Sciweavers

480 search results - page 47 / 96
» policy 2004
Sort
View
IFIP
2004
Springer
15 years 5 months ago
Discretionary Overriding of Access Control in the Privilege Calculus
We extend a particular access control framework, the Privilege Calculus, with a possibility to override denied access for increased flexibility in hard to define or unanticipated...
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...
WG
2004
Springer
15 years 5 months ago
Crossing Reduction in Circular Layouts
We propose a two-phase heuristic for crossing reduction in circular layouts. While the first algorithm uses a greedy policy to build a good initial layout, an adaptation of the si...
Michael Baur, Ulrik Brandes
CSFW
2004
IEEE
15 years 3 months ago
By Reason and Authority: A System for Authorization of Proof-Carrying Code
We present a system, BLF, that combines an authorization logic based on the Binder language with a logical framework, LF, able to express semantic properties of programs. BLF is a...
Nathan Whitehead, Martín Abadi, George C. N...
ACSW
2004
15 years 1 months ago
Defining Security Services for Electronic Tendering
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requir...
Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald
IADIS
2004
15 years 1 months ago
continuing Training Strategies in Europe
This article gives an overview on the development of Continuing Training (CT) strategies in Europe. A review of the existing policies and estimated developments on Information and...
Piedale Carvalho