Contents
Academic literature on the topic 'Permission lattices'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Permission lattices.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Permission lattices"
Ji, Yanda, Rui Pan, Hanyang Chen, et al. "Shear strain stabilized high-temperature metallic monoclinic VO2 variants with symmetry permission." Applied Physics Letters 122, no. 11 (2023): 111603. http://dx.doi.org/10.1063/5.0136980.
Full textWang, Tao, and Qiang Wu. "Role Minimization Optimization Algorithm Based on Concept Lattice Factor." Mathematics 11, no. 14 (2023): 3047. http://dx.doi.org/10.3390/math11143047.
Full textXu, Zhiwu, Hongxu Chen, Alwen Tiu, Yang Liu, and Kunal Sareen. "A permission-dependent type system for secure information flow analysis." Journal of Computer Security 29, no. 2 (2021): 161–228. http://dx.doi.org/10.3233/jcs-200036.
Full textD’Antoni, Loris, Shuo Ding, Amit Goel, Mathangi Ramesh, Neha Rungta, and Chungha Sung. "Automatically Reducing Privilege for Access Control Policies." Proceedings of the ACM on Programming Languages 8, OOPSLA2 (2024): 763–90. http://dx.doi.org/10.1145/3689738.
Full textBogachenko, N. F. "Permissions engineering in the task of constructing a role-based access control policy." Mathematical structures and modeling, no. 1 (2024): 94–102. http://dx.doi.org/10.24147/2222-8772.2024.1.94-102.
Full textMERIN, ARTHUR. "Permission Sentences Stand in the Way of Boolean and Other Lattice–Theoretic Semantices." Journal of Semantics 9, no. 2 (1992): 95–162. http://dx.doi.org/10.1093/jos/9.2.95.
Full textS. Akshaya Subhasri, R., M. Ranganayaki, K. Ulaga Priya, K. Kalaivani, and A. Sartiha. "A Survey on Secure and Verifiable Access Control Scheme for Enormous Information Storage In Clouds." International Journal of Engineering & Technology 7, no. 3.27 (2018): 412. http://dx.doi.org/10.14419/ijet.v7i3.27.17986.
Full textWang, Xiayu, Yineng Chen, Xinghui Zhu, Cheng Li, and Kui Fang. "A Redactable Blockchain Scheme Supporting Quantum-Resistance and Trapdoor Updates." Applied Sciences 14, no. 2 (2024): 832. http://dx.doi.org/10.3390/app14020832.
Full textSchwab, R., J. Reade, and M. Jankauski. "Quasi three-dimensional deformable blade element and unsteady vortex lattice reduced-order modeling of fluid–structure interaction in flapping wings." Physics of Fluids 34, no. 12 (2022): 121903. https://doi.org/10.5281/zenodo.7650964.
Full textCAMELO-NETO, G., and S. COUTINHO. "DYNAMICAL MODEL FOR VIRUS SPREAD." Fractals 04, no. 02 (1996): 113–22. http://dx.doi.org/10.1142/s0218348x96000169.
Full text