Model-driven run-time enforcement of complex role-based access control policies (ABF, DB, LCB), pp. 248–258.
ASE-2018-LinWLSZW #concurrent #debugging #memory management #named- PFix: fixing concurrency bugs based on memory access patterns (HL, ZW, SL, JS0, DZ, GW), pp. 589–600.
SANER-2017-YanoM #legacy #maintenance #visualisation- Data access visualization for legacy application maintenance (KY, AM), pp. 546–550.
SEFM-2017-KumarS #generative #modelling- A Complete Generative Label Model for Lattice-Based Access Control Models (NVNK, RKS), pp. 35–53.
CIKM-2016-0001MDLMRSZU #database- Analyzing Data Relevance and Access Patterns of Live Production Database Systems (MB0, CAM, TD, JL, KM, PR, TS, TZ, MU), pp. 2473–2475.
MoDELS-2016-BergmannDRV #bidirectional #collaboration #modelling #using- Query-based access control for secure collaborative modeling using bidirectional transformations (GB, CD, IR, DV), pp. 351–361.
OOPSLA-2016-MooreDFFC #contract- Extensible access control with authorization contracts (SM, CD, RBF, MF, SC), pp. 214–233.
PPDP-2016-BertolissiTV #analysis #policy- Analysis of access control policy updates through narrowing (CB, JMT, DV), pp. 62–75.
ASE-2016-BocicB #debugging #web- Finding access control bugs in web applications with CanCheck (IB, TB), pp. 155–166.
- ICSE-2016-NearJ #debugging #security #using #web
- Finding security bugs in web applications using a catalog of access control patterns (JPN, DJ0), pp. 947–958.
SIGMOD-2015-HangKD #named #query- ENKI: Access Control for Encrypted Query Processing (IH, FK, ED), pp. 183–196.
SIGMOD-2015-MoffittSAM #collaboration- Collaborative Access Control in WebdamLog (VZM, JS, SA, GM), pp. 197–211.
VLDB-2015-BenediktLT #constraints #query- Querying with Access Patterns and Integrity Constraints (MB, JL, ET), pp. 690–701.
ITiCSE-2015-WangMSLCW #education #named #using #visualisation- RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
ICEIS-v2-2015-MazurKW #modelling #on the #performance #security- On the Modelling of the Influence of Access Control Management to the System Security and Performance (KM, BK, AW), pp. 346–354.
CIKM-2015-AlamoudiGCB - External Data Access And Indexing In AsterixDB (AAA, RG, MJC0, VRB), pp. 3–12.
SEKE-2015-PeiYF #in the cloud #performance #policy- Achieving Efficient Access Control via XACML Policy in Cloud Computing (XP, HY, GF), pp. 110–115.
SEKE-2015-PereiraRA #database #distributed #stack- Secure, Dynamic and Distributed Access Control Stack for Database Applications (ÓMP, DDR, RLA), pp. 364–369.
POPL-2015-ElangoRPRS #complexity #on the #source code- On Characterizing the Data Access Complexity of Programs (VE, FR, LNP, JR, PS), pp. 567–580.
ICSE-v2-2015-Hachem #analysis #architecture #modelling #towards- Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
SAC-2015-BusseSDNH #memory management #virtual machine- Partial coscheduling of virtual machines based on memory access patterns (AB, JHS, MD, POAN, HUH), pp. 2033–2038.
SAC-2015-DecatBLJ #as a service #middleware #multitenancy #named #performance- Amusa: middleware for efficient access control management of multi-tenant SaaS applications (MD, JB, BL, WJ), pp. 2141–2148.
SAC-2015-ThionLB #data flow #relational- Tuple-based access control: a provenance-based information flow control for relational data (RT, FL, MBGT), pp. 2165–2170.
CASE-2015-QiuSL #realtime- Real time access control of patient service in the pediatrics department (YQ, JS, ZL), pp. 734–739.
DAC-2015-LiuKDK #network #reduction- Network footprint reduction through data access and computation placement in NoC-based manycores (JL, JK, WD, MTK), p. 6.
DAC-2015-MengYOLW #array #clustering #memory management #parallel #performance- Efficient memory partitioning for parallel data access in multidimensional arrays (CM, SY, PO, LL, SW), p. 6.
LCTES-2015-BardizbanyanSWL #performance #using- Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
ITiCSE-2014-WangCMSW #education #multi #named #security #using #visualisation- MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
ICSME-2014-GauthierMST #evolution #maintenance #modelling #web- Supporting Maintenance and Evolution of Access Control Models in Web Applications (FG, EM, ES, DT), pp. 506–510.
ICFP-2014-MarlowBCP #abstraction #concurrent #performance- There is no fork: an abstraction for efficient, concurrent, and concise data access (SM, LB, JC, JP), pp. 325–337.
CAiSE-2014-KayesHC #framework #named- PO-SAAC: A Purpose-Oriented Situation-Aware Access Control Framework for Software Services (ASMK, JH, AC), pp. 58–74.
