Sciweavers

303 search results - page 18 / 61
» Unifying Theories of Confidentiality
Sort
View
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
POPL
2003
ACM
14 years 10 months ago
A type system for higher-order modules
We present a type theory for higher-order modules that accounts for many central issues in module system design, including translucency, applicativity, generativity, and modules a...
Derek Dreyer, Karl Crary, Robert Harper
IBERAMIA
1998
Springer
14 years 2 months ago
The "Semantics" of Evolution: Trajectories and Trade-offs in Design Space and Niche Space
This paper 1 attempts to characterise a unifying overview of the practice of software engineers, AI designers, developers of evolutionary forms of computation, designers of adapti...
Aaron Sloman
RR
2010
Springer
13 years 8 months ago
Defeasibility in Answer Set Programs via Argumentation Theories
Defeasible reasoning has been studied extensively in the last two decades and many different and dissimilar approaches are currently on the table. This multitude of ideas has made...
Hui Wan, Michael Kifer, Benjamin N. Grosof
ICIS
2000
13 years 11 months ago
A framework of knowledge management systems: issues and challenges for theory and practice
As the basis of value creation increasingly depends on the leverage of the intangible assets of firms, Knowledge Management Systems (KMS) are emerging as powerful sources of compe...
Jungpil Hahn, Mani R. Subramani