• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,241
Next 10 →

Abstract Efficient Trust Management Policy Analysis from Rules ∗

by unknown authors
"... This paper describes a systematic method for deriving efficient algorithms and precise time complexities from extended Datalog rules as it is applied to the analysis of trust management policies specified in SPKI/SDSI, a well-known trust management framework designed to facilitate the development of ..."
Abstract - Add to MetaCart
This paper describes a systematic method for deriving efficient algorithms and precise time complexities from extended Datalog rules as it is applied to the analysis of trust management policies specified in SPKI/SDSI, a well-known trust management framework designed to facilitate the development

Design of a role-based trust management framework

by Ninghui Li, John C. Mitchell - In Proceedings of the 2002 IEEE Symposium on Security and Privacy , 2002
"... We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control. Usi ..."
Abstract - Cited by 362 (42 self) - Add to MetaCart
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control

Discovery of frequent episodes in event sequences

by Heikki Mannila, Hannu Toivonen - Data Min. Knowl. Discov , 1997
"... Abstract. Sequences of events describing the behavior and actions of users or systems can be collected in several domains. An episode is a collection of events that occur relatively close to each other in a given partial order. We consider the problem of discovering frequently occurring episodes in ..."
Abstract - Cited by 362 (13 self) - Add to MetaCart
in a sequence. Once such episodes are known, one can produce rules for describing or predicting the behavior of the sequence. We give efficient algorithms for the discovery of all frequent episodes from a given class of episodes, and present detailed experimental results. The methods are in use

Cassandra: flexible trust management, applied to electronic health records

by Moritz Y. Becker, Peter Sewell - In 17th IEEE Computer Security Foundations Workshop (CSFW , 2004
"... We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a substantial case study, a security policy for a national Electronic Health Record system, based on the requirements for the ..."
Abstract - Cited by 128 (11 self) - Add to MetaCart
credential-based access control (e.g. between administrative domains); and rules can refer to remote policies (for automatic credential retrieval and trust negotiation). Moreover, the policy language is small, and it has a formal semantics for query evaluation and for the access control engine. For the case

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
you quite quickly what to choose. However, you cannot use the same simple emotional judgment when you are in the shoes of an economist trying to optimize the access to the locks on the Mississippi River. The task is to find a pricing structure that assures the most efficient and uninterrupted use

Do Networks Really Work? A Framework for Evaluating Public-Sector Organizational Networks.

by Keith G Provan , H Brinton Milward - Public Administration Review, , 2001
"... Although cooperative, interorganizational networks have become a common mechanism for delivery of public services, evaluating their effectiveness is extremely complex and has generally been neglected. To help resolve this problem, we discuss the evaluation of networks of community-based, mostly pub ..."
Abstract - Cited by 167 (3 self) - Add to MetaCart
. Brinton Milward is the McClelland Professor of Public Management at the University of Arizona. His research interests revolve around the intersection of public policy and management. Dr. Milward has focused much of his recent work on understanding how to efficiently manage networks of organizations

An integration of reputation-based and policy-based trust management

by Piero Bonatti, Claudiu Duma, Daniel Olmedilla, Nahid Shahmehri - In Semantic Web Policy Workshop , 2005
"... Abstract. Trust management is currently being tackled from two different perspectives: a “strong and crisp ” approach, where decisions are founded on logical rules and verifiable properties encoded in digital credentials, and a “soft and social ” approach, based on reputation measures gathered and s ..."
Abstract - Cited by 30 (5 self) - Add to MetaCart
Abstract. Trust management is currently being tackled from two different perspectives: a “strong and crisp ” approach, where decisions are founded on logical rules and verifiable properties encoded in digital credentials, and a “soft and social ” approach, based on reputation measures gathered

Process Cruise Control: Event-Driven Clock Scaling for Dynamic Power Management

by Andreas Weissel, Frank Bellosa , 2002
"... Scalability of the core frequency is a common feature of low-power processor architectures. Many heuristics for frequency scaling were proposed in the past to find the best trade-off between energy efficiency and computational performance. With complex applications exhibiting unpredictable behavior ..."
Abstract - Cited by 125 (5 self) - Add to MetaCart
will demonstrate that counter values can also reveal the power-specific characteristics of a thread. In this paper we propose an energy-aware scheduling policy for non-real-time operating systems that benefits from event counters. By exploiting the information from these counters, the scheduler determines

Optimal Monetary Policy in Open versus Closed Economies: an

by Richard Clarida, Jordi Galí, Mark Gertler - Integrated Approach”, American Economic Review, Papers and Proceedings , 2001
"... presented a normative analysis of monetary policy within a simple optimization-based closedeconomy framework. We derived the optimal policy rule and, among other things, characterized the gains from commitment. Also, we made precise the implications for the kind of instrument feedback rule that a ce ..."
Abstract - Cited by 104 (0 self) - Add to MetaCart
presented a normative analysis of monetary policy within a simple optimization-based closedeconomy framework. We derived the optimal policy rule and, among other things, characterized the gains from commitment. Also, we made precise the implications for the kind of instrument feedback rule that a

Achieving secure, scalable, and fine-grained data access control in cloud computing

by Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou - In Proc. of IEEE INFOCOM , 2010
"... Abstract—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive dat ..."
Abstract - Cited by 133 (8 self) - Add to MetaCart
privilege confidentiality and user secret key accountability. Exten-sive analysis shows that our proposed scheme is highly efficient and provably secure under existing security models. I.
Next 10 →
Results 1 - 10 of 1,241
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University