Sciweavers

581 search results - page 21 / 117
» policy 2009
Sort
View
IFIP
2009
Springer
14 years 4 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
14 years 4 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
CCS
2009
ACM
14 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
SACMAT
2009
ACM
14 years 4 months ago
An algebra for fine-grained integration of XACML policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...
P2P
2009
IEEE
121views Communications» more  P2P 2009»
14 years 4 months ago
Exploring the Optimal Chunk Selection Policy for Data-Driven P2P Streaming Systems
Data-driven P2P streaming systems can potentially provide good playback rate to a large number of viewers. One important design problem in such P2P systems is to determine the opt...
Bridge Q. Zhao, John Chi-Shing Lui, Dah-Ming Chiu