### Table 2 provides examples of malicious code understood in our policy-based framework.

2000

### Table 1. Scenarios for Policy based Access Control

2004

Cited by 1

### Table 2 Examples of Malicious Code Understood in Our Policy-Based Framework Incorrect policy

"... In PAGE 7: ... This situation arises when either a73 the enforcement mechanism is too weak to implement the desired policy; a73 there are bugs in the implementation of the enforcement mechanism; or a73 the enforcement mechanism is miscon- figured. Table2 provides examples of malicious code understood in our policy-based frame- work. As an example of context misunder- standing, consider the role of scripting lan- guages such as Visual Basic.... ..."

### Table 2 Examples of Malicious Code Understood in Our Policy-Based Framework Incorrect policy

"... In PAGE 7: ... This situation arises when either a73 the enforcement mechanism is too weak to implement the desired policy; a73 there are bugs in the implementation of the enforcement mechanism; or a73 the enforcement mechanism is miscon- figured. Table2 provides examples of malicious code understood in our policy-based frame- work. As an example of context misunder- standing, consider the role of scripting lan- guages such as Visual Basic.... ..."

### Table 2 provides examples of malicious code understood in our policy-based framework.

### Table 7.1. Policy-Based Growth Projections, GDP Per Capita (percent)

2001

### Table 3: Optimal policy based on actual solution quality.

1996

"... In PAGE 4: ... Without monitoring, the optimal running time of the al- gorithmis eight time-steps, withan expected value of 269:2. Assuming solution quality can be measured accurately by the run-time monitor(an unrealisticassumption in this case) and assuming a monitoringcost of 1, the dynamic program- ming algorithm described earlier computes the monitoring policy shown in Table3 . The number in each cell of Ta-... In PAGE 5: ...4.) The policyshown in Table3 was constructedby assuming the actual quality of an approximate solution could be mea- sured by the run-time monitor, an unrealistic assumption because measuring the quality of the current tour requires knowing the length of an optimal tour. The average length of an optimal tour can provide a very rough estimate of the optimal tour length in a particular case, and this can be used to estimate the quality of the current tour.... ..."

Cited by 34

### Table 3: Optimal policy based on actual solution quality.

1996

"... In PAGE 4: ... Without monitoring, the optimal running time of the al- gorithmis eight time-steps, with an expected value of 269:2. Assuming solution quality can be measured accurately by the run-time monitor (an unrealistic assumption in this case) and assuming a monitoring cost of 1, the dynamic program- ming algorithm described earlier computes the monitoring policy shown in Table3 . The number in each cell of Ta- ble 3 represents how much additional time to allocate to the... In PAGE 5: ...4.) The policy shown in Table3 was constructedby assuming the actual quality of an approximate solution could be mea- sured by the run-time monitor, an unrealistic assumption because measuring the quality of the current tour requires knowing the length of an optimal tour. The average length of an optimal tour can provide a very rough estimate of the optimal tour length in a particular case, and this can be used to estimate the quality of the current tour.... ..."

Cited by 34

### Table 2. Scenarios for Policy based Access Control contd.

2004

Cited by 1