Sciweavers

1627 search results - page 65 / 326
» On context in authorization policy
Sort
View
POLICY
2007
Springer
14 years 3 months ago
On Automated Policy Generation for Mobile Ad Hoc Networks
In this paper we describe an approach to the problem of automated policy generation for mobile ad hoc networks. The automated policy generation problem is difficult in its own rig...
Cho-Yu Jason Chiang, Gary Levin, Yitzchak Gottlieb...
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 9 months ago
Towards Adaptable and Adaptive Policy-Free Middleware
We believe that to fully support adaptive distributed applications, middleware must itself be adaptable, adaptive and policy-free. In this paper we present a new language-independ...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...
SGAI
2007
Springer
14 years 3 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...
ESWS
2006
Springer
14 years 1 months ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...
ITNG
2007
IEEE
14 years 3 months ago
A Mobile Context Dissemination Middleware
Context information is one of the most important data coming from mobile devices to add a value for the application execution. This paper introduces a context dissemination middle...
Guido Gehlen, Fahad Aijaz, Muhammad Sajjad, Bernha...