Sciweavers

3899 search results - page 2 / 780
» Argumentation for Access Control
Sort
View
ECAI
2010
Springer
13 years 6 months ago
ABA: Argumentation Based Agents
Abstract. Many works have identified the potential benefits of using argumentation to address a large variety of multiagent problems. In this paper we take this idea one step furth...
Antonis C. Kakas, Leila Amgoud, Gabriele Kern-Isbe...
FROCOS
2009
Springer
13 years 11 months ago
Argument Filterings and Usable Rules for Simply Typed Dependency Pairs
d abstract) Takahito Aoto† Toshiyuki Yamada‡
Takahito Aoto, Toshiyuki Yamada
TSE
2008
107views more  TSE 2008»
13 years 4 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
RBAC
1997
234views more  RBAC 1997»
13 years 6 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley
ICC
2009
IEEE
196views Communications» more  ICC 2009»
13 years 11 months ago
Joint Flow Control, Routing and Medium Access Control in Random Access Multi-Hop Wireless Networks
This work extends the existing static framework for joint flow control, routing and medium access control (MAC) in random access multi-hop wireless networks to a dynamic framewor...
Sucha Supittayapornpong, Poompat Saengudomlert