Sciweavers

579 search results - page 95 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
ACSAC
1998
IEEE
13 years 12 months ago
The RRA97 Model for Role-Based Administration of Role Hierarchies
Abstract Role-based access control RBAC has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are as...
Ravi S. Sandhu, Qamar Munawer
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 2 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
WORDS
2003
IEEE
14 years 28 days ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro
CCR
2007
168views more  CCR 2007»
13 years 7 months ago
Challenges in peer-to-peer gaming
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games a...
Christoph Neumann, Nicolas Prigent, Matteo Varvell...
GECCO
2006
Springer
185views Optimization» more  GECCO 2006»
13 years 11 months ago
Memory analysis and significance test for agent behaviours
Many agent problems in a grid world have a restricted sensory information and motor actions. The environmental conditions need dynamic processing of internal memory. In this paper...
DaeEun Kim