2,379 Hits in 4.3 sec

A new approach for WS-Policy Intersection using Partial Ordered Sets

Abeer Elsafie, Christian Mainka, Jörg Schwenk
2013 Central-European Workshop on Services and their Composition  
This paper introduces a new approach for reaching intersection by computing adjustments to the policies using partial ordering.  ...  WS-Policy is a framework that can be used to describe assertions for web services message exchange.  ...  Conclusions and Future Work This paper presents a model for WS-Policy Intersection using Partial ordered sets.  ... 
dblp:conf/zeus/ElsafieMS13 fatcat:dszwk23ddbgmvo5srovg23fsle

WS-Governance: A Policy Language for SOA Governance [chapter]

José Antonio Parejo, Pablo Fernandez, Antonio Ruiz-Cortés
2011 Lecture Notes in Computer Science  
In order to ease its adoption by SOA practitioners it: i) shares WS-Policy guidelines and is compatible with it, ii) has XML serialization as well as a plain-text one and iii) has a CSP based semantics  ...  More specifically, we focus on problems related to specification and automated analysis of government policies. We propose a novel SOA governance specification model as a solution to these problems.  ...  It is noticeable, that neither the definition of the new concept of Governance Document, nor the use of the DSLs for Governance Policies, break WS-Policy compatibility.  ... 
doi:10.1007/978-3-642-25535-9_19 fatcat:adsmrnj2l5cmtcvtwevjd5cyqa

Defeasible security policy composition for web services

Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter
2006 Proceedings of the fourth ACM workshop on Formal methods in security - FMSE '06  
In addition, the structure of our policies allows for composition to occur using a single operator; this allows for entirely automated composition.  ...  We aim to partially validate these claims here with a formulation of defeasible policy composition for web services, an emerging foundation for B2B commerce on the World Wide Web.  ...  Acknowledgements Lee was supported by the NSF under grants IIS-0331707, CNS-0325951, and CNS-0524695 and by a Motorola Center for Communications Graduate Fellowship.  ... 
doi:10.1145/1180337.1180342 dblp:conf/ccs/LeeBOG06 fatcat:mqbdt35l55bbzb76kshnfuy3ni

Optimized Workflow Authorization in Service Oriented Architectures [chapter]

Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemper
2006 Lecture Notes in Computer Science  
In this paper we present our approach for consolidating the access control of (Web service) workflows.  ...  , and, third, helps to reduce policy enforcement costs.  ...  Depending on the attribute's domain, the comparison operator • is in {<, ≤, =, ≥, >} for totally ordered sets or in { , , =, , } for partially ordered finite sets.  ... 
doi:10.1007/11766155_3 fatcat:moukvfytvre35mhppkwlrobo6u

Using argumentation to model and deploy agent-based applications

Jamal Bentahar, Rafiul Alam, Zakaria Maamar, Nanjangud C. Narendra
2010 Knowledge-Based Systems  
Agents can then jointly find arguments that support a new solution for their conflicts, which is not known by any of them individually.  ...  In this protocol, agents reason about partial information using partial arguments, partial attack, and partial acceptability.  ...  The authors would also like to thank the reviewers for their very helpful comments and suggestions.  ... 
doi:10.1016/j.knosys.2010.01.005 fatcat:27z5kgquqrakvayfpy3qdzcrky

Active reinforcement learning

Arkady Epshteyn, Adam Vogel, Gerald DeJong
2008 Proceedings of the 25th international conference on Machine learning - ICML '08  
However, exact transition probabilities are difficult for experts to specify. One option left to an agent is a long and potentially costly exploration of the environment.  ...  When the transition probabilities and rewards of a Markov Decision Process (MDP) are known, an agent can obtain the optimal policy without any interaction with the environment.  ...  Suppose that for a givenŝ,â and for every policy π, U π ( ,â [T 0 , X]; R 0 ) is a linear function of X|ŝ,â.  ... 
doi:10.1145/1390156.1390194 dblp:conf/icml/EpshteynVD08 fatcat:hk42hsx6ezdtrafjz6acgggpbq

Interactive mesostructures

Scott Nykl, Chad Mourning, David Chelberg
2013 Proceedings of the ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games - I3D '13  
Image sets were created for the least recently used (LRU) update policy [9] and a weighted update policy. Each test was conducted at U = 1, 2, 4, and 64 updates per frame.  ...  If T c ws has changed since the previous notification, update the collision state machine using the new T c ws and the steps defined in the previous list; this searches for any possible collision(s) along  ... 
doi:10.1145/2448196.2448202 dblp:conf/si3d/NyklMC13 fatcat:2c4cbnkx7jfczls5guhebovwey

Verifying the Conformance of Web Services to Global Interaction Protocols: A First Step [chapter]

M. Baldoni, C. Baroglio, A. Martelli, V. Patti, C. Schifanella
2005 Lecture Notes in Computer Science  
This work proposes an approach to the verification of a priori conformance of a business process to a protocol, which is based on the theory of formal languages and guarantees the interoperability of peers  ...  An abstract choreography can be seen as a protocol specification; it does not refer to specific peers and, especially in an open application domain, it might be necessary to retrieve a set of web services  ...  The work in [7] already takes this approach by using WS-CDL and BPEL4WS as complementary design tools: the first design step of an interaction protocol (for the peers of an e-commerce system) consists  ... 
doi:10.1007/11549970_19 fatcat:euticfys2rggxgaisul7q6gjyq

