Sciweavers

334 search results - page 26 / 67
» Survey of trust models in different network domains
Sort
View
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
FOSAD
2000
Springer
13 years 11 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
ICONFERENCE
2012
12 years 3 months ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang
JSAC
2006
108views more  JSAC 2006»
13 years 7 months ago
Distributed Nonlinear Integer Optimization for Data-Optical Internetworking
Abstract--We present a novel approach for joint optical network provisioning and Internet protocol (IP) traffic engineering, in which the IP and optical networks collaboratively op...
Anwar Elwalid, Debasis Mitra, Qiong Wang
ICMLA
2009
13 years 5 months ago
Learning Parameters for Relational Probabilistic Models with Noisy-Or Combining Rule
Languages that combine predicate logic with probabilities are needed to succinctly represent knowledge in many real-world domains. We consider a formalism based on universally qua...
Sriraam Natarajan, Prasad Tadepalli, Gautam Kunapu...