Sciweavers

195 search results - page 22 / 39
» Composable Encapsulation Policies
Sort
View
ICWS
2008
IEEE
13 years 8 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
SACMAT
2009
ACM
14 years 1 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 1 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
AAAI
2008
13 years 9 months ago
Economic Hierarchical Q-Learning
Hierarchical state decompositions address the curse-ofdimensionality in Q-learning methods for reinforcement learning (RL) but can suffer from suboptimality. In addressing this, w...
Erik G. Schultink, Ruggiero Cavallo, David C. Park...
RSS
2007
146views Robotics» more  RSS 2007»
13 years 8 months ago
Context and Feature Sensitive Re-sampling from Discrete Surface Measurements
— This paper concerns context and feature-sensitive re-sampling of workspace surfaces represented by 3D point clouds. We interpret a point cloud as the outcome of repetitive and ...
Dave Cole, Paul Newman