Sciweavers

1150 search results - page 36 / 230
» Specifying Information-Flow Controls
Sort
View
DSRT
2004
IEEE
14 years 29 days ago
An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation
The Experimentation Command and Control Interface (XC2I) project has developed an architecture for a Webservice based viewer/controller for use with distributed simulations suppor...
Katherine L. Morse, Ryan Brunton, J. Mark Pullen, ...
CCS
2008
ACM
13 years 11 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
ACSAC
2003
IEEE
14 years 2 months ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
CDC
2008
IEEE
183views Control Systems» more  CDC 2008»
13 years 9 months ago
Stabilization of infinitesimally rigid formations of multi-robot networks
This paper proposes a local gradient control law to stabilize a group of robots to a target formation. The control is derived from a potential function based on an undirected infin...
Laura Krick, Mireille E. Broucke, Bruce A. Francis
SACMAT
2005
ACM
14 years 2 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...