Sciweavers

705 search results - page 20 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
14 years 10 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
NCA
2007
IEEE
15 years 4 months ago
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconn...
Alysson Neves Bessani, Miguel Correia, Joni da Sil...
ACSAC
1999
IEEE
15 years 2 months ago
Napoleon: A Recipe for Workflow
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...
ATAL
2007
Springer
15 years 4 months ago
Distributed coordination in uncertain multiagent systems
We consider real-time multi-agent coordination in a dynamic and uncertain domain addressing both distributed state information and partial knowledge of the common reward function....
Rajiv T. Maheswaran, Craig Milo Rogers, Romeo Sanc...
JCP
2008
116views more  JCP 2008»
14 years 10 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...