Sciweavers

573 search results - page 69 / 115
» The Policy Machine for Security Policy Management
Sort
View
CIDR
2009
126views Algorithms» more  CIDR 2009»
14 years 11 months ago
Declarative Reconfigurable Trust Management
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement ...
William R. Marczak, David Zook, Wenchao Zhou, Molh...
AICCSA
2008
IEEE
222views Hardware» more  AICCSA 2008»
14 years 12 months ago
Managing access and flow control requirements in distributed workflows
Abstract. Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
WPES
2004
ACM
15 years 3 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
CCS
2006
ACM
15 years 1 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
14 years 11 months ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon