Sciweavers

1627 search results - page 101 / 326
» On context in authorization policy
Sort
View
EUROSEC
2009
ACM
14 years 5 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
ESORICS
2007
Springer
14 years 5 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
FLAIRS
1998
14 years 4 days ago
Function Modeling for an Integrated Framework: A Progress Report
This paper discusses some preliminary results of the author's on-going research into the representation of product function information for integrated knowledge-based environ...
Filippo A. Salustri
IEEEPACT
2008
IEEE
14 years 5 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
PERCOM
2007
ACM
14 years 10 months ago
Context Aware Routing of Enterprise User Communications
This paper develops a context aware framework to address the diverse communication needs of a modern enterprise. Such enterprises are characterized by workers in different locatio...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...