Sciweavers

687 search results - page 76 / 138
» A Self-Policing Policy Language
Sort
View
TKDE
2008
177views more  TKDE 2008»
15 years 1 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TLT
2008
149views more  TLT 2008»
15 years 1 months ago
Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...
CN
2000
76views more  CN 2000»
15 years 1 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
MIDDLEWARE
2000
Springer
15 years 5 months ago
Customization of Object Request Brokers by Application Specific Policies
This paper presents an architectural framework for customizing Object Request Broker (ORB) implementations to application-specific preferences for various non-functional requiremen...
Bo Nørregaard Jørgensen, Eddy Truyen...
DOA
2000
87views more  DOA 2000»
15 years 3 months ago
MODE: A Java-like Environment for Experimenting Mobility Policies
The wide acceptance of object-oriented environments and proposals has renewed interest in all the class inheritance related issues; in particular its implementation in distributed...
Giuliano Armano, Antonio Corradi, Letizia Leonardi...