نتایج جستجو برای: enforcement mechanisms
تعداد نتایج: 555562 فیلتر نتایج به سال:
An Innovative Simulation Environment for Cross-Domain Policy Enforcement Lifeng Wang, Zhengping Wu Department of Computer Science and Engineering University of Bridgeport, Bridgeport, CT Policy-based management is necessary for cross-domain organization collaborations and system integrations. In reality different systems from different organizations or domains have very different high-level pol...
What explains cross-country differences in the cost of contract enforcement? Previous findings suggest that fewer legal complexities support lower contract enforcement costs. In addition, recent work finds that individuals may rely on informal, cultural means to enforce agreements. Building from these two main bodies of work, this paper seeks to understand the variation of the costs of enforcin...
In this paper we present a framework for building policy-based autonomic distributed agent systems. The autonomic mechanisms of configuration and recovery are supported through a distributed event processing model and a set of policy enforcement mechanisms embedded in an agent framework. Policies are event-driven rules derived from the system’s functional and non-functional requirements. Agents...
right of enforcement developed to the right of effective enforcement which both rooted in judicial protection. effective enforcement needs to foresee clear and useful, expeditious and cheap methods that helps the collection of defendant’s financial information and facilitates voluntary enforcement of judgment and finally use of professional and independent persons in execution process. in irani...
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its ...
Privacy in business processes for providing personalized services is currently a matter of trust. Business processes require the disclosure of personal data to third parties and users are not able to control their usage and so their further disclosure. Existing privacy-enhancing technologies consider access control but not usage control of personal data. The current work on usage control mainly...
This paper focuses on the formal assessment of the properties of cooperation enforcement mechanisms used to detect and prevent selfish behavior of nodes forming a mobile ad hoc network. In the first part, we demonstrate the requirement for a cooperation enforcement mechanism using cooperative game theory that allows us to determine a lower bound on the size of coalitions of cooperating nodes. I...
This thesis proposes the MAP-REDUCE framework, a programmable framework, that can be used to construct enforcement mechanisms of different security policies. The framework is based on the idea of secure multiexecution in which multiple copies of the controlled program are executed. In order to construct an enforcement mechanism of a policy, users have to write a MAP program and a REDUCE program...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید