Sciweavers

89 search results - page 10 / 18
» Implementing Security Policies using the Safe Areas of Compu...
Sort
View
NIPS
2007
13 years 10 months ago
Managing Power Consumption and Performance of Computing Systems Using Reinforcement Learning
Electrical power management in large-scale IT systems such as commercial datacenters is an application area of rapidly growing interest from both an economic and ecological perspe...
Gerald Tesauro, Rajarshi Das, Hoi Chan, Jeffrey O....
EUROSYS
2007
ACM
14 years 20 days ago
Integrating aspect-orientation and structural annotations to support adaptive middleware
To anticipate or not to anticipate -- that is the question, regarding adaptive middleware in the area of ubiquitous computing. Anticipation can guarantee that both the adapted and...
Holger Mügge, Tobias Rho, Armin B. Cremers
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
CCS
2008
ACM
13 years 10 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
ISSA
2004
13 years 10 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha