Sciweavers

5252 search results - page 56 / 1051
» Logic in Access Control
Sort
View
100
Voted
STTT
2008
134views more  STTT 2008»
15 years 14 days ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
INFOCOM
2005
IEEE
15 years 6 months ago
Achieving faster access to satellite link bandwidth
TCP with Van Jacobson congestion control (VJCC) is known to have poor performance over large bandwidthdelay product paths. Long delay paths, in particular, can display very poor b...
A. Kapoor, Aaron Falk, Theodore Faber, Y. Pryadkin
SIMPRA
2008
137views more  SIMPRA 2008»
15 years 1 days ago
An admissible-behaviour-based analysis of the deadlock in Petri-net controllers
This paper addresses the problem of verifying the discrete control logic that is typically implemented by programmable controllers. Not only are the logical properties of the cont...
G. Music, Drago Matko
105
Voted
SACMAT
2009
ACM
15 years 7 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
114
Voted
JCP
2008
124views more  JCP 2008»
15 years 16 days ago
Novel Fuzzy Logic Controllers with Self-Tuning Capability
Two controllers which extend the PD+I fuzzy logic controller to deal with the plant having time varying nonlinear dynamics are proposed. The adaptation ability of the first self tu...
Fong Chwee Teng, Ahmad Lotfi, Ah Chung Tsoi