Sciweavers

3523 search results - page 64 / 705
» Feature interaction in policies
Sort
View
EDOC
1997
IEEE
14 years 2 months ago
A Policy Based Role Object Model
Enterprise roles define the duties and responsibilities of the individuals which are assigned to them. This paper introduces a framework for the management of large distributed sy...
Emil Lupu, Morris Sloman
CSFW
2012
IEEE
12 years 15 days ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
PDCAT
2004
Springer
14 years 3 months ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
DCOSS
2011
Springer
12 years 10 months ago
Transmission Control Policy design for decentralized detection in sensor networks
—A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled...
Ashraf Tantawy, Xenofon D. Koutsoukos, Gautam Bisw...
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
14 years 4 months ago
Does Visualization Affect Perceptions of Ethically Complex Policy Decisions: An Experimental Study
Visualization as a communication medium is an important factor when considering how individuals are influenced in a decision about a complex policy issue. Age, race and gender may...
Deirdre Hahn, Rick Shangraw, Mark Keith, David H. ...