Sciweavers

1167 search results - page 34 / 234
» policy 2007
Sort
View
POLICY
2007
Springer
14 years 4 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
DBSEC
2006
144views Database» more  DBSEC 2006»
14 years 4 days ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
JNW
2007
102views more  JNW 2007»
13 years 10 months ago
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments
Abstract— A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Mana...
Lukasz Opyrchal, Atul Prakash, Amit Agrawal
POLICY
2007
Springer
14 years 4 months ago
Adaptive Web Data Extraction Policies
Web data extraction is concerned, among other things, with routine data accessing and downloading from continuously-updated dynamic Web pages. There is a relevant trade-off between...
Giacomo Fiumara, Massimo Marchi, Alessandro Provet...
NIPS
2001
14 years 3 days ago
The Emergence of Multiple Movement Units in the Presence of Noise and Feedback Delay
Tangential hand velocity profiles of rapid human arm movements often appear as sequences of several bell-shaped acceleration-deceleration phases called submovements or movement un...
Michael Kositsky, Andrew G. Barto