Sciweavers

581 search results - page 9 / 117
» policy 2009
Sort
View
CHI
2010
ACM
14 years 3 months ago
Making policy decisions disappear into the user's workflow
: © Making Policy Decisions Disappear into the User's Workflow Alan H. Karp, Marc Stiegler HP Laboratories HPL-2009-341 Usable security Complaints of security interfering wit...
Alan H. Karp, Marc Stiegler
POLICY
2009
Springer
14 years 3 months ago
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure
—Policy definition is an important component of the consistent authorisation service infrastructure that could be effectively integrated with the general resource provisioning wo...
Yuri Demchenko, Mihai Cristea, Cees de Laat
CCS
2009
ACM
14 years 9 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
ICC
2009
IEEE
168views Communications» more  ICC 2009»
14 years 3 months ago
Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node
—We study a sensor node with an energy harvesting source. In any slot, the sensor node is in one of two modes: Wake or Sleep. The generated energy is stored in a buffer. The sens...
Vinay Joseph, Vinod Sharma, Utpal Mukherji
ICUMT
2009
13 years 6 months ago
Experimental study on neighbor selection policy for Phoenix Network Coordinate system
Network Coordinate (NC) which provides efficient distance prediction with scalable measurements, brings benefits to various network applications. Phoenix Network Coordinate system ...
Gang Wang, Shining Wu, Guodong Wang, Beixing Deng,...