Sciweavers

1150 search results - page 59 / 230
» Specifying Information-Flow Controls
Sort
View
ICWS
2004
IEEE
13 years 10 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
AROBOTS
2008
90views more  AROBOTS 2008»
13 years 9 months ago
Controller design for human-robot interaction
Many robotics tasks require a robot to share the same workspace with humans. In such settings, it is important that the robot performs in such a way that does not cause distress t...
Eric Meisner, Volkan Isler, Jeff Trinkle
ACIIDS
2009
IEEE
105views Database» more  ACIIDS 2009»
13 years 7 months ago
Stability Analysis of Fuzzy Control for Nonlinear Systems
In this study, we propose a method of stability analysis for a GA-Based reference ANNC capable of handling these types of problems for a nonlinear system. The initial values of the...
Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ESORICS
2002
Springer
14 years 9 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti