Sciweavers

5723 search results - page 1025 / 1145
» Network Management
Sort
View
ISSADS
2004
Springer
15 years 9 months ago
Evaluating Location Dependent Queries Using ISLANDS
The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new application...
Marie Thilliez, Thierry Delot
144
Voted
KES
2004
Springer
15 years 9 months ago
Epistemic Logic and Planning
Artificial Intelligence algorithms can be divided into two groups according to the type of problems they solve. Knowledge-intensive domains contain explicit knowledge, whereas know...
Shahin Maghsoudi, Ian Watson
POLICY
2004
Springer
15 years 9 months ago
A Goal-based Approach to Policy Refinement
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of p...
Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett,...
POLICY
2004
Springer
15 years 9 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
138
Voted
POLICY
2004
Springer
15 years 9 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
« Prev « First page 1025 / 1145 Last » Next »