Sciweavers

2024 search results - page 296 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
MEDES
2010
ACM
14 years 10 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
RAID
2004
Springer
15 years 8 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
132
Voted
PIMRC
2010
IEEE
15 years 1 months ago
An implementation of Cognitive Resource Management on LTE platform
Abstract--In this paper we describe an LTE based demonstrator of the Universal Link Layer API (ULLA) and Cognitive Resource Manager (CRM) modules that are developed in ARAGORN proj...
Tao Cai, Georgios P. Koudouridis, Johan Johansson,...
CVGIP
2006
106views more  CVGIP 2006»
15 years 3 months ago
Precomputing avatar behavior from human motion data
Creating controllable, responsive avatars is an important problem in computer games and virtual environments. Recently, large collections of motion capture data have been exploite...
Jehee Lee, Kang Hoon Lee
MCS
2006
Springer
15 years 3 months ago
Architectural concepts and Design Patterns for behavior modeling and integration
The design of the control software for complex systems is a difficult task. It requires the modeling, the simulation, the integration and the adaptation of a multitude of intercon...
Jean-Marc Perronne, Laurent Thiry, Bernard Thirion