Sciweavers

861 search results - page 45 / 173
» Ranking Privacy Policy
Sort
View
IOR
2011
107views more  IOR 2011»
14 years 11 months ago
Information Collection on a Graph
We derive a knowledge gradient policy for an optimal learning problem on a graph, in which we use sequential measurements to refine Bayesian estimates of individual edge values i...
Ilya O. Ryzhov, Warren B. Powell
125
Voted
IEEEARES
2007
IEEE
15 years 11 months ago
Pastures: Towards Usable Security Policy Engineering
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice re...
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W...
137
Voted
ESORICS
2003
Springer
15 years 9 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
SPW
2001
Springer
15 years 9 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
CSFW
2009
IEEE
15 years 8 months ago
Specification and Analysis of Dynamic Authorisation Policies
This paper presents a language, based on transaction logic, for specifying dynamic authorisation policies, i.e., rules governing actions that may depend on and update the authoris...
Moritz Y. Becker