Sciweavers

5252 search results - page 21 / 1051
» Logic in Access Control
Sort
View
IAJIT
2010
84views more  IAJIT 2010»
14 years 11 months ago
A Test Procedure for Boundary Scan Circuitry in PLDs and FPGAs
: A test procedure for testing mainly the boundary scan cells, and testing partially the test access port controller in programmable logic devices, and field programmable gate arra...
Bashar Al-Khalifa
77
Voted
EUSFLAT
2009
120views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
Characterizing Fuzzy Modal Semantics by Fuzzy Multimodal Systems with Crisp Accessibility Relations
Félix Bou, Francesc Esteva, Lluis Godo, Ric...
CCS
2010
ACM
15 years 7 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
CSREASAM
2008
15 years 2 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
DEON
2008
Springer
15 years 2 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...