Sciweavers

5252 search results - page 61 / 1051
» Logic in Access Control
Sort
View
EUSFLAT
2001
119views Fuzzy Logic» more  EUSFLAT 2001»
14 years 5 days ago
Optimization of evolutionary strategies to achieve knowledge in faded temporal fuzzy logic controllers
In this document we cany out a comparative analysis of the reasoning strategies implemented in Fuzzy Logic Controllers (hereinafter FLCs) and Faded Temporal Fuzzy Logic Controller...
Manuel A. Gadeo Martos, Juan R. Velasco Pér...
GG
2004
Springer
14 years 4 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
ICDCSW
2003
IEEE
14 years 4 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
ENTCS
2007
121views more  ENTCS 2007»
13 years 10 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
IJNSEC
2007
127views more  IJNSEC 2007»
13 years 10 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan