Results 1 - 10
of
1,241
Abstract Efficient Trust Management Policy Analysis from Rules ∗
"... This paper describes a systematic method for deriving efficient algorithms and precise time complexities from extended Datalog rules as it is applied to the analysis of trust management policies specified in SPKI/SDSI, a well-known trust management framework designed to facilitate the development of ..."
Abstract
- Add to MetaCart
This paper describes a systematic method for deriving efficient algorithms and precise time complexities from extended Datalog rules as it is applied to the analysis of trust management policies specified in SPKI/SDSI, a well-known trust management framework designed to facilitate the development
Design of a role-based trust management framework
- In Proceedings of the 2002 IEEE Symposium on Security and Privacy
, 2002
"... We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control. Usi ..."
Abstract
-
Cited by 362 (42 self)
- Add to MetaCart
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control
Discovery of frequent episodes in event sequences
- Data Min. Knowl. Discov
, 1997
"... Abstract. Sequences of events describing the behavior and actions of users or systems can be collected in several domains. An episode is a collection of events that occur relatively close to each other in a given partial order. We consider the problem of discovering frequently occurring episodes in ..."
Abstract
-
Cited by 362 (13 self)
- Add to MetaCart
in a sequence. Once such episodes are known, one can produce rules for describing or predicting the behavior of the sequence. We give efficient algorithms for the discovery of all frequent episodes from a given class of episodes, and present detailed experimental results. The methods are in use
Cassandra: flexible trust management, applied to electronic health records
- In 17th IEEE Computer Security Foundations Workshop (CSFW
, 2004
"... We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a substantial case study, a security policy for a national Electronic Health Record system, based on the requirements for the ..."
Abstract
-
Cited by 128 (11 self)
- Add to MetaCart
credential-based access control (e.g. between administrative domains); and rules can refer to remote policies (for automatic credential retrieval and trust negotiation). Moreover, the policy language is small, and it has a formal semantics for query evaluation and for the access control engine. For the case
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
you quite quickly what to choose. However, you cannot use the same simple emotional judgment when you are in the shoes of an economist trying to optimize the access to the locks on the Mississippi River. The task is to find a pricing structure that assures the most efficient and uninterrupted use
Do Networks Really Work? A Framework for Evaluating Public-Sector Organizational Networks.
- Public Administration Review,
, 2001
"... Although cooperative, interorganizational networks have become a common mechanism for delivery of public services, evaluating their effectiveness is extremely complex and has generally been neglected. To help resolve this problem, we discuss the evaluation of networks of community-based, mostly pub ..."
Abstract
-
Cited by 167 (3 self)
- Add to MetaCart
. Brinton Milward is the McClelland Professor of Public Management at the University of Arizona. His research interests revolve around the intersection of public policy and management. Dr. Milward has focused much of his recent work on understanding how to efficiently manage networks of organizations
An integration of reputation-based and policy-based trust management
- In Semantic Web Policy Workshop
, 2005
"... Abstract. Trust management is currently being tackled from two different perspectives: a “strong and crisp ” approach, where decisions are founded on logical rules and verifiable properties encoded in digital credentials, and a “soft and social ” approach, based on reputation measures gathered and s ..."
Abstract
-
Cited by 30 (5 self)
- Add to MetaCart
Abstract. Trust management is currently being tackled from two different perspectives: a “strong and crisp ” approach, where decisions are founded on logical rules and verifiable properties encoded in digital credentials, and a “soft and social ” approach, based on reputation measures gathered
Process Cruise Control: Event-Driven Clock Scaling for Dynamic Power Management
, 2002
"... Scalability of the core frequency is a common feature of low-power processor architectures. Many heuristics for frequency scaling were proposed in the past to find the best trade-off between energy efficiency and computational performance. With complex applications exhibiting unpredictable behavior ..."
Abstract
-
Cited by 125 (5 self)
- Add to MetaCart
will demonstrate that counter values can also reveal the power-specific characteristics of a thread. In this paper we propose an energy-aware scheduling policy for non-real-time operating systems that benefits from event counters. By exploiting the information from these counters, the scheduler determines
Optimal Monetary Policy in Open versus Closed Economies: an
- Integrated Approach”, American Economic Review, Papers and Proceedings
, 2001
"... presented a normative analysis of monetary policy within a simple optimization-based closedeconomy framework. We derived the optimal policy rule and, among other things, characterized the gains from commitment. Also, we made precise the implications for the kind of instrument feedback rule that a ce ..."
Abstract
-
Cited by 104 (0 self)
- Add to MetaCart
presented a normative analysis of monetary policy within a simple optimization-based closedeconomy framework. We derived the optimal policy rule and, among other things, characterized the gains from commitment. Also, we made precise the implications for the kind of instrument feedback rule that a
Achieving secure, scalable, and fine-grained data access control in cloud computing
- In Proc. of IEEE INFOCOM
, 2010
"... Abstract—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive dat ..."
Abstract
-
Cited by 133 (8 self)
- Add to MetaCart
privilege confidentiality and user secret key accountability. Exten-sive analysis shows that our proposed scheme is highly efficient and provably secure under existing security models. I.
Results 1 - 10
of
1,241