Sciweavers

1627 search results - page 58 / 326
» On context in authorization policy
Sort
View
SGAI
2004
Springer
14 years 1 months ago
Implementing Policy Management through BDI
The requirement for Grid middleware to be largely transparent to individual users and at the same time act in accordance with their personal needs is a difficult challenge. In e-...
Simon Miles, Juri Papay, Michael Luck, Luc Moreau
GRID
2007
Springer
13 years 11 months ago
Global-scale peer-to-peer file services with DFS
The global inter-networking infrastructure that has become essential for contemporary day-to-day computing and communication tasks, has also enabled the deployment of several large...
Antony Chazapis, Georgios Tsoukalas, Georgios Veri...
IOR
2007
95views more  IOR 2007»
13 years 7 months ago
Index Policies for Shooting Problems
We consider a scenario in which a single Red wishes to shoot at a collection of Blue targets, one at a time, to maximise some measure of return obtained from Blues killed before R...
Kevin D. Glazebrook, Christopher Kirkbride, H. M. ...
MATES
2004
Springer
14 years 1 months ago
Policies for Cloned Teleo-reactive Robots
This paper presents a new method for predicting the values of policies for cloned multiple teleo-reactive robots operating in the context of exogenous events. A teleo-reactive robo...
Krysia Broda, Christopher J. Hogger
TRUSTBUS
2010
Springer
13 years 6 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler