Sciweavers

379 search results - page 10 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
JUCS
2010
111views more  JUCS 2010»
13 years 8 months ago
Towards a Ubiquitous End-User Programming System for Smart Spaces
: This article presents a rule–based agent mechanism as the kernel of a ubiquitous end–user, UI–independent programming system. The underlying goal of our work is to allow en...
Manuel García-Herranz, Pablo A. Haya, Xavie...
CODASPY
2011
13 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
COMPSAC
2010
IEEE
13 years 7 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
ICFP
2008
ACM
14 years 9 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
IJCM
2008
93views more  IJCM 2008»
13 years 9 months ago
A reinforced learning control using iterative error compensation for uncertain dynamical systems
This paper investigates a learning control using iterative error compensation for uncertain systems to enhance the precision of high speed, computer controlled machining process. ...
Kuei-Shu Hsu, Wen-Shyong Yu, Ming-In Ho