Sciweavers

789 search results - page 36 / 158
» Pushing using Compliance
Sort
View
SACMAT
2010
ACM
15 years 3 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
CSFW
2010
IEEE
15 years 2 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
HRI
2012
ACM
13 years 6 months ago
Designing persuasive robots: how robots might persuade people using vocal and nonverbal cues
Social robots have to potential to serve as personal, organizational, and public assistants as, for instance, diet coaches, teacher’s aides, and emergency respondents. The succe...
Vijay Chidambaram, Yueh-Hsuan Chiang, Bilge Mutlu
SOUPS
2006
ACM
15 years 5 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
84
Voted
ICRA
2008
IEEE
165views Robotics» more  ICRA 2008»
15 years 5 months ago
Macromodel for the mechanics of gecko hair adhesion
—In this work, we explore the mechanical behavior of gecko hairs by means of macromodels. The macromodel has four spatular hairs operating by magnetic forces instead of van der W...
Michael P. Reyes, Ronald S. Fearing