Sciweavers

5757 search results - page 85 / 1152
» Dynamic Policy Programming
Sort
View
153
Voted
CODES
2005
IEEE
15 years 8 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
141
Voted
JMLR
2006
124views more  JMLR 2006»
15 years 2 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos
SCS
2001
15 years 4 months ago
Improved Acquisition Processes for Safety-Critical Systems in the Australian Department of Defence
This paper describes recently developed policy and procedures for safety management during system acquisition within the Australian government's Defence Materiel Organisation...
Peter A. Lindsay
116
Voted
TRUSTBUS
2007
Springer
15 years 8 months ago
Recognition of Authority in Virtual Organisations
Abstract. A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information...
Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser
FOSSACS
2005
Springer
15 years 8 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...