Sciweavers

4217 search results - page 759 / 844
» Computational indistinguishability logic
Sort
View
TDSC
2008
152views more  TDSC 2008»
14 years 9 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
TKDE
2008
177views more  TKDE 2008»
14 years 9 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
KBS
2007
106views more  KBS 2007»
14 years 9 months ago
A cognitive approach for agent-based personalized recommendation
There is an increasing need for various e-service, e-commerce and e-business sites to provide personalized recommendations to on-line customers. This paper proposes a new type of ...
Chunyan Miao, Qiang Yang, Haijing Fang, Angela Goh
CCE
2004
14 years 9 months ago
Optimization under uncertainty: state-of-the-art and opportunities
A large number of problems in production planning and scheduling, location, transportation, finance, and engineering design require that decisions be made in the presence of uncer...
Nikolaos V. Sahinidis
CGF
2004
118views more  CGF 2004»
14 years 9 months ago
Cultural Heritage Preservation Using Constructive Shape Modeling
Issues of digital preservation of shapes and internal structures of historical cultural objects are discussed. An overview of existing approaches to digital preservation related t...
Carl Vilbrandt, Galina Pasko, Alexander A. Pasko, ...