Sciweavers

1627 search results - page 54 / 326
» On context in authorization policy
Sort
View
PPDP
2005
Springer
14 years 1 months ago
Security policy in a declarative style
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Rachid Echahed, Frédéric Prost
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
14 years 23 hour ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
ARGMAS
2006
Springer
13 years 9 months ago
Argumentation in Multi-Agent Systems: Context and Recent Developments
This chapter provides a brief survey of argumentation in multi-agent systems. It is not only brief, but rather idiosyncratic, and focuses on the areas of research that most interes...
Nicolas Maudet, Simon Parsons, Iyad Rahwan
TWC
2011
256views more  TWC 2011»
13 years 2 months ago
Contextual Communications Congestion Control for Cooperative Vehicular Networks
—The wide scale deployment of cooperative vehicular ad-hoc networks will require the design of efficient congestion control policies that guarantee stable and reliable communica...
Miguel Sepulcre, Javier Gozálvez, Jé...
EUROSYS
2010
ACM
14 years 22 days ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry