Sciweavers

798 search results - page 133 / 160
» Comparing the expressive power of access control models
Sort
View
DANCE
2002
IEEE
14 years 3 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
JUCS
2006
86views more  JUCS 2006»
13 years 10 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
CEEMAS
2005
Springer
14 years 3 months ago
MAS Meta-models on Test: UML vs. OPM in the SODA Case Study
In the AOSE (Agent-Oriented Software Engineering) area, several research efforts are underway to develop appropriate meta-models for agent-oriented methodologies. Meta-models are ...
Ambra Molesini, Enrico Denti, Andrea Omicini
SLP
1994
77views more  SLP 1994»
13 years 11 months ago
Modal Event Calculus
We consider a hierarchy of modal event calculi to represent and reason about partially ordered events. These calculi are based on the model of time and change of Kowalski and Sergo...
Iliano Cervesato, Luca Chittaro, Angelo Montanari
GCB
2008
Springer
103views Biometrics» more  GCB 2008»
13 years 11 months ago
Utilizing Promoter Pair Orientations for HMM-based Analysis of ChIP-chip Data
: Array-based analysis of chromatin immunoprecipitation data (ChIP-chip) is a powerful technique for identifying DNA target regions of individual transcription factors. Here, we pr...
Michael Seifert, Jens Keilwagen, Marc Strickert, I...