Sciweavers

486 search results - page 16 / 98
» policy 2005
Sort
View
FOSSACS
2005
Springer
15 years 3 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
GRID
2005
Springer
15 years 3 months ago
Policy administration control and delegation using XACML and Delegent
Abstract— In this paper we present a system permitting controlled policy administration and delegation using the XACML access control system. The need for these capabilities stem...
Ludwig Seitz, Erik Rissanen, Thomas Sandholm, Baba...
IPOM
2005
Springer
15 years 3 months ago
Policy-Based Fault Management for Integrating IP over Optical Networks
Abstract. In this paper we present a policy-based architecture for aggregating (grooming) IP/MPLS flows (packet-based LSPs) within lightpaths taking into account the possibility o...
Cláudio Carvalho, Edmundo Roberto Mauro Mad...
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 3 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
ICRA
2005
IEEE
159views Robotics» more  ICRA 2005»
15 years 3 months ago
Learning Sensory Feedback to CPG with Policy Gradient for Biped Locomotion
— This paper proposes a learning framework for a CPG-based biped locomotion controller using a policy gradient method. Our goal in this study is to develop an efficient learning...
Takamitsu Matsubara, Jun Morimoto, Jun Nakanishi, ...