Sciweavers

144 search results - page 7 / 29
» Modeling conversation policies using permissions and obligat...
Sort
View
ICC
2007
IEEE
15 years 3 months ago
A Grammar for Specifying Usage Control Policies
—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently propose...
Rafael Teigao, Carlos Maziero, Altair Olivo Santin
ISW
2004
Springer
15 years 2 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
88
Voted
RBAC
1997
135views more  RBAC 1997»
14 years 10 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
ICMI
2005
Springer
267views Biometrics» more  ICMI 2005»
15 years 3 months ago
XfaceEd: authoring tool for embodied conversational agents
In this paper, XfaceEd, our open source, platform independent tool for authoring 3D embodied conversational agents (ECAs) is presented. Following MPEG-4 Facial Animation (FA) stan...
Koray Balci
KR
2004
Springer
15 years 2 months ago
Regulative and Constitutive Norms in Normative Multiagent Systems
In this paper we introduce a formal framework for the construction of normative multiagent systems, based on Searle’s notion of the construction of social reality. Within the st...
Guido Boella, Leendert W. N. van der Torre