Sciweavers

857 search results - page 98 / 172
» A Formal Framework for Adaptive Access Control Models
Sort
View
APWEB
2011
Springer
12 years 11 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
BIS
2009
168views Business» more  BIS 2009»
13 years 8 months ago
Defining Adaptation Constraints for Business Process Variants
Abstract. In current dynamic business environment, it has been argued that certain characteristics of ad-hocism in business processes are desirable. Such business processes typical...
Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori,...
IBPRIA
2009
Springer
14 years 10 days ago
Inference and Learning for Active Sensing, Experimental Design and Control
In this paper we argue that maximum expected utility is a suitable framework for modeling a broad range of decision problems arising in pattern recognition and related fields. Exa...
Hendrik Kück, Matthew Hoffman, Arnaud Doucet,...
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
FGCS
2008
107views more  FGCS 2008»
13 years 7 months ago
Dynamic security context management in Grid-based applications
This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de ...