Sciweavers

3523 search results - page 14 / 705
» Feature interaction in policies
Sort
View
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 8 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
ICDCS
1999
IEEE
14 years 1 months ago
Proxy Cache Coherency and Replacement - Towards a More Complete Picture
This work studies the interaction of Web proxy cache coherency and replacement policies using trace-driven simulations. We specifically examine the relative importance of each typ...
Balachander Krishnamurthy, Craig E. Wills
ACSAC
1996
IEEE
14 years 29 days ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
POLICY
2004
Springer
14 years 2 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
SAB
2010
Springer
187views Optimization» more  SAB 2010»
13 years 7 months ago
Learning Robot-Environment Interaction Using Echo State Networks
Learning robot-environment interaction with echo state networks (ESNs) is presented in this paper. ESNs are asked to bootstrap a robot’s control policy from human teacher’s dem...
Mohamed Oubbati, Bahram Kord, Günther Palm