Sciweavers

3458 search results - page 256 / 692
» Abstracting Control
Sort
View
ICTCS
2005
Springer
15 years 9 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
DATE
2010
IEEE
141views Hardware» more  DATE 2010»
15 years 9 months ago
Loosely Time-Triggered Architectures for Cyber-Physical Systems
Abstract—Cyber-Physical Systems require distributed architectures to support safety critical real-time control. Kopetz’ Time-Triggered Architectures (TTA) have been proposed as...
Albert Benveniste
ICON
2007
IEEE
15 years 10 months ago
Definition and Implementation of Logical Function Blocks Compliant to ForCES Specification
—IETF ForCES (Forwarding and Control Element Separation) is defining specifications for interfaces and modular resources abstractions in open programmable network equipments. Acc...
Ligang Dong, Fenggen Jia, Weiming Wang
COLCOM
2008
IEEE
15 years 10 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
135
Voted
ICRA
2010
IEEE
188views Robotics» more  ICRA 2010»
15 years 1 months ago
Classification and prediction for accurate sensor-based assembly to moving objects
Abstract-- Typical industrial assembly tasks require an accuracy that cannot be realized by only feedback control if a minimum speed is given by a conveyor. Feed-forward has proven...
Friedrich Lange, Johannes Scharrer, Gerd Hirzinger