Sciweavers

20 search results - page 3 / 4
» A High-Level Policy Description Language for the Network ACL
Sort
View
ESORICS
2000
Springer
13 years 9 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ACL
1989
13 years 7 months ago
The Lexical Semantics of Comparative Expressions in a Multi-Level Semantic Processor
Comparative expressions (CEs) such as "bigger than" and "more oranges than" are highly ambiguous, and their meaning is context dependent. Thus, they pose probl...
Duane E. Olawsky
EACL
1993
ACL Anthology
13 years 7 months ago
Ambiguity resolution in a reductionistic parser
We are concerned with dependencyoriented morphosyntactic parsing of running text. While a parsing grammar should avoid introducing structurallyunresolvable distinctionsin order to...
Atro Voutilainen, Pasi Tapanainen
PERCOM
2005
ACM
14 years 5 months ago
Middleware for User Controlled Environments
In this paper, we describe the middleware that has evolved from our attempt to capture user descriptions of policies controlling devices and services from natural language. Descri...
Bill Keller, Tim Owen, Ian Wakeman, Julie Weeds, D...
ICTAC
2005
Springer
13 years 11 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...