Sciweavers

3605 search results - page 31 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
IEEEARES
2010
IEEE
14 years 1 months ago
Architecture-Aware Adaptive Deployment of Contextual Security Policies
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
CSREASAM
2009
13 years 9 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
CCS
2005
ACM
14 years 1 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
AGENTS
1998
Springer
14 years 1 days ago
Liability for Autonomous Agent Design
Though exciting scientifically, autonomous agent design can result in legal liability. This paper surveys those legal concerns, focusing on issues arising from the unique qualitie...
Carey Heckman, Jacob O. Wobbrock
CIA
1997
Springer
13 years 11 months ago
Multi-Level Security in Multiagent Systems
Abstract. Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level sec...
Gerd Wagner