Sciweavers

3605 search results - page 96 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
ICAC
2009
IEEE
13 years 5 months ago
Using distributed w-learning for multi-policy optimization in decentralized autonomic systems
Distributed W-Learning (DWL) is a reinforcement learningbased algorithm for multi-policy optimization in agent-based systems. In this poster we propose the use of DWL for decentra...
Ivana Dusparic, Vinny Cahill
NSPW
2003
ACM
14 years 1 months ago
Bringing security home: a process for developing secure and usable systems
The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:
Ivan Flechais, Martina Angela Sasse, Stephen Haile...
WPES
2003
ACM
14 years 1 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
SIGUCCS
2005
ACM
14 years 1 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
GRID
2005
Springer
14 years 1 months ago
Bridging organizational network boundaries on the grid
— The Grid offers significant opportunities for performing wide area distributed computing, allowing multiple organizations to collaborate and build dynamic and flexible virtual ...
Jefferson Tan, David Abramson, Colin Enticott