Sciweavers

448 search results - page 8 / 90
» Who is in Control
Sort
View
MCETECH
2009
Springer
15 years 10 months ago
A Non-technical User-Oriented Display Notation for XACML Conditions
Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
Bernard Stepien, Amy P. Felty, Stan Matwin
144
Voted
INTENV
2010
14 years 11 months ago
We all wear dark glasses now
The story describes a world of the future in which there are two entirely different groups of people, one involved in the development and reproduction of the industrial base of the...
Graham Clarke, Malcolm Lear
GAMESEC
2010
150views Game Theory» more  GAMESEC 2010»
15 years 2 months ago
Adversarial Control in a Delay Tolerant Network
We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
Eitan Altman, Tamer Basar, Veeraruna Kavitha
TLT
2008
149views more  TLT 2008»
15 years 4 months ago
Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...
POLICY
2005
Springer
15 years 9 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...