Sciweavers

579 search results - page 78 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
EDOC
2002
IEEE
14 years 1 months ago
Model Driven Geo-Information System's Development
Continuous change of user requirements has become a constant for geo-information systems. Designing systems that can adapt to such changes requires an appropriate ethodology that ...
Javier Morales, Luís Ferreira Pires, Marten...
JSS
2008
136views more  JSS 2008»
13 years 9 months ago
Specification, decomposition and agent synthesis for situation-aware service-based systems
Service-based systems are distributed computing systems with the major advantage of enabling rapid composition of distributed applications, such as collaborative research and deve...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
CCS
2007
ACM
14 years 3 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
MMNS
2003
98views Multimedia» more  MMNS 2003»
13 years 10 months ago
Managing Services Quality through Admission Control and Active Monitoring
We propose a lightweight traffic admission control scheme based on on-line monitoring which ensures multimedia services quality both intra-domain and end-to-end. The AC strategy i...
Solange Rito Lima, Paulo Carvalho, Alexandre Santo...
ATAL
2007
Springer
14 years 3 months ago
Commitment-driven distributed joint policy search
Decentralized MDPs provide powerful models of interactions in multi-agent environments, but are often very difficult or even computationally infeasible to solve optimally. Here we...
Stefan J. Witwicki, Edmund H. Durfee