Sciweavers

316 search results - page 15 / 64
» Where do security policies come from
Sort
View
TRUSTBUS
2010
Springer
13 years 6 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
IEEEPACT
2006
IEEE
14 years 1 months ago
Architectural support for operating system-driven CMP cache management
The role of the operating system (OS) in managing shared resources such as CPU time, memory, peripherals, and even energy is well motivated and understood [23]. Unfortunately, one...
Nauman Rafique, Won-Taek Lim, Mithuna Thottethodi
HRI
2007
ACM
13 years 11 months ago
Learning by demonstration with critique from a human teacher
Learning by demonstration can be a powerful and natural tool for developing robot control policies. That is, instead of tedious hand-coding, a robot may learn a control policy by ...
Brenna Argall, Brett Browning, Manuela M. Veloso
ICISS
2007
Springer
14 years 1 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
DAGSTUHL
2003
13 years 9 months ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec