Sciweavers

1627 search results - page 79 / 326
» On context in authorization policy
Sort
View
ICIS
2003
13 years 11 months ago
A Computational Approach to Compare Information Revelation Policies
Revelation policies in an e-marketplace differ in terms of the level of competitive information disseminated to participating sellers. Since sellers who repeatedly compete against...
Amy R. Greenwald, Karthik Kannan, Ramayya Krishnan
DAIS
2007
13 years 11 months ago
Scalable Processing of Context Information with COSMOS
Abstract. Ubiquitous computing environments are characterised by a high number of heterogenous devices that generate a huge amount of context data. These data are used, for example...
Denis Conan, Romain Rouvoy, Lionel Seinturier
COMPSAC
2004
IEEE
14 years 1 months ago
Testing Context-Sensitive Middleware-Based Software Applications
Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application. The components of such software communicate proactively among themselves accor...
T. H. Tse, Stephen S. Yau, W. K. Chan, Heng Lu, Ts...
GLOBECOM
2007
IEEE
14 years 4 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
RULEML
2005
Springer
14 years 3 months ago
A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery
Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (...
Jinghai Rao, Norman M. Sadeh