Sciweavers

700 search results - page 108 / 140
» Combinations of Stit and Actions
Sort
View
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 11 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
WI
1989
13 years 11 months ago
Incremental Natural Language Description of Dynamic Imagery
Although image understanding and natural language processing constitute two major areas of AI, they have mostly been studied independentlyof each other. Only a few attempts have b...
Gerd Herzog, C.-K. Sung, Elisabeth André, W...
ATAL
2006
Springer
13 years 11 months ago
Learning executable agent behaviors from observation
We present a method for learning a human understandable, executable model of an agent's behavior using observations of its interaction with the environment. By executable we ...
Andrew Guillory, Hai Nguyen, Tucker R. Balch, Char...
ESORICS
2004
Springer
13 years 11 months ago
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
Abstract. We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarif...
David von Oheimb
DGCI
2006
Springer
13 years 11 months ago
Improving Difference Operators by Local Feature Detection
Differential operators are required to compute several characteristics for continuous surfaces, as e.g. tangents, curvature, flatness, shape descriptors. We propose to replace diff...
Kristof Teelen, Peter Veelaert