Sciweavers

3605 search results - page 9 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
ICALP
2000
Springer
13 years 11 months ago
One-Round Secure Computation and Secure Autonomous Mobile Agents
d Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M...
CCS
2006
ACM
13 years 11 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
APSEC
2003
IEEE
14 years 1 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
AGENTS
2001
Springer
14 years 7 days ago
Learning structured reactive navigation plans from executing MDP navigation policies
Autonomous robots, such as robot office couriers, need navigation routines that support flexible task execution and effective action planning. This paper describes XFRMLEARN, a s...
Michael Beetz, Thorsten Belker
CCS
2008
ACM
13 years 9 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal