Sciweavers

230 search results - page 15 / 46
» Exploring reactive access control
Sort
View
143
Voted
NIPS
2004
15 years 5 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
135
Voted
SUTC
2008
IEEE
15 years 10 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
136
Voted
EURONGI
2008
Springer
15 years 5 months ago
Connectivity Gateway Discovery in MANETs
Abstract. The integration of mobile ad hoc networks into IP-based access networks demands the presence of a gateway which is responsible for propagating some configuration paramete...
Antonio J. Yuste, Alicia Triviño-Cabrera, F...
129
Voted
ATAL
2004
Springer
15 years 9 months ago
Embedded Agents for District Heating Management
We investigate the applicability of multi-agent systems as a control approach for district heating systems. The consumers, i.e., the heat exchange systems, in current district hea...
Paul Davidsson, Fredrik Wernstedt
133
Voted
HOTOS
1997
IEEE
15 years 8 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad