Sciweavers

807 search results - page 6 / 162
» Term Rewriting for Access Control
Sort
View
RBAC
1997
234views more  RBAC 1997»
13 years 8 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley
MFCS
2009
Springer
14 years 1 months ago
Synthesis for Structure Rewriting Systems
Abstract. The description of a single state of a modelled system is often complex in practice, but few procedures for synthesis address this problem in depth. We study systems in w...
Lukasz Kaiser
ALP
1994
Springer
13 years 11 months ago
A Sequential Reduction Strategy
Kennaway proved the remarkable result that every (almost) orthogonal term rewriting system admits a computable sequential normalizing reduction strategy. In this paper we present ...
Sergio Antoy, Aart Middeldorp
GLOBECOM
2006
IEEE
14 years 1 months ago
Multi-Fasnet Protocol: Short-Term Fairness Control in WDM Slotted MANs
— Single-hop wavelength division multiplexing (WDM) ring networks operating in packet mode are a promising architecture for the design of innovate Metropolitan Area Networks. The...
Andrea Bianco, Davide Cuda, Jorge M. Finochietto, ...
ICC
2009
IEEE
196views Communications» more  ICC 2009»
14 years 2 months ago
Joint Flow Control, Routing and Medium Access Control in Random Access Multi-Hop Wireless Networks
This work extends the existing static framework for joint flow control, routing and medium access control (MAC) in random access multi-hop wireless networks to a dynamic framewor...
Sucha Supittayapornpong, Poompat Saengudomlert