Sciweavers

1627 search results - page 19 / 326
» On context in authorization policy
Sort
View
HPCC
2007
Springer
13 years 11 months ago
Business Model and the Policy of Mapping Light Communication Grid-Based Workflow Within the SLA Context
In the business Grid environment, the business relationship between a customer and a service provider should be clearly defined. The responsibility of each partner can be stated in...
Dang Minh Quan, Jörn Altmann
CIS
2007
Springer
14 years 1 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang
WWW
2004
ACM
14 years 8 months ago
Using context- and content-based trust policies on the semantic web
The current discussion about a future Semantic Web trust architecture is focused on reputational trust mechanisms based on explicit trust ratings. What is often overlooked is the ...
Christian Bizer, Radoslaw Oldakowski
AISS
2010
114views more  AISS 2010»
13 years 5 months ago
Context Awareness Information Sharing Service based on Location-based Communication Policy
Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both informat...
Yih-Jiun Lee
PERCOM
2005
ACM
14 years 7 months ago
Policy-Driven Data Dissemination for Context-Aware Applications
Context-aware pervasive-computing applications require continuous monitoring of their physical and computational environment to make appropriate adaptation decisions in time. The ...
Guanling Chen, David Kotz