Sciweavers

715 search results - page 48 / 143
» On Run-Time Enforcement of Policies
Sort
View
OWLED
2007
13 years 10 months ago
Mother, May I? OWL-based Policy Management at NASA
Abstract. Among the challenges of managing NASA’s information systems is the management (that is, creation, coordination, verification, validation, and enforcement) of many di...
Michael Smith, Andrew Schain, Kendall Clark, Arlen...
POLICY
2004
Springer
14 years 2 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
AGENTCL
2000
Springer
14 years 1 months ago
Constructing Robust Conversation Policies in Dynamic Agent Communities
Conversation policies codify the allowable exchanges of speech acts among agents as they execute specific types of tasks. Both the set of agents in a community, and the nature of...
Marian H. Nodine, Amy Unruh
COMPSAC
2007
IEEE
14 years 28 days ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
CSE
2009
IEEE
13 years 6 months ago
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
Abstract--A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of a...
Michele Barletta, Silvio Ranise, Luca Viganò...