Sciweavers

5252 search results - page 56 / 1051
» Logic in Access Control
Sort
View
STTT
2008
134views more  STTT 2008»
13 years 10 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
INFOCOM
2005
IEEE
14 years 4 months ago
Achieving faster access to satellite link bandwidth
TCP with Van Jacobson congestion control (VJCC) is known to have poor performance over large bandwidthdelay product paths. Long delay paths, in particular, can display very poor b...
A. Kapoor, Aaron Falk, Theodore Faber, Y. Pryadkin
SIMPRA
2008
137views more  SIMPRA 2008»
13 years 10 months ago
An admissible-behaviour-based analysis of the deadlock in Petri-net controllers
This paper addresses the problem of verifying the discrete control logic that is typically implemented by programmable controllers. Not only are the logical properties of the cont...
G. Music, Drago Matko
SACMAT
2009
ACM
14 years 5 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
JCP
2008
124views more  JCP 2008»
13 years 10 months ago
Novel Fuzzy Logic Controllers with Self-Tuning Capability
Two controllers which extend the PD+I fuzzy logic controller to deal with the plant having time varying nonlinear dynamics are proposed. The adaptation ability of the first self tu...
Fong Chwee Teng, Ahmad Lotfi, Ah Chung Tsoi