Sciweavers

2335 search results - page 309 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
160
Voted
ICFP
2010
ACM
15 years 3 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
109
Voted
CCR
2007
168views more  CCR 2007»
15 years 2 months ago
Challenges in peer-to-peer gaming
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games a...
Christoph Neumann, Nicolas Prigent, Matteo Varvell...
128
Voted
ATAL
2009
Springer
15 years 9 months ago
Integrating organizational control into multi-agent learning
Multi-Agent Reinforcement Learning (MARL) algorithms suffer from slow convergence and even divergence, especially in largescale systems. In this work, we develop an organization-b...
Chongjie Zhang, Sherief Abdallah, Victor R. Lesser
118
Voted
CAISE
2010
Springer
15 years 2 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
113
Voted
EDBTW
2004
Springer
15 years 6 months ago
Semantic Web Recommender Systems
Research on recommender systems has primarily addressed centralized scenarios and largely ignored open, decentralized systems where remote information distribution prevails. Absenc...
Cai-Nicolas Ziegler