We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,588 results
  1. A Formal Approach for the Identification of Authorization Policy Conflicts within Multi-Cloud Environments

    The use of the Cloud computing has been constantly on the rise. The flexible billing model coupled with elastic resource provisioning make the Cloud...

    Ehtesham Zahoor, Asim Ikram, ... Olivier Perrin in Journal of Grid Computing
    Article 20 May 2022
  2. Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution

    Network Function Virtualization (NFV) is a new technology that allows service providers to improve the cost efficiency of network service...

    Hanan Suwi, Nadjia Kara, ... Yves Lemieux in Journal of Network and Systems Management
    Article 12 June 2024
  3. The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?

    This article aims to analyze the current unpredictable cyber climate. In particular, Russia’s invasion of Ukraine has heightened concerns about...

    Fabian Teichmann, Sonia R. Boticiu, Bruno S. Sergi in International Cybersecurity Law Review
    Article 13 July 2023
  4. Detection of SDN Flow Rule Conflicts Based on Knowledge Graph

    Software-Defined Network (SDN) separates the control plane and data plane to provide a more flexible network. In that case, switches only need to...
    Conference paper 2023
  5. A certified access control policy language: TEpla

    Access control is an information security process which guards protected resources against unauthorized access, as specified by restrictions in...

    Article 28 August 2023
  6. Model gradient: unified model and policy learning in model-based reinforcement learning

    Model-based reinforcement learning is a promising direction to improve the sample efficiency of reinforcement learning with learning a model of the...

    Chengxing Jia, Fuxiang Zhang, ... Yang Yu in Frontiers of Computer Science
    Article 27 December 2023
  7. An AI ethics ‘David and Goliath’: value conflicts between large tech companies and their employees

    Artificial intelligence ethics requires a united approach from policymakers, AI companies, and individuals, in the development, deployment, and use...

    Mark Ryan, Eleni Christodoulou, ... Kalypso Iordanou in AI & SOCIETY
    Article Open access 31 March 2022
  8. Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach

    Policy-map** mechanisms can efficiently help to realize the exchange and the sharing of cross-domain information at low cost. However, due to...
    Yunchuan Guo, **yang Sun, ... Zifu Li in Computational Science – ICCS 2021
    Conference paper 2021
  9. Policy advice and best practices on bias and fairness in AI

    The literature addressing bias and fairness in AI models ( fair-AI ) is growing at a fast pace, making it difficult for novel researchers and...

    Jose M. Alvarez, Alejandra Bringas Colmenarejo, ... Salvatore Ruggieri in Ethics and Information Technology
    Article Open access 29 April 2024
  10. Policy Guidelines for Smart Sanitation Technology as a Public Health Tool

    Smart sanitation technology, or SST, refers to digital technologies applied to the sanitation industry. The breadth of applications can be wide, and...

    Maria Carnovale in Digital Society
    Article 07 March 2024
  11. Towards Jum** Skill Learning by Target-guided Policy Optimization for Quadruped Robots

    Endowing quadruped robots with the skill to forward jump is conducive to making it overcome barriers and pass through complex terrains. In this...

    Chi Zhang, Wei Zou, ... Shuomo Zhang in Machine Intelligence Research
    Article 22 February 2024
  12. Application of International Law to Cyber Conflicts Outline of Japan’s Legal Response Against Low-Intensity Cyber Conflicts Through Countermeasures

    Cyber conflicts are an important security challenge, but the applicable legal regime remains ambiguous. Especially, low-intensity cyber conflicts,...
    Conference paper 2022
  13. Security Policy Learning

    Security Policies define rules aiming to protect the infrastructure from insider and outsider threats. A key component to achieving this goal is...
    Elisa Bertino, Sonam Bhardwaj, ... Ashraf Y. Mahgoub in Machine Learning Techniques for Cybersecurity
    Chapter 2023
  14. Policy Issues

    The application of Artificial Intelligence Cyber defense Agents (or AICA) poses policy challenges to civil and military doctrine- and policy-makers....
    Chapter 2023
  15. Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches

    Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding,...

    **anfeng Li, Haoran Sun, Yan Huang in Journal of Network and Systems Management
    Article 18 June 2024
  16. The Indian approach to Artificial Intelligence: an analysis of policy discussions, constitutional values, and regulation

    India has produced several drafts of data policies. In this work, they are referred to [1] JBNSCR 2018, [2] DPDPR 2018, [3] NSAI 2018, [4] RAITF...

    P. R. Biju, O. Gayathri in AI & SOCIETY
    Article 11 May 2023
  17. Evaluating the Performance Impact of No-Wait Approach to Resolving Write Conflicts in Databases

    A model of a large distributed database where write conflicts are handled by wait-free aborting of transactions, is introduced and analysed in the...
    Paul Ezhilchelvan, Isi Mitrani, ... Yingming Wang in Computer Performance Engineering and Stochastic Modelling
    Conference paper 2023
  18. Defining a Remote Work Policy: Aligning Actions and Intentions

    After the long period of forced work from home, many knowledge workers have not only developed a strong habit of remote work, but also consider...
    Conference paper Open access 2024
  19. Understanding the influence of news on society decision making: application to economic policy uncertainty

    The abundance of digital documents offers a valuable chance to gain insights into public opinion, social structure, and dynamics. However, the scale...

    Paul Trust, Ahmed Zahran, Rosane Minghim in Neural Computing and Applications
    Article Open access 31 March 2023
  20. APPCorp: a corpus for Android privacy policy document structure analysis

    With the increasing popularity of mobile devices and the wide adoption of mobile Apps, an increasing concern of privacy issues is raised. Privacy...

    Shuang Liu, Fan Zhang, ... Meishan Zhang in Frontiers of Computer Science
    Article 12 September 2022
Did you find what you were looking for? Share feedback.