Sciweavers

1627 search results - page 86 / 326
» On context in authorization policy
Sort
View
CASES
2008
ACM
13 years 11 months ago
Execution context optimization for disk energy
Power, energy, and thermal concerns have constrained embedded systems designs. Computing capability and storage density have increased dramatically, enabling the emergence of hand...
Jerry Hom, Ulrich Kremer
TSI
2008
129views more  TSI 2008»
13 years 9 months ago
COSMOS, composition de noeuds de contexte
Ubiquitous applications are facing a large diversity of execution contexts. However, this diversity requires some continual adaptation to preserve the correct execution of these ap...
Denis Conan, Romain Rouvoy, Lionel Seinturier
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
PROMAS
2007
Springer
14 years 3 months ago
Modules as Policy-Based Intentions: Modular Agent Programming in GOAL
Modular programming has the usual benefits associated with structured programming, information hiding and reusability, but also has additional benefits to offer when applied in ...
Koen V. Hindriks
ATAL
2005
Springer
14 years 3 months ago
An organisation infrastructure for Multi-Agent Systems based on Agent Coordination Contexts
We present an organisation infrastructure for open MultiAgent Systems built upon a role-based access control model (RBAC), which provides agents with means to enable and control a...
Mirko Viroli, Alessandro Ricci, Andrea Omicini