Sciweavers

3979 search results - page 7 / 796
» Wild control operators
Sort
View
CSFW
2006
IEEE
14 years 1 months ago
On Key Assignment for Hierarchical Access Control
A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key ...
Jason Crampton, Keith M. Martin, Peter R. Wild
ECAI
2000
Springer
13 years 11 months ago
Incorporation of Temporal Logic Control into Plan Operators
Domain-specific control information is often essential in solving difficult planning problems efficiently. Temporal logics are a declarative and expressive representation for su...
Jussi Rintanen
SACMAT
2003
ACM
14 years 10 days ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
SSS
2005
Springer
14 years 17 days ago
Self-stabilization with r-Operators Revisited
Sylvie Delaët, Bertrand Ducourthial, Sé...
FLOPS
2008
Springer
13 years 8 months ago
Typed Dynamic Control Operators for Delimited Continuations
Abstract. We study the dynamic control operators for delimited continuations, control and prompt. Based on recent developments on purely functional CPS translations for them, we in...
Yukiyoshi Kameyama, Takuo Yonezawa