Sciweavers

1627 search results - page 56 / 326
» On context in authorization policy
Sort
View
CIS
2006
Springer
13 years 11 months ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
AINA
2007
IEEE
13 years 11 months ago
An Agent-Based Architecture for Context-Aware Communication
We propose an agent-based architecture that allows context-aware communication between users. In seeking a model that is suitable for the design of the required functionalities of...
Romelia Plesa, Luigi Logrippo
ACL
2006
13 years 9 months ago
Word Sense Disambiguation Using Lexical Cohesion in the Context
This paper designs a novel lexical hub to disambiguate word sense, using both syntagmatic and paradigmatic relations of words. It only employs the semantic network of WordNet to c...
Dongqiang Yang, David M. W. Powers
HPDC
2010
IEEE
13 years 8 months ago
Cluster-wide context switch of virtualized jobs
Clusters are mostly used through Resources Management Systems (RMS) with a static allocation of resources for a bounded amount of time. Those approaches are known to be insufficie...
Fabien Hermenier, Adrien Lebre, Jean-Marc Menaud
FC
1998
Springer
96views Cryptology» more  FC 1998»
13 years 12 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss