Sciweavers

1150 search results - page 36 / 230
» Specifying Information-Flow Controls
Sort
View
DSRT
2004
IEEE
15 years 5 months ago
An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation
The Experimentation Command and Control Interface (XC2I) project has developed an architecture for a Webservice based viewer/controller for use with distributed simulations suppor...
Katherine L. Morse, Ryan Brunton, J. Mark Pullen, ...
CCS
2008
ACM
15 years 4 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
ACSAC
2003
IEEE
15 years 7 months ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
CDC
2008
IEEE
183views Control Systems» more  CDC 2008»
15 years 2 months ago
Stabilization of infinitesimally rigid formations of multi-robot networks
This paper proposes a local gradient control law to stabilize a group of robots to a target formation. The control is derived from a potential function based on an undirected infin...
Laura Krick, Mireille E. Broucke, Bruce A. Francis
SACMAT
2005
ACM
15 years 7 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...