نتایج جستجو برای: policy control
تعداد نتایج: 1561601 فیلتر نتایج به سال:
This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the intuitions it seeks to formalise. Several alternative definitions are discussed, which are shown to be equivalent to the classical definition of noninterference with respect to transitive policies. Rushby’s unwinding conditions fo...
Mandatory access control has traditionally been employed as a robust security mechanism in critical environments like military ones. As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible access control mechanisms. Aggregating mandatory models with context-awareness would provide us with essential means to define dynamic policies needed ...
left-turn lanes; that is, protected left-turn control is recommended if the number of left-turn lanes exceeds 1. Such a decision process lacks a balanced consideration of other factors such as opposing traffic volume, which may be very low; therefore, the decision may not be rational at all locations or under all conditions. In many cases, an alternative left-turn control type might provide equ...
Group communication systems increasingly provide security services. However, in practice, the use of such systems is complicated by the divergent requirements and abilities of group members. In this paper, we define a policy language called Ismene that directs the provisioning of security-related resources at member sites. The communication service is defined through a reconciliation of a group...
Enforcement is one of the greatest challenges in environmental policy-making. Even when policies are well-designed theoretically, they will not deliver the intended effects if the difficulties of enforcement are not explicitly incorporated in their design. Much of the rationale for the use of economic instruments is an attempt to economize on the informational requirements of policies and reduc...
For single-criterion stochastic control and sequential decision problems, optimal policies, if they exist, are typically nonrandomized. For problems with multiple criteria and constraints, optimal nonrandomized policies may not exist and, if optimal policies exist, they are typically randomized. In this paper we discuss certain conditions that lead to optimality of nonrandomized policies. In th...
Wang, Qihua. Ph.D., Purdue University, May 2009. Access Control Policy Management. Major Professor: Ninghui Li. Access control is the traditional center of gravity of computer security [1]. People specify access control policies to control accesses to resources in computer systems. The management of access control policies include policy specification and policy analysis. In this dissertation, ...
Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights necessary to perform assigned duties. As a consequence, access control mechanisms are perceived by use...
Personal location data is stored as the result of using equipment that many people now own or have access to. Typically this data contains details of identity, location and the time the equipment was used. The data is usually stored in a central repository, held by the organisation owning the network or related equipment, and it is assumed that access controls are in place and privacy policies ...
We introduce two online gradient-based reinforcement learning algorithms with function approximation – one model based, and the other model free – for which we provide a regret analysis. Our regret analysis has the benefit that, unlike many other gradient based algorithm analyses for reinforcement learning with function approximation, it makes no probabilistic assumptions meaning that we need n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید