Sciweavers

1278 search results - page 35 / 256
» The representation of policies as system objects
Sort
View
GMP
2000
IEEE
173views Solid Modeling» more  GMP 2000»
14 years 2 days ago
A Representation Independent Geometric Modeling Kernel
This paper is concerned with “open kernel” geometric modelling systems. It uses industrial needs to identify requirements for the geometric objects of a proposed interface. Th...
Alan E. Middleditch, Chris Reade, Abel J. P. Gomes
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
MSS
2003
IEEE
151views Hardware» more  MSS 2003»
14 years 28 days ago
Accurate Modeling of Cache Replacement Policies in a Data Grid
Caching techniques have been used to improve the performance gap of storage hierarchies in computing systems. In data intensive applications that access large data files over wid...
Ekow J. Otoo, Arie Shoshani
SACMAT
2010
ACM
14 years 15 days ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
LISA
2007
13 years 10 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar