Sciweavers

1082 search results - page 47 / 217
» Policy support for call control
Sort
View
VLDB
2002
ACM
74views Database» more  VLDB 2002»
13 years 8 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
RULEML
2007
Springer
14 years 2 months ago
Specifying Process-Aware Access Control Rules in SBVR
Abstract. Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying bu...
Stijn Goedertier, Christophe Mues, Jan Vanthienen
SASN
2006
ACM
14 years 2 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
SAC
2010
ACM
14 years 3 months ago
MetaSelf: an architecture and a development method for dependable self-* systems
This paper proposes a software architecture and a development process for engineering dependable and controllable self-organising (SO) systems. Our approach addresses dependabilit...
Giovanna Di Marzo Serugendo, John S. Fitzgerald, A...
ECCE
2007
13 years 10 months ago
Lateral control support for car drivers: a human-machine cooperation approach
Motivation – This paper is based on a research project which examines the way car drivers and automated devices cooperate to achieve lateral control of a vehicle. A theoretical ...
Jordan Navarro, Franck Mars, Jean-Michel Hoc