نتایج جستجو برای: enforcement mechanisms

تعداد نتایج: 555562  

2006
Davide Grossi Huib Aldewereld Frank Dignum

The viability of the application of the e-Institution paradigm for obtaining overall desired behavior in open multiagent systems (MAS) lies in the possibility of bringing the norms of the institution to have an actual impact on the MAS. Institutional norms have to be implemented in the society. The paper addresses two possible views on implementing norms, the so-called regimentation of norms, a...

1993
Todd Fine Spencer E. Minear

The Distributed Trusted Mach (DTMach) program is developing a design for a high-assurance, secure, distributed system based on Mach. To achieve this goal, it is rst necessary to identify the general threats against which DTMach must protect. The next step is to identify control mechanisms that are suucient to protect against each of the threats. The DTMach design makes extensive use of type enf...

2010
Ronald J. Gilson Charles F. Sabel Robert E. Scott Gillian Hadfield Michael Klausner

This Article studies the relationship between formal and informal contract enforcement. The theoretical literature treats the two strategies as separate phenomena. By contrast, a rich experimental literature considers whether the introduction of formal contracting and state enforcement “crowds out” the operation of informal contracting. Both literatures focus too narrowly on how formal contract...

2011
Peter James

The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary before an effective organisational t...

Journal: :Ad Hoc Networks 2005
Pietro Michiardi Refik Molva

This paper focuses on the formal assessment of the properties of cooperation enforcement mechanisms used to detect and prevent selfish behavior of nodes forming a mobile ad hoc network. In the first part, we demonstrate the requirement for a cooperation enforcement mechanism using cooperative game theory that allows us to determine a lower bound on the size of coalitions of cooperating nodes. I...

2011
Åsmund Ahlmann Nyre

Sharing information allows businesses to take advantage of hidden knowledge, improve work processes and cooperation both within and across organisations. Thus there is a need for improved information protection capable of restricting how information is used, as opposed to only accessed. Usage Control has been proposed to achieve this by combining and extending traditional access control, Digita...

2008
Kristen Woyach Anant Sahai

With the development of frequency agile radios comes a new option for using wireless spectrum: cognitive radio. Under this scheme a hierarchical approach is employed in which legacy “primary” users may use the band as they wish, while “secondary” users may take advantage of any unused spectrum. However, as of yet the question of enforcement in cognitive radio is unaddressed, especially in the c...

2006
Alexander Pretschner Christian Schaefer Thomas Walter

Executive Summary This document describes the results of the first two work packages of the research project " Enforcement for Usage Control " , carried out jointly by DoCoMo Euro-Labs and the Information Security group at ETH Zurich. The goal of the project is the development of a server-side architecture that enables the enforcement of usage control requirements at the data consumer's side. D...

2003
Jay Ligatti Lujo Bauer David Walker

We analyze the space of security policies that can be enforced by monitoring and modifying programs at run time. Our program monitors, called edit automata, are abstract machines that examine the sequence of application program actions and transform the sequence when it deviates from a specified policy. Edit automata have a rich set of transformational powers: They may terminate the application...

2014
Hao Zhu Yi Zhuang Xiang Chen

Information declassification aims for trusted release of secret information to public environment. Existing security specifications and enforcement mechanisms of declassification policies have focused on sequential programs. This paper generalized the specification of gradually delimited release policy for sequential programs to the security condition suited for multi-threaded programs. This se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید