Sciweavers

5252 search results - page 37 / 1051
» Logic in Access Control
Sort
View
SACMAT
2010
ACM
14 years 3 months ago
Towards analyzing complex operating system access control configurations
Hong Chen, Ninghui Li, Christopher S. Gates, Ziqin...
ISLPED
2003
ACM
88views Hardware» more  ISLPED 2003»
14 years 3 months ago
Reducing data cache energy consumption via cached load/store queue
High-performance processors use a large set–associative L1 data cache with multiple ports. As clock speeds and size increase such a cache consumes a significant percentage of t...
Dan Nicolaescu, Alexander V. Veidenbaum, Alexandru...
RTSS
2002
IEEE
14 years 3 months ago
An Implicit Prioritized Access Protocol for Wireless Sensor Networks
Marco Caccamo, Lynn Y. Zhang, Lui Sha, Giorgio C. ...
TARK
2009
Springer
14 years 5 months ago
A logic of propositional control for truthful implementations
We introduce a logic designed to support reasoning about social choice functions. The logic includes operators to capture strategic ability, and operators to capture agent prefere...
Nicolas Troquard, Wiebe van der Hoek, Michael Wool...
SACMAT
2009
ACM
14 years 5 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri