Sciweavers

5252 search results - page 62 / 1051
» Logic in Access Control
Sort
View
SOCIALCOM
2010
13 years 8 months ago
OSNAC: An Ontology-based Access Control Model for Social Networking Systems
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
Amirreza Masoumzadeh, James B. D. Joshi
IJCSS
2000
84views more  IJCSS 2000»
13 years 10 months ago
Self-Optimization Combined with Fuzzy Logic Control for Ball Mill
A new control strategy of self-optimization combined with fuzzy logic control for ball mill is proposed in the paper. This new control strategy is implemented in a Thermal Power Pl...
Lixin Jia, Xinzhong Li
GLVLSI
1996
IEEE
145views VLSI» more  GLVLSI 1996»
14 years 3 months ago
Boolean Function Representation Using Parallel-Access Diagrams
Inthispaperweintroduceanondeterministiccounterpart to Reduced, Ordered Binary Decision Diagrams for the representation and manipulation of logic functions. ROBDDs are conceptually...
Valeria Bertacco, Maurizio Damiani
IM
2003
14 years 5 days ago
Multiple Authorization - A Model and Architecture for Increased, Practical Security
: Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations...
Gerald Vogt
CR
2001
151views Education» more  CR 2001»
14 years 5 days ago
Layers of Meaning: Disentangling Subject Access Interoperability
ACT n are ge. subject access ieved. In order to facilitate subject access interoperability a mechanism must be built that allows the different controlled vocabularies to communicat...
Joseph T. Tennis