Sciweavers

2024 search results - page 172 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
122
Voted
CSFW
1992
IEEE
15 years 7 months ago
Secure Dependencies with Dynamic Level Assignments
Most security models explicitly (or implicitly) include the tranquillity principle which prohibits changing the security level of a given piece of information. Yet in practical sy...
Pierre Bieber, Frédéric Cuppens
119
Voted
GECCO
2009
Springer
15 years 8 months ago
NEAT in increasingly non-linear control situations
Evolution of neural networks, as implemented in NEAT, has proven itself successful on a variety of low-level control problems such as pole balancing and vehicle control. Nonethele...
Matthias J. Linhardt, Martin V. Butz
122
Voted
ACSAC
1999
IEEE
15 years 8 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
125
Voted
GI
2004
Springer
15 years 9 months ago
Process-Based Integration of Heterogeneous Information Sources
: The number of information sources in the Web is growing day by day with a tremendous speed. At the same time, users tend to manage more and more tasks electronically, thereby usi...
Sudhir Agarwal, Peter Haase
129
Voted
ENTCS
2006
123views more  ENTCS 2006»
15 years 3 months ago
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management langua...
Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etal...