نتایج جستجو برای: policy control

تعداد نتایج: 1561601  

2007
Ron van der Meyden

This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the intuitions it seeks to formalise. Several alternative definitions are discussed, which are shown to be equivalent to the classical definition of noninterference with respect to transitive policies. Rushby’s unwinding conditions fo...

2011
Jafar Haadi Jafarian Morteza Amini Rasool Jalili

Mandatory access control has traditionally been employed as a robust security mechanism in critical environments like military ones. As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible access control mechanisms. Aggregating mandatory models with context-awareness would provide us with essential means to define dynamic policies needed ...

2010
Ozlem Ozmen Zong Z. Tian

left-turn lanes; that is, protected left-turn control is recommended if the number of left-turn lanes exceeds 1. Such a decision process lacks a balanced consideration of other factors such as opposing traffic volume, which may be very low; therefore, the decision may not be rational at all locations or under all conditions. In many cases, an alternative left-turn control type might provide equ...

2000
Patrick McDaniel Atul Prakash

Group communication systems increasingly provide security services. However, in practice, the use of such systems is complicated by the divergent requirements and abilities of group members. In this paper, we define a policy language called Ismene that directs the provisioning of security-related resources at member sites. The communication service is defined through a reconciliation of a group...

2006
Bernardo Mueller

Enforcement is one of the greatest challenges in environmental policy-making. Even when policies are well-designed theoretically, they will not deliver the intended effects if the difficulties of enforcement are not explicitly incorporated in their design. Much of the rationale for the use of economic instruments is an attempt to economize on the informational requirements of policies and reduc...

2007
Eugene A. Feinberg

For single-criterion stochastic control and sequential decision problems, optimal policies, if they exist, are typically nonrandomized. For problems with multiple criteria and constraints, optimal nonrandomized policies may not exist and, if optimal policies exist, they are typically randomized. In this paper we discuss certain conditions that lead to optimality of nonrandomized policies. In th...

2009
Qihua Wang Jorge Lobo

Wang, Qihua. Ph.D., Purdue University, May 2009. Access Control Policy Management. Major Professor: Ninghui Li. Access control is the traditional center of gravity of computer security [1]. People specify access control policies to control accesses to resources in computer systems. The management of access control policies include policy specification and policy analysis. In this dissertation, ...

2014

Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights necessary to perform assigned duties. As a consequence, access control mechanisms are perceived by use...

2006
Ian Elcoate Jim Longstaff Paul Massey

Personal location data is stored as the result of using equipment that many people now own or have access to. Typically this data contains details of identity, location and the time the equipment was used. The data is usually stored in a central repository, held by the organisation owning the network or related equipment, and it is assumed that access controls are in place and privacy policies ...

2011
Matthew Robards Peter Sunehag

We introduce two online gradient-based reinforcement learning algorithms with function approximation – one model based, and the other model free – for which we provide a regret analysis. Our regret analysis has the benefit that, unlike many other gradient based algorithm analyses for reinforcement learning with function approximation, it makes no probabilistic assumptions meaning that we need n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید