نتایج جستجو برای: delegation
تعداد نتایج: 3322 فیلتر نتایج به سال:
FRAMEWORK FOR ROLE-BASED DELEGATION MODELS Ezedin S. Barka, Ph.D. George Mason University, 2002 Dissertation Director: Dr. Ravi S. Sandhu The basic idea behind delegation is that some active entity in a system delegates authority to another active entity in order to carry out some functions on behalf of the former. Delegation can take many forms: human to human, human to machine, machine to mac...
In this paper we explore the relationship between selforganization of multiagent systems and adjustable autonomy in intelligent agents. To discuss multiagent organizations, we introduce the Framework for selfOrganization and Robustness in Multiagent systems (FORM). This framework uses delegation as the central concept to define organizational relationships in taskassignment multiagent systems. ...
The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the ...
Delegation is the process whereby a user in a distributed environment authorizes a system to access remote resources on his behalf. In today’s distributed systems where all the resources required to carry out an operation are rarely local to the system to which the user is logged in, delegation is more often the rule than the exception. Yet, even with the use of state-of-the-art authentication ...
This article reviews the strategic delegation literature and provides a theoretical framework that integrates this perspective into management research. The strategic delegation literature is built on the observation that, under strategic interdependence, delegation of decision making and accompanying actions can serve as commitments that influence competitive interactions with rivals and lead ...
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, delegation should be performed in a way that preserves security. Uses of delegation range from public administration to smart cards. In this paper, correctness and security requirements as well as protocols are specifie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید