Sciweavers

705 search results - page 123 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
IJSWIS
2007
113views more  IJSWIS 2007»
13 years 8 months ago
A Formal Foundation for Ontology-Alignment Interaction Models
Ontology alignment foundations are hard to find in the literature. The abstract nature of the topic and the diverse means of practice make it difficult to capture it in a universal...
W. Marco Schorlemmer, Yannis Kalfoglou, Manuel Ate...
WPES
2003
ACM
14 years 1 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
CCS
2006
ACM
14 years 9 days ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
HCW
2000
IEEE
14 years 1 months ago
Evaluation of PAMS' Adaptive Management Services
Management of large-scale parallel and distributed applications is an extremely complex task due to factors such as centralized management architectures, lack of coordination and ...
Yoonhee Kim, Salim Hariri, Muhamad Djunaedi
ATAL
2009
Springer
14 years 3 months ago
Integrating organizational control into multi-agent learning
Multi-Agent Reinforcement Learning (MARL) algorithms suffer from slow convergence and even divergence, especially in largescale systems. In this work, we develop an organization-b...
Chongjie Zhang, Sherief Abdallah, Victor R. Lesser