Sciweavers

7839 search results - page 309 / 1568
» What's there and what's not
Sort
View
COMPSAC
2007
IEEE
15 years 5 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
IJCAI
2007
15 years 3 months ago
Learning from Partial Observations
We present a general machine learning framework for modelling the phenomenon of missing information in data. We propose a masking process model to capture the stochastic nature of...
Loizos Michael
77
Voted
ECIS
2004
15 years 3 months ago
Patterns in Application Development Sourcing in the Financial Industry
Sourcing, or the question of what a company should carry out in-house and what should be acquired elsewhere, has been discussed for quite some time. This paper addresses the sourc...
Anders Mårtensson
NETWORKING
2000
15 years 3 months ago
Fairness and Aggregation: A Primal Decomposition Study
Abstract. We examine the fair allocation of capacity to a large population of best-effort connections in a typical multiple access communication system supporting some bandwidth on...
André Girard, Catherine Rosenberg, Mohammed...
FC
2010
Springer
150views Cryptology» more  FC 2010»
15 years 2 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner