Sciweavers

5252 search results - page 86 / 1051
» Logic in Access Control
Sort
View
LICS
2003
IEEE
15 years 10 months ago
About Translations of Classical Logic into Polarized Linear Logic
We show that the decomposition of Intuitionistic Logic into Linear Logic along the equation ´ may be adapted into a decomposition of classical logic into LLP, the polarized versi...
Olivier Laurent, Laurent Regnier
SACMAT
2005
ACM
15 years 11 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SACMAT
2011
ACM
14 years 8 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
ADC
2009
Springer
175views Database» more  ADC 2009»
16 years 23 hour ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 12 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar