Sciweavers

EUROPKI
2009
Springer
13 years 10 months ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
CSE
2009
IEEE
13 years 10 months ago
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
Abstract--A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of a...
Michele Barletta, Silvio Ranise, Luca Viganò...
TRUSTBUS
2010
Springer
13 years 10 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
SOCIALCOM
2010
13 years 10 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu
SERP
2010
13 years 10 months ago
Towards Automatic Integration of Or-BAC Security Policies Using Aspects
We propose a formal method to automatically integrate security rules regarding an access control policy (expressed in Or-BAC) in Java programs. Given an untrusted application and a...
Yliès Falcone, Mohamad Jaber
SEMWEB
2010
Springer
13 years 10 months ago
A Self-Policing Policy Language
Abstract. Formal policies allow the non-ambiguous definition of situations in which usage of certain entities are allowed, and enable the automatic evaluation whether a situation i...
Sebastian Speiser, Rudi Studer
MSOM
2010
77views more  MSOM 2010»
13 years 10 months ago
To Wave or Not to Wave? Order Release Policies for Warehouses with an Automated Sorter
Wave-based release policies are prevalent in warehouses with an automated sorter, and take different forms depending on how much waves overlap and whether the sorter is split for...
Jérémie Gallien, Théophane We...
ICRA
2010
IEEE
143views Robotics» more  ICRA 2010»
13 years 10 months ago
Apprenticeship learning via soft local homomorphisms
Abstract— We consider the problem of apprenticeship learning when the expert’s demonstration covers only a small part of a large state space. Inverse Reinforcement Learning (IR...
Abdeslam Boularias, Brahim Chaib-draa
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 10 months ago
Scheduling Periodic Real-Time Tasks with Heterogeneous Reward Requirements
—We study the problem of scheduling periodic real-time tasks which have individual minimum reward requirements. We consider situations where tasks generate jobs that can be provi...
I-Hong Hou, P. R. Kumar
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 11 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash