Sciweavers

5252 search results - page 24 / 1051
» Logic in Access Control
Sort
View
170
Voted
FUZZY
1999
Springer
600views Fuzzy Logic» more  FUZZY 1999»
15 years 4 months ago
Fuzzy Control of a Physical Double Inverted Pendulum Model
Ján Vascák
CODES
2003
IEEE
15 years 5 months ago
A codesigned on-chip logic minimizer
Boolean logic minimization is traditionally used in logic synthesis tools running on powerful desktop computers. However, logic minimization has recently been proposed for dynamic...
Roman L. Lysecky, Frank Vahid
DBSEC
2006
160views Database» more  DBSEC 2006»
15 years 2 months ago
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
Abstract. Controlled Query Evaluation (CQE) offers a logical framework to prevent a user of a database from inadvertently gaining knowledge he is not allowed to know. By modeling t...
Joachim Biskup, Lena Wiese
95
Voted
JCS
2008
94views more  JCS 2008»
15 years 2 days ago
Preprocessing for controlled query evaluation with availability policy
Controlled Query Evaluation (CQE) defines a logical framework to protect confidential information in a database. By modeling a user's a priori knowledge appropriately, a CQE ...
Joachim Biskup, Lena Wiese
ICN
2005
Springer
15 years 6 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...