Sciweavers

1167 search results - page 55 / 234
» policy 2007
Sort
View
CCS
2007
ACM
14 years 2 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
ACSAC
2007
IEEE
14 years 5 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
IROS
2007
IEEE
159views Robotics» more  IROS 2007»
14 years 5 months ago
Transfer of policies based on trajectory libraries
— Libraries of trajectories are a promising way of creating policies for difficult problems. However, often it is not desirable or even possible to create a new library for ever...
Martin Stolle, Hanns Tappeiner, Joel E. Chestnutt,...
COREGRID
2007
Springer
14 years 5 months ago
Optimal Closest Policy with Qos and Bandwidth Constraints
This paper deals with the replica placement problem on fully homogeneous tree networksknownasthe Replica Placementoptimizationproblem. Theclient requests are known beforehand, whil...
Veronika Rehn-Sonigo
ECTEL
2007
Springer
14 years 5 months ago
Exploiting Policies in an Open Infrastructure for Lifelong Learning
Nowadays, people are in need for continuous learning in order to keep up to date or be upgraded in their job. An infrastructure for lifelong learning requires continuous adaptation...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...