Sciweavers

48 search results - page 8 / 10
» Deriving implementation-level policies for usage control enf...
Sort
View
ARESEC
2011
145views more  ARESEC 2011»
12 years 5 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
POPL
2008
ACM
14 years 6 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
IEEEARES
2008
IEEE
14 years 1 days ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
AAMAS
2005
Springer
13 years 11 months ago
Towards Time Management Adaptability in Multi-agent Systems
Abstract. So far, the main focus of research on adaptability in multiagent systems (MASs) has been on the agents’ behavior, for example on developing new learning techniques and ...
Alexander Helleboogh, Tom Holvoet, Danny Weyns, Yo...
USS
2004
13 years 7 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...