Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose. These policies...
Scott M. Walker, Alan Dearle, Stuart J. Norcross, ...
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness...
Sabrina De Capitani di Vimercati, Pierangela Samar...
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative...
This paper analyses the control of nonlinear plant with the changing dynamics. Adaptive controllers, based on fuzzy logics, are synthesized for the control of air pressure and wate...