Sciweavers

2422 search results - page 16 / 485
» Security Policy Consistency
Sort
View
SIAMCO
2011
13 years 5 months ago
Consistency of Sequential Bayesian Sampling Policies
We consider Bayesian information collection, in which a measurement policy collects information to support a future decision. This framework includes ranking and selection, continu...
Peter Frazier, Warren B. Powell
ACSAC
2000
IEEE
14 years 2 months ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
POLICY
2007
Springer
14 years 4 months ago
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel,...
CCS
2009
ACM
14 years 11 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...