Sciweavers

1040 search results - page 32 / 208
» Controlling Aspect Reentrancy
Sort
View
AICT
2007
IEEE
113views Communications» more  AICT 2007»
15 years 5 months ago
Ontologies to Support Call Control Policies
—The topic of policy-based management is introduced. Its specific application by the ACCENT project to call control is then discussed. The APPEL policy language supports regular ...
Gemma A. Campbell, Kenneth J. Turner
AAAI
2010
15 years 8 days ago
Biologically-Inspired Control for Multi-Agent Self-Adaptive Tasks
Decentralized agent groups typically require complex mechanisms to accomplish coordinated tasks. In contrast, biological systems can achieve intelligent group behaviors with each ...
Chih-Han Yu, Radhika Nagpal
ICWS
2004
IEEE
15 years 6 days ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
DAGSTUHL
2007
15 years 8 days ago
Model-Driven Development for End-Users, too!?
iary models in order to bridge the semantic gap between high-level, abstract user requirements and low-level, concrete programs and to support a stepwise refinement process. This d...
Gregor Engels
ESORICS
2002
Springer
15 years 10 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti