Sciweavers

926 search results - page 125 / 186
» Policy framings for access control
Sort
View
EWRL
2008
15 years 3 days ago
Regularized Fitted Q-Iteration: Application to Planning
We consider planning in a Markovian decision problem, i.e., the problem of finding a good policy given access to a generative model of the environment. We propose to use fitted Q-i...
Amir Massoud Farahmand, Mohammad Ghavamzadeh, Csab...
ICISC
2007
105views Cryptology» more  ICISC 2007»
14 years 11 months ago
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the esta...
Jinwei Hu, Ruixuan Li, Zhengding Lu
IANDC
2008
140views more  IANDC 2008»
14 years 10 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
WPES
2003
ACM
15 years 3 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
IMC
2005
ACM
15 years 3 months ago
Facilitating Access Point Selection in IEEE 802.11 Wireless Networks
The performance experienced by wireless clients in IEEE 802.11 wireless networks heavily depends on the clients’ ability to identify the Access Point (AP) that will offer the be...
Sudarshan Vasudevan, Konstantina Papagiannaki, Chr...