Sciweavers

370 search results - page 47 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
DOA
2001
94views more  DOA 2001»
15 years 3 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
SACMAT
2009
ACM
15 years 8 months ago
A decision support system for secure information sharing
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi,...
PRL
2010
100views more  PRL 2010»
15 years 9 days ago
Extraction of building polygons from SAR images: Grouping and decision-level in the GESTALT system
The GESTALT-System is a stratified architecture for challenging computer vision tasks. This contribution focuses on the 3rd and 4th layer of it – the grouping and decision layer...
Eckart Michaelsen, Uwe Stilla, Uwe Soergel, Leo J....
PLDI
2009
ACM
15 years 8 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
CAISE
2010
Springer
15 years 2 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...