Sciweavers

5252 search results - page 61 / 1051
» Logic in Access Control
Sort
View
113
Voted
EUSFLAT
2001
119views Fuzzy Logic» more  EUSFLAT 2001»
15 years 2 months ago
Optimization of evolutionary strategies to achieve knowledge in faded temporal fuzzy logic controllers
In this document we cany out a comparative analysis of the reasoning strategies implemented in Fuzzy Logic Controllers (hereinafter FLCs) and Faded Temporal Fuzzy Logic Controller...
Manuel A. Gadeo Martos, Juan R. Velasco Pér...
81
Voted
GG
2004
Springer
15 years 6 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
107
Voted
ICDCSW
2003
IEEE
15 years 5 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
86
Voted
ENTCS
2007
121views more  ENTCS 2007»
15 years 16 days ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
IJNSEC
2007
127views more  IJNSEC 2007»
15 years 15 days ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan