Sciweavers

164 search results - page 18 / 33
» Intelligent High-Security Access Control
Sort
View
AEI
2005
102views more  AEI 2005»
13 years 7 months ago
Manufacturing planning and predictive process model integration using software agents
Intelligent agents provide a means to integrate various manufacturing software applications. The agents are typically executed in a computer-based collaborative environment, refer...
Shaw C. Feng, Keith A. Stouffer, Kevin K. Jurrens
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ICDCSW
2008
IEEE
14 years 2 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar
LATA
2010
Springer
14 years 2 months ago
Using Sums-of-Products for Non-standard Reasoning
Abstract. An important portion of the current research in Description Logics is devoted to the expansion of the reasoning services and the developement of algorithms that can adequ...
Rafael Peñaloza
ICYCS
2008
IEEE
14 years 2 months ago
TNC-UTM: A Holistic Solution to Secure Enterprise Networks
This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway to endpoints. Just as its name suggested, the TNC-UTM solution combines two popular tec...
Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, X...