Sciweavers

1236 search results - page 33 / 248
» Efficient Interpretation Policies
Sort
View
CCS
2009
ACM
14 years 9 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
SOCIALCOM
2010
13 years 6 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 2 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
OSDI
2000
ACM
13 years 10 months ago
Performance-Driven Processor Allocation
In current multiprogrammed multiprocessor systems, to take into account the performance of parallel applications is critical to decide an efficient processor allocation. In this pa...
Julita Corbalán, Xavier Martorell, Jes&uacu...
ACL
2010
13 years 6 months ago
Beetle II: A System for Tutoring and Computational Linguistics Experimentation
We present BEETLE II, a tutorial dialogue system designed to accept unrestricted language input and support experimentation with different tutorial planning and dialogue strategie...
Myroslava Dzikovska, Johanna D. Moore, Natalie B. ...