Sciweavers

1316 search results - page 6 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
WPES
2003
ACM
15 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 1 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
UAI
1998
14 years 11 months ago
An Anytime Algorithm for Decision Making under Uncertainty
We present an anytime algorithm which computes policies for decision problems represented as multi-stage influence diagrams. Our algorithm constructs policies incrementally, start...
Michael C. Horsch, David Poole
DKE
2007
151views more  DKE 2007»
14 years 9 months ago
Towards a context-based multi-type policy approach for Web services composition
The objective of this research work is to look into the role of policies and context in framing the composition of Web services. Context supports the development of adaptable Web ...
Zakaria Maamar, Djamal Benslimane, Philippe Thiran...
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 4 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...