Sciweavers

5252 search results - page 43 / 1051
» Logic in Access Control
Sort
View
BTW
2005
Springer
177views Database» more  BTW 2005»
14 years 4 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
ENGL
2006
110views more  ENGL 2006»
13 years 10 months ago
Intelligent Control of an Autonomous Mobile Robot using Type-2 Fuzzy Logic
We develop a tracking controller for the dynamic model of unicycle mobile robot by integrating a kinematic controller and a torque controller based on Fuzzy Logic Theory. Computer ...
Leslie Astudillo, Oscar Castillo, Patricia Melin, ...
AINA
2007
IEEE
14 years 5 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
FASE
2008
Springer
14 years 15 days ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
AINA
2007
IEEE
14 years 5 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang