Now showing items 1-4 of 4
Dynamic Access Control Policies - Specification and Verification
(Oxford University Press, 2012)
Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies ...
A Distance Measure between Labeled Combinatorial Maps
Combinatorial maps are widely used in image representation and processing, however map matching problems have not been extensively researched. This paper addresses the problem of inexact matching between labeled combinatorial ...
Description Logic Based Icons Semantics: An Ontology for Icons
Iconic communication is paramount today in order to assist people with disability (e.g. illiteracy) enjoying, as much as everybody else, the advances in information and communication technologies (e.g. Internet). Previous ...