Sciweavers

565 search results - page 92 / 113
» A logic for authorization provenance
Sort
View
ICOIN
2004
Springer
14 years 2 months ago
On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs
Abstract. In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs [1]. Almost all existing VPN technologies assume that users...
Yoshihiro Hara, Hiroyuki Ohsaki, Makoto Imase, Yos...
INEX
2004
Springer
14 years 2 months ago
The Utrecht Blend: Basic Ingredients for an XML Retrieval System
Exploiting the structure of a document allows for more powerful information retrieval techniques. In this article a basic approach is discussed for the retrieval of XML document f...
Roelof van Zwol, Frans Wiering, Virginia Dignum
JELIA
2004
Springer
14 years 2 months ago
Hierarchical Decision Making by Autonomous Agents
Abstract. Often, decision making involves autonomous agents that are structured in a complex hierarchy, representing e.g. authority. Typically the agents share the same body of kno...
Stijn Heymans, Davy Van Nieuwenborgh, Dirk Vermeir
COOPIS
2002
IEEE
14 years 1 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
ICFP
2000
ACM
14 years 1 months ago
The duality of computation
We review the close relationship between abstract machines for (call-by-name or call-by-value) λ-calculi (extended with Felleisen’s C) and sequent calculus, reintroducing on the...
Pierre-Louis Curien, Hugo Herbelin