Sciweavers

1407 search results - page 160 / 282
» Systems Theory Model for Information Security
Sort
View
SACMAT
2004
ACM
14 years 1 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
ATAL
2006
Springer
14 years 2 days ago
Agent interaction in distributed POMDPs and its implications on complexity
The ability to coordinate effectively is critical for agents to accomplish their goals in a multi-agent system. A number of researchers have modeled the coordination problem for m...
Jiaying Shen, Raphen Becker, Victor R. Lesser
CCS
2007
ACM
14 years 2 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
14 years 2 months ago
Barriers to Adoption of e-Government
Technology adoption is well defined in e-business. The environment within which leaders must act in government is significantly different that that navigated by business leaders. ...
Wm. Arthur Conklin
AAAI
2010
13 years 9 months ago
Modeling Dynamic Multi-Topic Discussions in Online Forums
In the form of topic discussions, users interact with each other to share knowledge and exchange information in online forums. Modeling the evolution of topic discussion reveals h...
Hao Wu, Jiajun Bu, Chun Chen, Can Wang, Guang Qiu,...