Sciweavers

5252 search results - page 23 / 1051
» Logic in Access Control
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
13 years 5 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
DLOG
2010
13 years 8 months ago
The Logical Difference For Fuzzy EL+ Ontologies
Abstract. Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it i...
Shasha Feng, Yonggang Zhang, Dantong Ouyang, Haiya...
RELMICS
1998
Springer
14 years 2 months ago
Coping with semilattices of relations in logics with relative accessibility relations
We present a class of polymodal logics for which the set of terms indexing the modal connectives can be hierarchized in two levels: the set of Boolean terms and the set of terms b...
Stéphane Demri
COMPSAC
2006
IEEE
14 years 4 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
FUZZY
1999
Springer
314views Fuzzy Logic» more  FUZZY 1999»
14 years 2 months ago
Control of Robot Arm Approach by Fuzzy Pattern Comparison Technique
Mirjana Bonkovic, Darko Stipanicev, Maja Stula