Variations in Access Control Logic

نویسنده

  • Martín Abadi
چکیده

In this paper we investigate the design space of access control logics. Specifically, we consider several possible axioms for the common operator says. Some of the axioms come from modal logic and programming-language theory; others are suggested by ideas from security, such as delegation of authority and the Principle of Least Privilege. We compare these axioms and study their implications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Sensorless Model Reference Adaptive Control of DFIG by Using High Frequency Signal Injection and Fuzzy Logic Control

In this paper, a new sensorless model reference adaptive method is used for direct control of active and reactive power of the doubly fed induction generator (DFIG). In order to estimate the rotor speed, a high frequency signal injection scheme is implemented. In this study, to improve the accuracy of speed estimation, two methods are suggested. First, the coefficients of proportional-integral ...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

A New Implementation of Maximum Power Point Tracking Based on Fuzzy Logic Algorithm for Solar Photovoltaic System

In this paper, we present a modeling and implementation of new control schemes for an isolated photovoltaic (PV) using a fuzzy logic controller (FLC). The PV system is connected to a load through a DC-DC boost converter. The FLC controller provides the appropriate duty cycle (D) to the DC-DC converter for the PV system to generate maximum power. Using FLC controller block in MATLABTM/Simulink e...

متن کامل

Data Acquisition Systems Using Cache Logic FPGAs

Cache Logic is conceptually similar to cache memory. In cache memory, the highest speed memory (usually SRAM) is used to store active data, while the bulk of data resides in lower cost storage, such as DRAM, EPROM, disk, etc. Cache Logic works in a similar fashion. Only a small fraction of the circuitry is active in a system at any given time. Only active functions are loaded into the logic cac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008