ICEIS-v2-2014-WeiRT #policy- Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
SEKE-2014-LiLWC #automation #generative #policy #testing- Automatic XACML requests generation for testing access control policies (YL, YL, LW, GC), pp. 217–222.
LOPSTR-2014-AlvesDF #metamodelling #semantics- Access Control and Obligations in the Category-Based Metamodel: A Rewrite-Based Semantics (SA, AD, MF), pp. 148–163.
SAC-2014-WangH #fine-grained #performance- An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan (MW, YH), pp. 1511–1516.
LCTES-2014-Guo #co-evolution #design #energy #performance- Energy efficient data access and storage through HW/SW co-design (MG), p. 83.
LCTES-2014-Whalley #energy #performance- Energy efficient data access techniques (DBW), p. 1.
CAV-2014-FerraraMNP #named #policy #verification- Vac — Verifier of Administrative Role-Based Access Control Policies (ALF, PM, TLN, GP), pp. 184–191.
JCDL-2013-AlNoamanyWN #web- Access patterns for robots and humans in web archives (YA, MCW, MLN), pp. 339–348.
PODS-2013-BienvenuCLW #case study #csp #datalog #ontology- Ontology-based data access: a study through disjunctive datalog, CSP, and MMSNP (MB, BtC, CL, FW), pp. 213–224.
PODS-2013-RudolphK #query- Flag & check: data access with monadically defined queries (SR, MK), pp. 151–162.
VLDB-2013-CiviliCGLLLMPRRSS #ontology- MASTRO STUDIO: Managing Ontology-Based Data Access applications (CC, MC, GDG, DL, ML, LL, RM, AP, RR, MR, VS, DFS), pp. 1314–1317.
SEKE-2013-PereiraAS #policy #relational #runtime- Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
OOPSLA-2013-RichardsHNJV #flexibility #javascript- Flexible access control for javascript (GR, CH, FZN, SJ, JV), pp. 305–322.
ICSE-2013-GauthierM #case study #fault #modelling #php #semantics #smell- Semantic smells and errors in access control models: a case study in PHP (FG, EM), pp. 1169–1172.
ICSE-2013-NistorSML #detection #named #performance #problem- Toddler: detecting performance problems via similar memory-access patterns (AN, LS, DM, SL), pp. 562–571.
ICSE-2013-Slankas #database #implementation #natural language #policy- Implementing database access control policy from unconstrained natural language text (JS), pp. 1357–1360.
SAC-2013-SouzaRB #clustering #metric #performance- Faster construction of ball-partitioning-based metric access methods (JAdS, HLR, MCNB), pp. 8–12.
CGO-2013-BardizbanyanGWSLMS #performance #using- Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
DATE-2013-ChenL #2d #architecture #memory management- Dual-addressing memory architecture for two-dimensional memory access patterns (YHC, YYL), pp. 71–76.
DATE-2013-LagraaTP #concurrent #data mining #identification #memory management #mining #simulation- Data mining MPSoC simulation traces to identify concurrent memory access patterns (SL, AT, FP), pp. 755–760.
HPDC-2013-NicolaeC #adaptation #incremental #memory management #named- AI-Ckpt: leveraging memory access patterns for adaptive asynchronous incremental checkpointing (BN, FC), pp. 155–166.
TACAS-2013-FerraraMP #analysis #policy #self- Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACAS-2013-KoleiniRR #model checking #policy- Model Checking Agent Knowledge in Dynamic Access Control Policies (MK, ER, MR), pp. 448–462.
CADE-2013-BaaderBL #ontology- Temporalizing Ontology-Based Data Access (FB, SB, ML), pp. 330–344.
ISSTA-2013-ParkHV #comprehension #concurrent #debugging #named- Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugs (SP, MJH, RWV), pp. 134–144.
HT-2012-CostabelloVDG #framework #mobile #named #web- SHI3LD: an access control framework for the mobile web of data (LC, SV, ND, FG), pp. 311–312.
CSMR-2012-GauthierM #case study #concept analysis #modelling- Investigation of Access Control Models with Formal Concept Analysis: A Case Study (FG, EM), pp. 397–402.
ICSM-2012-Song0XS #api- Inferring the data access from the clients of generic APIs (HS, GH, YX, YS), pp. 388–397.
WCRE-2012-GauthierM #detection #performance #php- Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
CHI-2012-KlempererLMSUBCGR #exclamation #using- Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
SEKE-2012-PereiraAS #adaptation #architecture #named- ACADA: Access Control-driven Architecture with Dynamic Adaptation (ÓMP, RLA, MYS), pp. 387–393.
SAC-2012-AnwarF #network #policy #social #visualisation- A visualization tool for evaluating access control policies in facebook-style social network systems (MMA, PWLF), pp. 1443–1450.
SAC-2012-CrassK #coordination- A coordination-based access control model for space-based computing (SC, EK), pp. 1560–1562.
