Sciweavers

451 search results - page 37 / 91
» What Is a Conversation Policy
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
Middleware for User Controlled Environments
In this paper, we describe the middleware that has evolved from our attempt to capture user descriptions of policies controlling devices and services from natural language. Descri...
Bill Keller, Tim Owen, Ian Wakeman, Julie Weeds, D...
SUTC
2006
IEEE
14 years 4 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 10 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
CACM
1999
108views more  CACM 1999»
13 years 9 months ago
Privacy Interfaces for Information Management
To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...
Tessa A. Lau, Oren Etzioni, Daniel S. Weld
WOSS
2004
ACM
14 years 3 months ago
Towards a knowledge-based approach to architectural adaptation management
Self-adaptive software continually evaluates and modifies its own behavior to meet changing demands. One of the key issues in constructing such software is that of planning when a...
John C. Georgas, Richard N. Taylor