Sciweavers

8278 search results - page 1453 / 1656
» Context-Aware Process Networks
Sort
View
POLICY
2005
Springer
15 years 9 months ago
Deriving Semantic Models from Privacy Policies
Natural language policies describe interactions between and across organizations, third-parties and individuals. However, current policy languages are limited in their ability to ...
Travis D. Breaux, Annie I. Antón
POLICY
2005
Springer
15 years 9 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
111
Voted
POLICY
2005
Springer
15 years 9 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
117
Voted
RAID
2005
Springer
15 years 9 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
TBILLC
2005
Springer
15 years 9 months ago
Real World Multi-agent Systems: Information Sharing, Coordination and Planning
Abstract. Applying multi-agent systems in real world scenarios requires several essential research questions to be answered. Agents have to perceive their environment in order to t...
Frans C. A. Groen, Matthijs T. J. Spaan, Jelle R. ...
« Prev « First page 1453 / 1656 Last » Next »