Sciweavers

1998 search results - page 90 / 400
» Situated Control Rules
Sort
View
AIIA
2005
Springer
15 years 6 months ago
Argumentation for Access Control
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 4 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
TWC
2008
176views more  TWC 2008»
15 years 3 months ago
Asynchronous distributed power and rate control in ad hoc networks: a game-theoretic approach
This paper analyzes distributed asynchronous power and rate control for wireless ad hoc networks. Importantly, all network transmitters are considered to be independent of any mana...
Stepán Kucera, Sonia Aïssa, Koji Yamam...
PIMRC
2008
IEEE
15 years 10 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
SIGECOM
2006
ACM
88views ECommerce» more  SIGECOM 2006»
15 years 10 months ago
Implementation with a bounded action space
While traditional mechanism design typically assumes isomorphism between the agents’ type- and action spaces, in many situations the agents face strict restrictions on their act...
Liad Blumrosen, Michal Feldman