Sciweavers

488 search results - page 5 / 98
» Policy-Based Cryptography and Applications
Sort
View
ICICS
2003
Springer
14 years 16 days ago
A Policy Based Framework for Access Control
This paper presents a policy-based framework for managing access control in distributed heterogeneous systems. This framework is based on the PDP/PEP approach. The PDP (Policy Deci...
Ricardo Nabhen, Edgard Jamhour, Carlos Maziero
LAWEB
2009
IEEE
14 years 2 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
ATC
2009
Springer
13 years 10 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
RULEML
2010
Springer
13 years 5 months ago
A Contract Agreement Policy-Based Workflow Methodology for Agents Interacting in the Semantic Web
The Semantic Web aims at automating Web content understanding and user request satisfaction. Intelligent agents assist towards this by performing complex actions on behalf of their...
Kalliopi Kravari, Grammati-Eirini Kastori, Nick Ba...
IM
2007
13 years 8 months ago
Business-Driven Optimization of Policy-Based Management solutions
— We consider whether the off-line compilation of a set of Service Level Agreements (SLAs) into low-level management policies can lead to the runtime maximization of the overall ...
Issam Aib, Raouf Boutaba