Sciweavers

5252 search results - page 41 / 1051
» Logic in Access Control
Sort
View
AAAI
1993
14 years 2 days ago
The Paradoxical Success of Fuzzy Logic
Applications of fuzzy logic in heuristic control have been highly successful, but which aspects of fuzzy logic are essential to its practical usefulness? This paper shows that an ...
Charles Elkan
ENTCS
2008
104views more  ENTCS 2008»
13 years 10 months ago
A Logic for Virtual Memory
We present an extension to classical separation logic which allows reasoning about virtual memory. Our logic is formalised in the Isabelle/HOL theorem prover in a manner allowing ...
Rafal Kolanski
WETICE
2003
IEEE
14 years 4 months ago
Policy Storage for Role-Based Access Control Systems
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
András Belokosztolszki, David M. Eyers, Wei...
ISCAPDCS
2004
14 years 3 days ago
A Framework for Role-Based Access Control in Group Communication Systems
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access co...
Cristina Nita-Rotaru, Ninghui Li
FROCOS
2009
Springer
14 years 5 months ago
Combining Nonmonotonic Knowledge Bases with External Sources
The developments in information technology during the last decade have been rapidly changing the possibilities for data and knowledge access. To respect this, several declarative k...
Thomas Eiter, Gerhard Brewka, Minh Dao-Tran, Micha...