Sciweavers

1167 search results - page 32 / 234
» policy 2007
Sort
View
AAAI
2007
14 years 1 months ago
Adaptive Timeout Policies for Fast Fine-Grained Power Management
Power management techniques for mobile appliances put the components of the systems into low power states to maximize battery life while minimizing the impact on the perceived per...
Branislav Kveton, Prashant Gandhi, Georgios Theoch...
CSREASAM
2003
14 years 1 days ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
ATVA
2007
Springer
89views Hardware» more  ATVA 2007»
14 years 4 months ago
Policies and Proofs for Code Auditing
Abstract. Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called B...
Nathan Whitehead, Jordan Johnson, Martín Ab...
GRID
2007
Springer
14 years 4 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
SGAI
2007
Springer
14 years 4 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...