Sciweavers

715 search results - page 30 / 143
» On Run-Time Enforcement of Policies
Sort
View
DSOM
2006
Springer
13 years 11 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 8 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
AIPS
2008
13 years 10 months ago
Stochastic Enforced Hill-Climbing
Enforced hill-climbing is an effective deterministic hillclimbing technique that deals with local optima using breadth-first search (a process called "basin flooding"). ...
Jia-Hong Wu, Rajesh Kalyanam, Robert Givan
ICSOC
2004
Springer
14 years 29 days ago
An OGSA-based accounting system for allocation enforcement across HPC centers
In this paper, we present an Open Grid Services Architecture (OGSA)-based decentralized allocation enforcement system, developed with an emphasis on a consistent data model and ea...
Thomas Sandholm, Peter Gardfjäll, Erik Elmrot...
ESWS
2010
Springer
14 years 12 days ago
Reactive Policies for the Semantic Web
Semantic Web policies are general statements defining the behavior of a system that acts on behalf of real users. These policies have various applications ranging from dynamic age...
Piero A. Bonatti, Philipp Kärger, Daniel Olme...