Sciweavers

1627 search results - page 57 / 326
» On context in authorization policy
Sort
View
IOR
2008
137views more  IOR 2008»
13 years 7 months ago
Optimal Joint Inventory and Transshipment Control Under Uncertain Capacity
In this paper, we address the optimal joint control of inventory and transshipment for a firm that produces in two locations and faces capacity uncertainty. Capacity uncertainty (...
Xinxin Hu, Izak Duenyas, Roman Kapuscinski
RE
2002
Springer
13 years 7 months ago
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy
Privacy has recently become a prominent issue in the context of electronic commerce websites. Increasingly, privacy policies posted on such websites are receiving considerable att...
Annie I. Antón, Julia Brande Earp, Angela R...
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
HICSS
2011
IEEE
210views Biometrics» more  HICSS 2011»
12 years 11 months ago
Different Paths to Broadband Access: The Impact of Governance and Policy on Broadband Diffusion in the Developed and Developing
A new digital divide is emerging both within and between nations that is due to inequalities in broadband Internet access. Our research examines the broadband digital divide by an...
David J. Yates, Girish J. Gulati, Joseph W. Weiss
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...