SAC-2012-RajeDFRR #implementation #ontology #using- Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SAC-2012-SchrecklingPH #android #named- Constroid: data-centric access control for android (DS, JP, DH), pp. 1478–1485.
ASPLOS-2012-CheritonFSSA #architecture #named #performance- HICAMP: architectural support for efficient concurrency-safe shared structured data access (DRC, AF, AS, JPS, OA), pp. 287–300.
CGO-2012-MajoG #memory management- Matching memory access patterns and data placement for NUMA systems (ZM, TRG), pp. 230–241.
CGO-2012-MatosevicA #analysis #bottom-up #performance #summary- Efficient bottom-up heap analysis for symbolic path-based data access summaries (IM, TSA), pp. 252–263.
DAC-2012-GhosalLRTPWTA #analysis #data flow #semantics- Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
DATE-2012-StipicTZCUV #hardware #metadata #named #performance- TagTM — accelerating STMs with hardware tags for fast meta-data access (SS, ST, FZ, AC, OSÜ, MV), pp. 39–44.
OSDI-2012-KotlaRRSW #hardware #named #using- Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
ICLP-2012-0002KZPM #approach #logic programming #rdf- A Logic Programming approach for Access Control over RDF (NL, SK, AZ, AP, AM), pp. 381–392.
CHI-2011-EgelmanOK #facebook #fault- Oops, I did it again: mitigating repeated access control errors on facebook (SE, AO, SK), pp. 2295–2304.
CHI-2011-MazurekKSTBC - Exploring reactive access control (MLM, PFK, RS, HT, LB, LFC), pp. 2085–2094.
KEOD-2011-GuerreiroVT #ontology #transaction- Dynamic Business Transactions Control — An Ontological Example: Organizational Access Control with DEMO (SG, AV, JMT), pp. 549–554.
ASE-2011-RobinsonNS #flexibility #named- GitBAC: Flexible access control for non-modular concerns (MR, JN, MS), pp. 500–503.
ESEC-FSE-2011-MontrieuxWY #specification #tool support #uml #verification- Tool support for UML-based specification and verification of role-based access control properties (LM, MW, YY), pp. 456–459.
SAC-2011-CherifIR #collaboration #distributed #editing- Optimistic access control for distributed collaborative editors (AC, AI, MR), pp. 861–868.
SAC-2011-ShiC #authoring #interface #natural language #policy- A controlled natural language interface for authoring access control policies (LLS, DWC), pp. 1524–1530.
DAC-2011-KimS #memory management #named- CuMAPz: a tool to analyze memory access patterns in CUDA (YK, AS), pp. 128–133.
HPDC-2011-ZhangLWK #energy #scheduling- Software-directed data access scheduling for reducing disk energy consumption (YZ, JL, EHW, MTK), pp. 281–282.
ESOP-2011-CairesPSVF #type system- Type-Based Access Control in Data-Centric Systems (LC, JAP, JCS, HTV, LF), pp. 136–155.
CSL-2011-Wolter #constraints #ontology- Ontology-Based Data Access and Constraint Satisfaction (FW), p. 4.
CHI-2010-MazurekABGIJLLOSSVBCGR #social- Access control for home data sharing: evaluating social acceptability (MLM, JPA, JB, NG, II, CJ, DL, YL, JO, BS, RS, KV, LB, LFC, GRG, MKR), pp. 645–654.
ICEIS-DISI-2010-AzevedoPTBC #flexibility #framework- A Flexible Framework for Applying Data Access Authorization Business Rules (LGA, SP, RT, FAB, CC), pp. 275–280.
ICEIS-DISI-2010-BorovskiyKZ #enterprise #flexibility- Flexible Data Access in ERP Systems (VB, WK, AZ), pp. 96–104.
ICEIS-ISAS-2010-BezerraHS #collaboration- An Access Control Model for Massive Collaborative Edition (JdMB, CMH, EMdS), pp. 135–140.
ICEIS-ISAS-2010-ZhangJ #challenge #comprehension #multi- Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments (YZ, JBDJ), pp. 356–361.
ICEIS-J-2010-BorovskiyKZ10a #api #enterprise #query- Business Object Query Language as Data Access API in ERP Systems (VB, WK, AZ), pp. 135–148.
ICPR-2010-ArslanSATY #comparison #image #multi #retrieval- Comparison of Multidimensional Data Access Methods for Feature-Based Image Retrieval (SA, AS, EA, IHT, AY), pp. 3260–3263.
SEKE-2010-ElabdCH #approach #implementation #web #web service- Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control (EE, EC, MSH), pp. 235–240.
SAC-2010-MabuchiSHSK #named- CapaCon: access control mechanism for inter-device communications through TCP connections (MM, YS, KH, AS, KK), pp. 706–712.
SAC-2010-MatthysAHMJH #fine-grained #network #towards- Towards fine-grained and application-centric access control for wireless sensor networks (NM, SRA, CH, SM, WJ, DH), pp. 793–794.
DAC-2010-LeeSC #fine-grained #mobile- Fine-grained I/O access control based on Xen virtualization for 3G/4G mobile devices (SML, SBS, JDC), pp. 108–113.
HPDC-2010-SehrishMWB #framework #named #novel- MRAP: a novel MapReduce-based framework to support HPC analytics applications with access patterns (SS, GM, JW, JB), pp. 107–118.
HPDC-2010-ShibataCT #data-driven #distributed #workflow- File-access patterns of data-intensive workflow applications and their implications to distributed filesystems (TS, SC, KT), pp. 746–755.
FASE-2010-KimLK #approach #configuration management #modelling- A Verifiable Modeling Approach to Configurable Role-Based Access Control (DKK, LL, SK), pp. 188–202.
SIGMOD-2009-BorkarCELRSTW #framework #platform- Access control in the aqualogic data services platform (VRB, MJC, DE, DL, PR, JS, ST, TW), pp. 939–946.
SIGMOD-2009-ViegasW #visualisation- Transforming data access through public visualization (FBV, MW), pp. 3–4.
WCRE-1999-YangPZ99a #concept analysis #feature model #multi #semantics #using- Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
LATA-2009-Moore #documentation #generative #problem- The Halting Problem and Undecidability of Document Generation under Access Control for Tree Updates (NM), pp. 601–613.
KMIS-2009-EvdokimovFK #challenge- Challenges for Access Control in Knowledge Federations (SE, BF, SK), pp. 224–229.
ECOOP-2009-FischerMMM #fine-grained- Fine-Grained Access Control with Object-Sensitive Roles (JF, DM, RM, TDM), pp. 173–194.
CGO-2009-LiWH #evaluation- An Evaluation of Misaligned Data Access Handling Mechanisms in Dynamic Binary Translation Systems (JL, CW, WCH), pp. 180–189.
TACAS-2009-GofmanLSZYS #analysis #named #policy- RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
TestCom-FATES-2009-MarchandDJ #automation #security #testing- Automatic Testing of Access Control for Security Properties (HM, JD, TJ), pp. 113–128.
CBSE-2008-SunHM #validation- Validating Access Control Configurations in J2EE Applications (LS, GH, HM), pp. 64–79.
JCDL-2008-ViegasW - Shakespeare, god, and lonely hearts: transforming data access with many eyes (FBV, MW), pp. 145–146.
SIGMOD-2008-HeS #database #graph #named #query- Graphs-at-a-time: query language and access methods for graph databases (HH, AKS), pp. 405–418.
VLDB-2008-RastogiSW #nondeterminism- Access control over uncertain data (VR, DS, EW), pp. 821–832.
CHI-2008-ToomimZFL #testing- Access control by testing for shared knowledge (MT, XZ, JF, JAL), pp. 193–196.
EDOC-2008-RahamanRS #distributed #documentation #xml- Distributed Access Control For XML Document Centric Collaborations (MAR, YR, AS), pp. 267–276.
ICEIS-DISI-2008-MuldnerML #dataset #policy #xml- Succinct Access Control Policies for Published XML Datasets (TM, JKM, GL), pp. 380–385.
CIKM-2008-RazenteBTFT #approach #metric #novel #optimisation #process #query #similarity- A novel optimization approach to efficiently process aggregate similarity queries in metric access methods (HLR, MCNB, AJMT, CF, CTJ), pp. 193–202.
SEKE-2008-TekbacakTD #approach #certification #security #semantics #using- A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
PPDP-2008-BertolissiF #composition #framework #policy- A rewriting framework for the composition of access control policies (CB, MF), pp. 217–225.
SAC-2008-BuenoTT #algorithm #effectiveness #metric #optimisation- An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
SAC-2008-FonsecaVM #detection #online #using- Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
CGO-2008-KetterlinC #predict #recognition- Prediction and trace compression of data access addresses through nested loop recognition (AK, PC), pp. 94–103.
LCTES-2008-ChoPIDPK #array #compilation #layout #optimisation- Compiler driven data layout optimization for regular/irregular array access patterns (DC, SP, II, ND, YP, SK), pp. 41–50.
FoSSaCS-2008-GargA #logic- A Modal Deconstruction of Access Control Logics (DG, MA), pp. 216–230.
ICST-2008-PretschnerMT #modelling #policy #testing- Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
ICST-2008-TraonMPB #assessment #legacy #testing- Test-Driven Assessment of Access Control in Legacy Applications (YLT, TM, AP, BB), pp. 238–247.
SIGMOD-2007-MurthyS #flexibility #performance- Flexible and efficient access control in oracle (RM, ES), pp. 973–980.
VLDB-2007-VimercatiFJPS #evolution #named #outsourcing- Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
VLDB-2007-Vogels #framework #platform- Data Access Patterns in The Amazon.com Technology Platform (WV), p. 1.
VLDB-2007-WangYLLBIB #correctness #database #fine-grained #on the #relational- On the Correctness Criteria of Fine-Grained Access Control in Relational Databases (QW, TY, NL, JL, EB, KI, JWB), pp. 555–566.
HCI-IPT-2007-HuaP #mobile- WAP Access Methods on Mobile Phones (ZH, CYP), pp. 320–325.
RecSys-2007-FreyneFC #recommendation #social #towards- Toward the exploitation of social access patterns for recommendation (JF, RF, MC), pp. 179–182.
PPDP-2007-Skalka #type safety #virtual machine- Type safe dynamic linking for JVM access control (CS), pp. 51–62.
ICSE-2007-LiuM #uml- Ownership and Immutability Inference for UML-Based Object Access Control (YL, AM), pp. 323–332.
CC-2007-JeonSH #layout #using- Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
PDP-2007-SinghICGC #locality #multi- Multiple-Phase Collective I/O Technique for Improving Data Access Locality (DES, FI, AC, FG, JC), pp. 534–542.
SIGMOD-2006-KabraRS #fine-grained #information management- Redundancy and information leakage in fine-grained access control (GK, RR, SS), pp. 133–144.
SIGMOD-2006-LeeLWZX #mobile- CS cache engine: data access accelerator for location-based service in mobile environments (KCKL, WCL, JW, BZ, JX), pp. 787–789.
SIGMOD-2006-SignerNGBDW #database #mobile- Paper-based mobile access to databases (BS, MCN, MG, RB, CD, NW), pp. 763–765.
VLDB-2006-MohanW #approach #interactive #named- IPAC — An Interactive Approach to Access Control for Semi-structured Data (SM, YW), pp. 1147–1150.
ICALP-v2-2006-JagadeesanJPR #named #programming- λ-RBAC: Programming with Role-Based Access Control (RJ, AJ, CP, JR), pp. 456–467.
ICFP-2006-Abadi #calculus #dependence- Access control in a core calculus of dependency (MA), pp. 263–273.
PEPM-2006-LiuWGRCZZ #implementation #performance- Core role-based access control: efficient implementations by transformations (YAL, CW, MG, TR, YC, YZ, JZ), pp. 112–120.
SAC-2006-DamianiB #architecture- Architectural issues for a location-aware role-based access control system (MLD, EB), pp. 1184–1185.
SAC-2006-ZhaiLL #mobile #statistics #streaming- Statistical buffering for streaming media data access in a mobile environment (JZ, XL, QL), pp. 1161–1165.
DATE-2006-ChenOKK #array #memory management- Dynamic scratch-pad memory management for irregular array access patterns (GC, ÖÖ, MTK, MK), pp. 931–936.
ISSTA-2006-CentonzeNFP #consistency #validation- Role-Based access control consistency validation (PC, GN, SJF, MP), pp. 121–132.
VLDB-2005-BartaCM #multi #query #summary #xml- Benefits of Path Summaries in an XML Query Optimizer Supporting Multiple Access Methods (AB, MPC, AOM), pp. 133–144.
VLDB-2005-LiBRHN #information management- QoS-based Data Access and Placement for Federated Information Systems (WSL, VSB, VR, WH, IN), pp. 1358–1362.
ICEIS-v1-2005-RamachandranSR - Dynamic Pre-fetching of Views Based on User-Access Patterns in an OLAP System (KR, BS, VVR), pp. 60–67.
ICEIS-v3-2005-Henning - Metapolicies and Context-Based Access Control (RRH), pp. 355–359.
ICEIS-v3-2005-NasserBLGB #grid- Access Control Model for Grid Virtual Organizations (BN, AB, RL, FG, FB), pp. 152–158.
ICEIS-v3-2005-WhiteJM #adaptation #ubiquitous- User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments (MW, BJ, SvdM), pp. 349–354.
CIKM-2005-FinanceMP #xml- The case for access control on XML relationships (BF, SM, PP), pp. 107–114.
CIKM-2005-MohanSW #approach #query #xml- Access control for XML: a dynamic query rewriting approach (SM, AS, YW), pp. 251–252.
CIKM-2005-QiKMP #database #xml- A function-based access control model for XML databases (NQ, MK, JM, HP), pp. 115–122.
ECIR-2005-SkopalM #metric #performance- Modified LSI Model for Efficient Search by Metric Access Methods (TS, PM), pp. 245–259.
MoDELS-2005-BordbarDHSW #development #migration #modelling- Integrated Model-Based Software Development, Data Access, and Data Migration (BB, DD, MH, IS, GW), pp. 382–396.
MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #framework #programming #using- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MoDELS-2005-BordbarDHSW #development #migration #modelling- Integrated Model-Based Software Development, Data Access, and Data Migration (BB, DD, MH, IS, GW), pp. 382–396.
MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #framework #programming #using- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
ECOOP-2005-BiermanMS - The Essence of Data Access in Cω (GMB, EM, WS), pp. 287–311.
SAC-2005-AloisioCFQ #architecture- A grid-based architecture for earth observation data access (GA, MC, SF, GQ), pp. 701–705.
SAC-2005-ChinoVTT #comprehension #metric #named #visual notation- MAMView: a visual tool for exploring and understanding metric access methods (FJTC, MRV, AJMT, CTJ), pp. 1218–1223.
