Sciweavers

1627 search results - page 45 / 326
» On context in authorization policy
Sort
View
WIS
2004
13 years 9 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
ICAS
2008
IEEE
190views Robotics» more  ICAS 2008»
14 years 2 months ago
A Survey of Context Adaptation in Autonomic Computing
—Autonomic Computing (AC) is an emerging paradigm aiming at simplifying the administration of complex computer systems. Efforts required to deploy and maintain complex systems ar...
Cornel Klein, Reiner N. Schmid, Christian Leuxner,...
XMLSEC
2003
ACM
14 years 26 days ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
NIPS
2008
13 years 9 months ago
MDPs with Non-Deterministic Policies
Markov Decision Processes (MDPs) have been extensively studied and used in the context of planning and decision-making, and many methods exist to find the optimal policy for probl...
Mahdi Milani Fard, Joelle Pineau
CORR
2011
Springer
161views Education» more  CORR 2011»
12 years 11 months ago
Doubly Robust Policy Evaluation and Learning
We study decision making in environments where the reward is only partially observed, but can be modeled as a function of an action and an observed context. This setting, known as...
Miroslav Dudík, John Langford, Lihong Li