A replicated information system to enable dynamic collaborations in the Grid

Erik Torres, Germán Moltó, Damià Segrelles, Ignacio Blanquer, Vicente Hernández
2012 Concurrency and Computation  
ACKNOWLEDGEMENT The authors wish to thank the financial support received from The Spanish Ministry of Education and Science to develop the project "ngGrid -New Generation Components for the Efficient Exploitation  ...  This work has been partially supported by the Generalitat Valenciana and the Structural Funds of the European Regional Development Fund (ERDF).  ...  Support for Advanced Searches using XQuery and WS-Policy The information system uses an approach that combines XQuery and WS-Policy to manage collections of XML documents of various types.  ... 
doi:10.1002/cpe.1915 fatcat:5kyr22e54fd35kyex7t6zdw3vy

Quality of data driven simulation workflows

Michael Reiter, Uwe Breitenbucher, Oliver Kopp, Dimka Karastoyanova
2012 2012 IEEE 8th International Conference on E-Science  
To realize this Quality of Data-driven workflows, we present middleware architecture and a WS-Policy-based language to describe QoD requirements and capabilities.  ...  In this paper, we propose a generic approach to use QoD as a uniform means to steer complex interdisciplinary simulations implemented as workflows.  ...  As an example, we use the interval [0,1] over the set of real numbers (and an order relation ≤) in our work which is a partially ordered set.  ... 
doi:10.1109/escience.2012.6404417 dblp:conf/eScience/ReiterBKK12 fatcat:2lqbt4ggovcivelriocsd2k6vu

User-centric privacy management for federated identity management

Gail-Joon Ahn, Moonam Ko
2007 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)  
Identity management has been recently considered to be a viable solution for simplifying user management across enterprise applications.  ...  We have witnessed that the Internet is now a prime vehicle for business, community, and personal interactions. The notion of identity is the important component of this vehicle.  ...  We are grateful to Todd Inskeep, Sam Phillips, and Larry Hollowood for their support and encouragement in making this work possible.  ... 
doi:10.1109/colcom.2007.4553829 dblp:conf/colcom/AhnK07 fatcat:v2iufdll75gtvba2pjhne4htci

Designing a Universal Income Support Mechanism for Italy: An Exploratory Tour

Ugo Colombino, Edlira Narazani
2013 Basic Income Studies  
We use a microeconometric model and a social welfare methodology in order to evaluate various alternatives mechanisms.  ...  The set of universalistic policies that are preferable to the current system is however very large and appears to give the opportunity of selecting a best reform according to many different criteria or  ...  However, instead of looking for an analytical solution we adopt a computational-empirical approach. 3 Namely, we use a microeconometric model and a social welfare methodology in order to explore and evaluate  ... 
doi:10.1515/bis-2012-0010 fatcat:3zlwimudtzgwxg453uwhbdqkui

Revenue-Sharing Subsidies as Employment Policy: Reducing the Cost of Stimulating East German Employment [chapter]

Dennis J. Snower
2001 Employment Policy in Transition  
a simple model in which to evaluate two rival policy proposals: wage subsidies and revenue-sharing subsidies.  ...  ABSTRACT Revenue-sharing Subsidies as Employment Policy: Reducing the Cost of Stimulating East German Employment* This paper provides a brief overview of the East German employment problem and presents  ...  Thus the YN curve may be o understood as the equivalent of a wage setting function for incumbents and the YN n curve can be seen as the equivalent of a wage setting function for new entrants.  ... 
doi:10.1007/978-3-642-56560-1_10 fatcat:hjsw6jt7uzdqlnmwmsnvwfmxam

A Computational Logic Application Framework for Service Discovery and Contracting

Marco Alberti, Massimiliano Cattafi, Federico Chesani, Marco Gavanelli, Evelina Lamma, Paola Mello, Marco Montali, Paolo Torroni
2011 International Journal of Web Services Research  
The same operational machinery used for contracting can be used for runtime verification.  ...  To this purpose, the authors consider a formal approach grounded on Computational Logic.  ...  in first order logic, by finding their intersection and translating ontologies to LP clauses.  ... 
doi:10.4018/jwsr.2011070101 fatcat:w6txv2hxcnhlpgfnjix6kawyqi

A Recovery Protocol for Middleware Replicated Databases Providing GSI

J.E. Armendariz, F.D. Munoz-Esco, J.R. Juarez, J.R. G. de Mendivil, B. Kemme
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
Middleware database replication is a way to increase availability and afford site failures for dynamic content websites.  ...  There are several replication protocols that ensure data consistency for these systems.  ...  Kemme for her suggestions in the design of the protocol.  ... 
doi:10.1109/ares.2007.18 dblp:conf/IEEEares/ArmendarizMJMK07 fatcat:or6wub3kw5ekjl4iyg7en4zd54
« Previous Showing results 1 — 15 out of 2,379 results