Sciweavers

581 search results - page 38 / 117
» policy 2009
Sort
View
CDC
2009
IEEE
172views Control Systems» more  CDC 2009»
14 years 1 months ago
A dynamic boundary guarding problem with translating targets
Abstract— We introduce a problem in which a service vehicle seeks to defend a deadline (boundary) from dynamically arriving mobile targets. The environment is a rectangle and the...
Stephen L. Smith, Shaunak Dattaprasad Bopardikar, ...
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 9 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
SAINT
2009
IEEE
14 years 3 months ago
CCDM: Central Controller-Based Device Management Architecture and Method to Split Management Scripts
This paper presents CCDM, a new architecture for management of devices, which collect environmental information and give effects to the environment. CCDM provides easy management ...
Akihiro Sugiyama, Hideya Ochiai, Hiroshi Esaki
IAT
2009
IEEE
14 years 19 days ago
On-line Coordination: Event Interaction and State Communication between Cooperative Agents
This paper addresses a novel coordination problem for distributed agents in a discrete-event setting. We introduce and study a predicate coordination problem as the problem of dist...
Manh Tung Pham, Kiam Tian Seow
ICTAI
2009
IEEE
14 years 3 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu