Sciweavers

1352 search results - page 79 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
Towards a Theory of Accountability and Audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of ...
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, Jam...
WSC
2000
13 years 10 months ago
An integrated object model for activity network based simulation
This paper describes an object-orientated simulation approach towards an integrated planning of production systems. The main obstacle for an integrated use of simulation over diff...
Gert Zülch, Jörg Fischer, Uwe Jonsson
CCS
2006
ACM
14 years 20 days ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
FASE
2003
Springer
14 years 2 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
ICRA
2008
IEEE
173views Robotics» more  ICRA 2008»
14 years 3 months ago
Bayesian reinforcement learning in continuous POMDPs with application to robot navigation
— We consider the problem of optimal control in continuous and partially observable environments when the parameters of the model are not known exactly. Partially Observable Mark...
Stéphane Ross, Brahim Chaib-draa, Joelle Pi...