Sciweavers

882 search results - page 31 / 177
» On the Negotiation of Access Control Policies
Sort
View
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 9 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
EDBT
2008
ACM
142views Database» more  EDBT 2008»
14 years 8 months ago
An access control mechanism for P2P collaborations
We introduce a fine grained access control mechanism for Peer-to-Peer collaborations. It is based on the local access control components of the participants. The peers export thei...
Christoph Sturm, Klaus R. Dittrich, Patrick Ziegle...
ICICS
2010
Springer
13 years 5 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
IFIP
2004
Springer
14 years 1 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
ICRA
2006
IEEE
161views Robotics» more  ICRA 2006»
14 years 2 months ago
Quadruped Robot Obstacle Negotiation via Reinforcement Learning
— Legged robots can, in principle, traverse a large variety of obstacles and terrains. In this paper, we describe a successful application of reinforcement learning to the proble...
Honglak Lee, Yirong Shen, Chih-Han Yu, Gurjeet Sin...