Sciweavers

114 search results - page 11 / 23
» On the Controlled Evolution of Access Rules in Cooperative I...
Sort
View
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
13 years 8 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
VTC
2010
IEEE
233views Communications» more  VTC 2010»
13 years 5 months ago
Quantization and Transmission of the Energy Measures for Cooperative Spectrum Sensing
— We consider the sensing of the frequency spectrum based on energy detection for cognitive radios. It has been shown that the reliability of the sensing can be improved by using...
Olivier van den Biggelaar, Jean-Michel Dricot, Phi...
DKE
2002
118views more  DKE 2002»
13 years 7 months ago
Consistent policy enforcement in distributed systems using mobile policies
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges ...
Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amg...
DBSEC
2007
87views Database» more  DBSEC 2007»
13 years 9 months ago
Towards a Times-Based Usage Control Model
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital objects. To meet these requirements, we present a new access control model–Times-bas...
Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaoli...
CCS
2007
ACM
14 years 1 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...