Sciweavers

687 search results - page 80 / 138
» A Self-Policing Policy Language
Sort
View
IFIP
2010
Springer
13 years 3 months ago
Autonomic Approach to Planning and Scheduling in Networked Small Factories
The paper considers the complex behavior of a small company in a business ecosystem, time by time leader or supplier or both in one or more supply chains, and points out the data e...
Flavio Bonfatti, Luca Martinelli, Paola Daniela Mo...
IJSEKE
2011
165views more  IJSEKE 2011»
13 years 13 days ago
Model Checking for Verification of Mandatory Access Control Models and Properties
rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a stan...
Vincent C. Hu, D. Richard Kuhn, Tao Xie, JeeHyun H...
TON
2012
11 years 11 months ago
Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis
—The deployment of cognitive radio networks enables efficient spectrum sharing and opportunistic spectrum access. It also presents new challenges to the classical problem of int...
Siamak Sorooshyari, Chee Wei Tan, Mung Chiang
CCS
2006
ACM
14 years 22 days ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
DAGSTUHL
2003
13 years 10 months ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec