Sciweavers

480 search results - page 47 / 96
» policy 2004
Sort
View
IFIP
2004
Springer
14 years 1 months ago
Discretionary Overriding of Access Control in the Privilege Calculus
We extend a particular access control framework, the Privilege Calculus, with a possibility to override denied access for increased flexibility in hard to define or unanticipated...
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...
WG
2004
Springer
14 years 29 days ago
Crossing Reduction in Circular Layouts
We propose a two-phase heuristic for crossing reduction in circular layouts. While the first algorithm uses a greedy policy to build a good initial layout, an adaptation of the si...
Michael Baur, Ulrik Brandes
CSFW
2004
IEEE
13 years 11 months ago
By Reason and Authority: A System for Authorization of Proof-Carrying Code
We present a system, BLF, that combines an authorization logic based on the Binder language with a logical framework, LF, able to express semantic properties of programs. BLF is a...
Nathan Whitehead, Martín Abadi, George C. N...
ACSW
2004
13 years 9 months ago
Defining Security Services for Electronic Tendering
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requir...
Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald
IADIS
2004
13 years 9 months ago
continuing Training Strategies in Europe
This article gives an overview on the development of Continuing Training (CT) strategies in Europe. A review of the existing policies and estimated developments on Information and...
Piedale Carvalho