HPDC-2005-AnastasiadisWC #flexibility #framework #named- Lerna: an active storage framework for flexible data access and management (SVA, RW, JSC), pp. 176–187.
HPDC-2005-VijayakumarLP #data type #grid #named- Calder: enabling grid access to data streams (NNV, YL, BP), pp. 283–284.
FoSSaCS-2005-BartolettDF #policy- History-Based Access Control with Local Policies (MB, PD, GLF), pp. 316–332.
PODS-2004-NashL #first-order #query- Processing First-Order Queries under Limited Access Patterns (AN, BL), pp. 307–318.
SIGMOD-2004-RizviMSR #fine-grained #query- Extending Query Rewriting Techniques for Fine-Grained Access Control (SR, AOM, SS, PR), pp. 551–562.
VLDB-2004-BouganimNP #documentation #xml- Client-Based Access Control Management for XML documents (LB, FDN, PP), pp. 84–95.
VLDB-2004-RjaibiB #database #implementation #multi #relational- A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems (WR, PB), pp. 1010–1020.
ICGT-2004-Sandhu #graph #modelling- A Perspective on Graphs and Access Control Models (RSS), pp. 2–12.
ICEIS-v3-2004-DomingosRV #perspective #workflow- Workflow Access Control from a Business Perspective (DD, ARS, PV), pp. 18–25.
CIKM-2004-Banaei-KashaniS #named #network #peer-to-peer #product line- SWAM: a family of access methods for similarity-search in peer-to-peer data networks (FBK, CS), pp. 304–313.
CIKM-2004-LuoLLL #fine-grained #named #query #runtime #xml- QFilter: fine-grained run-time XML access control via NFA-based query rewriting (BL, DL, WCL, PL), pp. 543–552.
PEPM-2004-BarkerLV #flexibility #logic programming #performance- Efficient and flexible access control via logic program specialisation (SB, ML, MV), pp. 190–199.
FASE-2004-KimRFL #modelling #uml #using- Modeling Role-Based Access Control Using Parameterized UML Models (DKK, IR, RBF, NL), pp. 180–193.
VLDB-2003-BouganimNPW #encryption- Chip-Secured Data Access: Reconciling Access Rights with Data Encryption (LB, FDN, PP, LW), pp. 1133–1136.
ICFP-2003-HiguchiO #static typing #type system #virtual machine- A static type system for JVM access control (TH, AO), pp. 227–237.
EDOC-2003-BurtBROA #modelling #security #unification- Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control (CCB, BRB, RRR, AMO, MA), pp. 159–173.
ICEIS-v3-2003-DomingosV #adaptation #workflow- A Dynamic Role Based Access Control Model for Adaptive Workflow Management Systems (DD, PV), pp. 167–173.
ICEIS-v3-2003-YangZ #enterprise #xml- An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment (CY, CNZ), pp. 646–649.
CIKM-2003-YeeN #multi #performance #source code- Efficient data access to multi-channel broadcast programs (WGY, SBN), pp. 153–160.
SEKE-2003-LaiLB #database #mining #object-oriented- Mining Access Patterns for Enhancing Navigational Access in Object-Oriented Database (CL, SL, JB), pp. 679–684.
UML-2003-AlghathbarW #case study #consistency #policy- Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
SIGAda-2003-Gantsou #self- A DSA model for data access in self-organizing systems (DG), pp. 25–28.
SAC-2003-YangZ #approach #data flow #object-oriented- An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model (CY, CNZ), pp. 302–306.
LICS-2003-Abadi #logic- Logic in Access Control (MA), p. 228–?.
ECDL-2002-BertinoFP #library #prototype #web- An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration (EB, EF, AP), pp. 656–657.
VLDB-2002-BouganimP - Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
VLDB-2002-KounevB - Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services (SK, APB), pp. 574–585.
VLDB-2002-YuSLJ #performance #xml- Compressed Accessibility Map: Efficient Access Control for XML (TY, DS, LVSL, HVJ), pp. 478–489.
CSCW-2002-StevensW #bound #maintenance- A new dimension in access control: studying maintenance engineering across organizational boundaries (GS, VW), pp. 196–205.
CIKM-2002-ChenLS #categorisation- Categorizing information objects from user access patterns (MC, ASL, JPS), pp. 365–372.
CIKM-2002-TrainaTFF #how #metric- How to improve the pruning ability of dynamic metric access methods (CTJ, AJMT, RFSF, CF), pp. 219–226.
POPL-2002-BanerjeeN #independence #representation- Representation independence, confinement and access control [extended abstract] (AB, DAN), pp. 166–177.
SAC-2002-Ungureanu #e-commerce- An agreement centric access control mechanism for business to business e-commerce (VU), pp. 1160–1164.
FoSSaCS-2002-KochMP #detection #policy #specification- Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
ICLP-2002-Barker #database #deduction #logic programming- Access Control for Deductive Databases by Logic Programming (SB), pp. 54–69.
VLDB-2001-AnSVKIG #behaviour #energy- Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
CIKM-2001-FuCJ #web- Reorganizing Web Sites Based on User Access Patterns (YF, MC, CJ), pp. 583–585.
CIKM-2001-RosenthalW #documentation #question- Document Release versus Data Access Controls: Two Sides of the Same Coin? (AR, GW), pp. 544–546.
CIKM-2001-XiaKCRB #concurrent #database #in memory #memory management #version control- Dynamic Versioning Concurrency Control for Index-Based Data Access in Main Memory Database Systems (YX, SHK, SKC, KWR, HYB), pp. 550–552.
DAC-2001-Dervisoglu #architecture- A Unified DFT Architecture for Use with IEEE 1149.1 and VSIA/IEEE P1500 Compliant Test Access Controllers (BID), pp. 53–58.
HPDC-2001-TerekhovPWLLTVVWS #distributed #resource management- Distributed Data Access and Resource Management in the D0 SAM System (IT, RP, VW, LL, LLC, JT, SV, MV, SW, HS), p. 87–?.
ESOP-2001-PottierSS #approach- A Systematic Approach to Static Access Control (FP, CS, SFS), pp. 30–45.
FoSSaCS-2001-KochMP #approach #graph #policy #specification- Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
PODS-2000-AtallahP #parallel #query- (Almost) Optimal Parallel Block Access for Range Queries (MJA, SP), pp. 205–215.
SIGMOD-2000-BlakeleyD #named #tutorial- Tutorial: Data Access (JAB, AD), p. 579.
CIKM-2000-BertinoHAE #database #video- An Access Control Model for Video Database Systems (EB, MAH, WGA, AKE), pp. 336–343.
SAC-2000-TousidouM #comparison #performance- A Performance Comparison of Quadtree-Based Access Methods for Thematic Maps (ET, YM), pp. 381–388.
HPDC-2000-TerekhovW #distributed #empirical- Distributed Data Access in the Sequential Access Model in the D0 Experiment at Fermilab (IT, VW), pp. 310–311.
HT-1999-Wang #hypermedia- Team-and-RoleBbased Organizational Context and Access Control for Cooperative Hypermedia Environments (WW), pp. 37–46.
SIGMOD-1999-ChakrabartiM #concurrent #multi #performance- Efficient Concurrency Control in Multidimensional Access Methods (KC, SM), pp. 25–36.
SIGMOD-1999-FlorescuLMS #optimisation #query- Query Optimization in the Presence of Limited Access Patterns (DF, AYL, IM, DS), pp. 311–322.
FM-v2-1999-Droschl #requirements #using- Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
ICEIS-1999-FrantiDSS #automaton #using- Using Intelligent Retina with Cellular Automata in Access Control (EF, MD, GS, MS), pp. 219–224.
ICEIS-1999-YooYP #internet- A New Method to Block Access to Illegal and Harmful Content on the Internet (BJY, HGY, MSP), pp. 732–739.
ECOOP-1999-PandeyH #fine-grained #java #source code- Providing Fine-grained Access Control for Java Programs (RP, BH), pp. 449–473.
TOOLS-USA-1999-CrichtonDW #mobile #trust- When to Trust Mobile Objects: Access Control in the Jini(tm) Software System (CC, JD, JW), pp. 116–125.
ADL-1998-ZaianeXH #data mining #mining #roadmap #web- Discovering Web Access Patterns and Trends by Applying OLAP and Data Mining Technology on Web Logs (ORZ, MX, JH), pp. 19–29.
- DL-1998-BaruR #library
- A Hierarchical Access Control Scheme for Digital Libraries (CKB, AR), pp. 275–276.
- DL-1998-BrowneDHMW #repository
- Technologies for Repository Interoperation and Access Control (SB, JD, JH, PM, SW), pp. 40–48.
SIGMOD-1998-BlakeleyP #framework #platform- Microsoft Universal Data Access Platform (JAB, MP), pp. 502–503.
SIGMOD-1998-ReinwaldP #semistructured data #sql- SQL Open Heterogeneous Data Access (BR, HP), pp. 506–507.
SIGMOD-1998-WhiteCF #enterprise #framework #java #platform- Enterprise Java Platform Data Access (SJW, RGGC, SJF), pp. 504–505.
VLDB-1998-MuthOPW #design #implementation #performance- Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
TOOLS-USA-1998-BallH #corba- Data Access and Transportation Services for the CORBA Environment (CHB, SH), p. 269–?.
TOOLS-USA-1998-HsiehPFGB #interactive #object-oriented- The Interaction of Access Control and Object-Orientation in Extensible Systems (WCH, PP, MEF, CG, BNB), pp. 320–332.
PLDI-1998-PaekHP #array #compilation #optimisation- Simplification of Array Access Patterns for Compiler Optimizations (YP, JH, DAP), pp. 60–71.
SIGMOD-1997-JajodiaSSB #framework #multi #policy- A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
VLDB-1997-SellisRF #multi- Multidimensional Access Methods: Trees Have Grown Everywhere (TKS, NR, CF), pp. 13–14.
ICML-1997-SakrLCHG #learning #memory management #modelling #multi #predict- Predicting Multiprocessor Memory Access Patterns with Learning Models (MFS, SPL, DMC, BGH, CLG), pp. 305–312.
SAC-1997-TsaurHC #approach #authentication #distributed #geometry #using- An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
SIGMOD-1996-Blakeley - Data Access for the Masses through OLE DB (JAB), pp. 161–172.
VLDB-1996-BerckenS #multi #query- Query Processing Techniques for Multiversion Access Methods (JVdB, BS), pp. 168–179.
VLDB-1996-BertinoBFS #database #reasoning- Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control (EB, CB, EF, PS), pp. 472–483.
CHI-1995-RoeslerM #online #taxonomy #what- What Help Do Users Need?: Taxonomies for On-Line Information Needs and Access Methods (AWR, SGM), pp. 437–441.
PPoPP-1995-CarlsonD #distributed- Distributed Data Access in AC (WWC, JMD), pp. 39–47.
VLDB-1994-FrohnLU - Access to Objects by Path Expressions and Rules (JF, GL, HU), pp. 273–284.
ASPLOS-1994-SchoinasFLRLW #distributed #memory management- Fine-grain Access Control for Distributed Shared Memory (IS, BF, ARL, SKR, JRL, DAW), pp. 297–306.
SIGMOD-1992-Dozier - Access to Data in NASA’s Earth Observing System (JD), p. 1.
CSCW-1992-ShenD #collaboration- Access Control for Collaborative Environments (HS, PD), pp. 51–58.
OOPSLA-1991-SimmelG #semantics #transaction- The Kala Basket: A Semantic Primitive Unifying Object Transactions, Access Control, Versions, and Configurations (SSS, IG), pp. 230–246.
SIGMOD-1990-KemperM - Access Support in Object Bases (AK, GM), pp. 364–374.
VLDB-1990-DanDY - The Effect of Skewed Data Access on Buffer Hits and Data Contention an a Data Sharing Environment (AD, DMD, PSY), pp. 419–431.
VLDB-1990-KemperM #query #using- Advanced Query Processing in Object Bases Using Access Support Relations (AK, GM), pp. 290–301.
SIGMOD-1989-LometS #multi- Access Methods for Multiversion Data (DBL, BS), pp. 315–324.
SIGIR-1989-ChangLL #clustering #multi- Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
SIGIR-1989-ChristodoulakisF - File Organizations and Access Methods for CLV Optical Disks (SC, DAF), pp. 152–159.
PLDI-1989-BalasundaramK #parallel- A Technique for Summarizing Data Access and Its Use in Parallelism Enhancing Transformations (VB, KK), pp. 41–53.
VLDB-1988-FaloutsosC #comparison #design #performance #scalability- Fast Text Access Methods for Optical and Large Magnetic Disks: Designs and Performance Comparison (CF, RC), pp. 280–293.
VLDB-1988-SeegerK #design #implementation #performance- Techniques for Design and Implementation of Efficient Spatial Access Methods (BS, HPK), pp. 360–371.
SIGMOD-1987-FaloutsosSR #analysis #object-oriented- Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
VLDB-1986-ZandenTB #correlation- Estimating Block Accessses when Attributes are Correlated (BTVZ, HMT, DB), pp. 119–127.
DAC-1985-BarabinoBBM - A module for improving data access and management in an integrated CAD environment (GPB, GSB, GB, MM), pp. 577–583.
VLDB-1984-BrzezinskiGRS #database #named- UNIBASE — An Integrated Access to Databases (ZB, JRG, JR, WS), pp. 388–396.
SIGIR-1984-RabittiZ #documentation #evaluation- Evaluation of Access Methods to Text Document in Office Systems (FR, JZ), pp. 21–40.
DAC-1982-TamminenS #geometry #performance- The excell method for efficient geometric access to data (MT, RS), pp. 345–351.
ICSE-1981-Hulten - An Index Organization for Applications with Highly Skewed Access Patterns (CH), pp. 71–78.
VLDB-1977-Sagalowicz #named- IDA: An Intelligent Data Access Program (DS), pp. 293–302.
VLDB-1976-SenkoA #abstraction #physics- DIAM II and Levels of Abstraction — The Physical Device Level: A General Model for Access Methods (MES, EBA), pp. 79–94.
DIPL-1976-FischerL #runtime- Run-time checking of data access in Pascal-like languages (CNF, RJL), pp. 215–230.
ICSE-1976-JonesL - A Language Extension for Controlling Access to Shared Data (AKJ, BL), p. 235.
SIGFIDET-1972-Parker #information retrieval- File Structures and Access Methods for a Geographic Information Retrieval System (JLP), pp. 383–393.
SIGFIDET-1971-BrowneS - A Model for Access Control (PSB, DDS), pp. 241–262.