Sciweavers

5757 search results - page 41 / 1152
» Dynamic Policy Programming
Sort
View
101
Voted
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Maximizing the profit for cache replacement in a transcoding proxy
Recent technology advances in multimedia communication have ushered in a new era of personal communication. Users can ubiquitously access the Internet via various mobile devices. ...
Hao-Ping Hung, Ming-Syan Chen
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 4 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
91
Voted
FOSSACS
2004
Springer
15 years 6 months ago
Reasoning about Dynamic Policies
People often need to reason about policy changes before they are adopted. For example, suppose a website manager knows that users want to enter her site without going through the w...
Riccardo Pucella, Vicky Weissman
94
Voted
IM
2007
15 years 2 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
104
Voted
CSFW
2009
IEEE
15 years 4 months ago
Specification and Analysis of Dynamic Authorisation Policies
This paper presents a language, based on transaction logic, for specifying dynamic authorisation policies, i.e., rules governing actions that may depend on and update the authoris...
Moritz Y. Becker