Sciweavers

23988 search results - page 4536 / 4798
» Social Network Computing
Sort
View
POLICY
2005
Springer
15 years 10 months ago
Using Linear Temporal Model Checking for Goal-Oriented Policy Refinement Frameworks
Policy refinement is meant to derive lower-level policies from higher-level ones so that these more specific policies are better suited for use in different execution environments...
Javier Rubio-Loyola, Joan Serrat, Marinos Charalam...
POLICY
2005
Springer
15 years 10 months ago
Deriving Semantic Models from Privacy Policies
Natural language policies describe interactions between and across organizations, third-parties and individuals. However, current policy languages are limited in their ability to ...
Travis D. Breaux, Annie I. Antón
POLICY
2005
Springer
15 years 10 months ago
Embedding Policy Rules for Software-Based Systems in a Requirements Context
Policy rules define what behavior is desired in a softwarebased system, they do not describe the corresponding action and event sequences that actually “produce” desired (“...
Mark Strembeck
POLICY
2005
Springer
15 years 10 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
RAID
2005
Springer
15 years 10 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
« Prev « First page 4536 / 4798 Last » Next »