Sciweavers

379 search results - page 4 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
LISP
2008
97views more  LISP 2008»
13 years 7 months ago
Efficient and flexible access control via Jones-optimal logic program specialisation
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Steve Barker, Michael Leuschel, Mauricio Varea
RTCSA
2009
IEEE
14 years 2 months ago
Towards Hardware Support for Common Sensor Processing Tasks
—Sensor processing is a common task within many embedded system domains, such as in control systems, the sensor feedback is used for actuator control. In this paper we have surve...
Adwait Gupte, Phillip Jones
MMMACNS
2005
Springer
14 years 1 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
TGC
2007
Springer
14 years 1 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
ECCV
1994
Springer
13 years 11 months ago
Integration and Control of Reactive Visual Processes
This paper describes a new approach to the integration and control of continuously operating visual processes. Visual processes are expressed as transformations which map signals ...
James L. Crowley, Jean Marc Bedrune, Morten Bekker...