Sciweavers

1236 search results - page 38 / 248
» Efficient Interpretation Policies
Sort
View
CCS
2009
ACM
14 years 9 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
JMLR
2010
103views more  JMLR 2010»
13 years 3 months ago
Regret Bounds and Minimax Policies under Partial Monitoring
This work deals with four classical prediction settings, namely full information, bandit, label efficient and bandit label efficient as well as four different notions of regret: p...
Jean-Yves Audibert, Sébastien Bubeck
EUROSEC
2009
ACM
14 years 3 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
CCS
2006
ACM
14 years 15 days ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
WWW
2008
ACM
14 years 9 months ago
An Effective Aggregation Policy for RSS Services
RSS is the XML-based format for syndication of Web contents and users aggregate RSS feeds with RSS feed aggregators. As the usage of RSS service has been diffused, it is crucial to...
Jae Hwi Kim, Sang Ho Lee, Young Geun Han