Sciweavers

1627 search results - page 83 / 326
» On context in authorization policy
Sort
View
ACMSE
2009
ACM
14 years 1 months ago
Towards policy driven self-configuration of user-centric communication
The convergence of various multimedia communications that includes voice, video and data presents many opportunities for enabling unified communication but paradoxically leads to ...
Paola Boettner, Mansi Gupta, Yali Wu, Andrew A. Al...
CCS
2008
ACM
13 years 11 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
NIPS
2008
13 years 11 months ago
Policy Search for Motor Primitives in Robotics
Many motor skills in humanoid robotics can be learned using parametrized motor primitives as done in imitation learning. However, most interesting motor learning problems are high...
Jens Kober, Jan Peters
DBSEC
2006
86views Database» more  DBSEC 2006»
13 years 11 months ago
Enhancing User Privacy Through Data Handling Policies
The protection of privacy is an increasing concern in today's global infrastructure. One of the most important privacy protection principles states that personal information c...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
TDSC
2008
152views more  TDSC 2008»
13 years 9 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...