Sciweavers

182 search results - page 29 / 37
» A Decentralized Model for Information Flow Control
Sort
View
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
JVCA
2002
180views more  JVCA 2002»
13 years 7 months ago
A programming environment for behavioural animation
Behavioural models offer the ability to simulate autonomous agents like organisms and living beings. Psychological studies have showed that the human behaviour can be described by...
Frédéric Devillers, Stéphane ...
JUCS
2008
120views more  JUCS 2008»
13 years 7 months ago
An Adaptation Logic Framework for Java-based Component Systems
Abstract: This paper describes a Java-based framework for developing componentbased software systems supporting adaptation with logic laws and considering component interactions as...
Enrico Oliva, Antonio Natali, Alessandro Ricci, Mi...
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
P2P
2006
IEEE
229views Communications» more  P2P 2006»
14 years 1 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...