Sciweavers

1876 search results - page 236 / 376
» Language Networks on LiveJournal
Sort
View
POLICY
2009
Springer
16 years 1 hour ago
Abductive Authorization Credential Gathering
A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard’s p...
Moritz Y. Becker, Jason F. Mackay, Blair Dillaway
AINA
2007
IEEE
15 years 11 months ago
Deployment of Services-Oriented Applications Integrating Physical and IT Systems
A broad range of industries must be able to seamlessly integrate control applications using sensors distributed in the real world and IT applications supporting various business a...
Antonin Chazalet, Philippe Lalanda
AINA
2007
IEEE
15 years 11 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
CP
2007
Springer
15 years 11 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
IFIP
2007
Springer
15 years 11 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...