J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information, such as social resources and physical resources, are deeply integrated for different …
Access control policy is typically defined in terms of attributes, but in many applications it is more natural to define permissions in terms of relationships that resources, systems, and …
D Basin, F Klaedtke, S Marinovic… - Runtime Verification: Third …, 2013 - Springer
When monitoring system behavior to check compliance against a given policy, one is sometimes confronted with incomplete knowledge about system events. In IT systems, such …
F Li, Z Li, W Han, T Wu, L Chen… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
With wide development of various information technologies, our daily activities are becoming deeply dependent on cyberspace. People often use handheld devices (eg …
B Hamid, S Gürgens, A Fuchs - Innovations in Systems and Software …, 2016 - Springer
Pattern-based development of software systems has gained more attention recently by addressing new challenges such as security and dependability. However, there are still …
H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real applications. In order to predict the quality scores of document images, this paper proposes …
K Arkoudas, R Chadha, J Chiang - ACM Transactions on Information and …, 2014 - dl.acm.org
We introduce a new methodology for formulating, analyzing, and applying access-control policies. Policies are expressed as formal theories in the SMT (satisfiability-modulo-theories) …
L Ceragioli, P Degano, L Galletta, L Viganò - arXiv preprint arXiv …, 2024 - arxiv.org
People increasingly use digital platforms to exchange resources in accordance to some policies stating what resources users offer and what they require in return. In this paper, we …