Sciweavers

1627 search results - page 130 / 326
» On context in authorization policy
Sort
View
ICCBR
2007
Springer
14 years 4 months ago
An Analysis of Case-Based Value Function Approximation by Approximating State Transition Graphs
We identify two fundamental points of utilizing CBR for an adaptive agent that tries to learn on the basis of trial and error without a model of its environment. The first link co...
Thomas Gabel, Martin Riedmiller
WETICE
2006
IEEE
14 years 4 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 12 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
ISAAC
2010
Springer
243views Algorithms» more  ISAAC 2010»
13 years 8 months ago
Lower Bounds for Howard's Algorithm for Finding Minimum Mean-Cost Cycles
Howard's policy iteration algorithm is one of the most widely used algorithms for finding optimal policies for controlling Markov Decision Processes (MDPs). When applied to we...
Thomas Dueholm Hansen, Uri Zwick
CARDIS
2000
Springer
107views Hardware» more  CARDIS 2000»
14 years 2 months ago
JCCap: Capability-based Access Control for Java Card
: This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious ap...
Daniel Hagimont, Jean-Jacques Vandewalle