Sciweavers

195 search results - page 21 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
FLOPS
2006
Springer
15 years 3 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
ENTCS
2006
123views more  ENTCS 2006»
14 years 11 months ago
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management langua...
Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etal...
95
Voted
POLICY
2007
Springer
15 years 5 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
EVOW
2001
Springer
15 years 4 months ago
Evolution of Spiking Neural Controllers for Autonomous Vision-Based Robots
Abstract. We describe a set of preliminary experiments to evolve spiking neural controllers for a vision-based mobile robot. All the evolutionary experiments are carried out on phy...
Dario Floreano, Claudio Mattiussi
WOWMOM
2009
ACM
191views Multimedia» more  WOWMOM 2009»
15 years 6 months ago
Multi-channel spectrum-agile MAC protocol with adaptive load control
Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
Fan Wang, Marwan Krunz