Sciweavers

1627 search results - page 55 / 326
» On context in authorization policy
Sort
View
HICSS
2010
IEEE
176views Biometrics» more  HICSS 2010»
13 years 9 months ago
Development of the Smart Grid: Missing Elements in the Policy Process
This paper seeks to frame one aspect of the Smart Grid discussion which has been under-recognized in regulatory and policy debates. Significant discussion has focused Smart Grid a...
Richard D. Tabors, Geoffrey Parker, Michael C. Car...
WOA
2003
13 years 9 months ago
Policy Management for Virtual Communities of Agents
— In this paper we study the rational balance between local and global policies in virtual communities of agents. To study this problem we use a logical framework for modelling o...
Guido Boella, Leendert W. N. van der Torre
COMPSAC
2000
IEEE
14 years 2 days ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
HUC
2007
Springer
14 years 1 months ago
An Empirical Study of the Potential for Context-Aware Power Management
Context-aware power management (CAPM) uses context (e.g., user location) likely to be available in future ubiquitous computing environments, to effectively power manage a building...
Colin Harris, Vinny Cahill
ACSAC
2002
IEEE
14 years 19 days ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...