Sciweavers

5252 search results - page 43 / 1051
» Logic in Access Control
Sort
View
125
Voted
BTW
2005
Springer
177views Database» more  BTW 2005»
15 years 6 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
98
Voted
ENGL
2006
110views more  ENGL 2006»
15 years 17 days ago
Intelligent Control of an Autonomous Mobile Robot using Type-2 Fuzzy Logic
We develop a tracking controller for the dynamic model of unicycle mobile robot by integrating a kinematic controller and a torque controller based on Fuzzy Logic Theory. Computer ...
Leslie Astudillo, Oscar Castillo, Patricia Melin, ...
99
Voted
AINA
2007
IEEE
15 years 7 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
FASE
2008
Springer
15 years 2 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
113
Voted
AINA
2007
IEEE
15 years 7 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang