Sciweavers

233 search results - page 1 / 47
» Composing and combining policies under the policy machine
Sort
View
120
Voted
SACMAT
2005
ACM
15 years 6 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
112
Voted
ESORICS
2004
Springer
15 years 6 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
111
Voted
PLDI
2005
ACM
15 years 6 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
67
Voted
ICML
1999
IEEE
16 years 1 months ago
Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping
Andrew Y. Ng, Daishi Harada, Stuart J. Russell
110
Voted
BTW
2005
Springer
177views Database» more  BTW 2005»
15 years 6 months ago
Composing Web Services Specifications: Experiences in Implementing Policy-Driven Transactional Processes
: The Web Services architecture defines various specifications that applications may wish to use in combination. In this paper, we investigate the composition of the Web services s...
Stefan Tai