Academic literature on the topic 'Permission lattices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Permission lattices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Permission lattices"

1

Ji, Yanda, Rui Pan, Hanyang Chen, et al. "Shear strain stabilized high-temperature metallic monoclinic VO2 variants with symmetry permission." Applied Physics Letters 122, no. 11 (2023): 111603. http://dx.doi.org/10.1063/5.0136980.

Full text
Abstract:
In this work, temperature-dependent in situ x-ray diffraction reciprocal space mappings are employed to reveal three-dimensional lattice shear deformation in epitaxial VO2 variants, and linear Lagrangian strain tensors of epitaxial lattices are deduced by metric tensors of the reciprocal space at various temperatures. An equilibrium modulated-monoclinic phase is identified above the critical temperature, which is permitted in a translationengleiche subgroup from high symmetry with an index of 4. Being different from the conventional low-temperature monoclinic phase, the high-temperature monocl
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Tao, and Qiang Wu. "Role Minimization Optimization Algorithm Based on Concept Lattice Factor." Mathematics 11, no. 14 (2023): 3047. http://dx.doi.org/10.3390/math11143047.

Full text
Abstract:
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains. One of the critical challenges in RBAC is the efficient assignment of roles to users while minimizing the number of roles involved. This article presents a novel role minimization optimization algorithm (RMOA) based on the concept lattice factor to address this challenge. The proposed RMOA leverages the concept lattice, a mathematical structure derived from formal concept analysis, to model and analyze the relationships between roles, p
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Zhiwu, Hongxu Chen, Alwen Tiu, Yang Liu, and Kunal Sareen. "A permission-dependent type system for secure information flow analysis." Journal of Computer Security 29, no. 2 (2021): 161–228. http://dx.doi.org/10.3233/jcs-200036.

Full text
Abstract:
We introduce a novel type system for enforcing secure information flow in an imperative language. Our work is motivated by the problem of statically checking potential information leakage in Android applications. To this end, we design a lightweight type system featuring Android permission model, where the permissions are statically assigned to applications and are used to enforce access control in the applications. We take inspiration from a type system by Banerjee and Naumann to allow security types to be dependent on the permissions of the applications. A novel feature of our type system is
APA, Harvard, Vancouver, ISO, and other styles
4

D’Antoni, Loris, Shuo Ding, Amit Goel, Mathangi Ramesh, Neha Rungta, and Chungha Sung. "Automatically Reducing Privilege for Access Control Policies." Proceedings of the ACM on Programming Languages 8, OOPSLA2 (2024): 763–90. http://dx.doi.org/10.1145/3689738.

Full text
Abstract:
Access control policies are programs used to secure cloud resources. These polices should only grant the necessary permissions that a given application needs. However, it is challenging to write and maintain policies as applications and their required permissions change over time. In this paper, we focus on the Amazon Web Services (AWS) IAM policy language and present an approach that, given a policy, synthesizes a modified policy that is more restrictive and better abides to the principle of least privilege. Our approach looks at the actual access history (e.g., access logs) used by an applic
APA, Harvard, Vancouver, ISO, and other styles
5

Bogachenko, N. F. "Permissions engineering in the task of constructing a role-based access control policy." Mathematical structures and modeling, no. 1 (2024): 94–102. http://dx.doi.org/10.24147/2222-8772.2024.1.94-102.

Full text
Abstract:
The problem of role engineering is extended by the subproblem of permissions engineering. It is assumed that discretionary access control is specified in the information system. To build a role-based security policy, a technique based on algorithms for formal concept analysis is proposed. Based on the access matrix, a Galois lattice is constructed, the nodes of which are interpreted as possible permissions. Criteria for choosing the optimal set of permissions are determined and a heuristic algorithm for solving the problem is discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

MERIN, ARTHUR. "Permission Sentences Stand in the Way of Boolean and Other Lattice–Theoretic Semantices." Journal of Semantics 9, no. 2 (1992): 95–162. http://dx.doi.org/10.1093/jos/9.2.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

S. Akshaya Subhasri, R., M. Ranganayaki, K. Ulaga Priya, K. Kalaivani, and A. Sartiha. "A Survey on Secure and Verifiable Access Control Scheme for Enormous Information Storage In Clouds." International Journal of Engineering & Technology 7, no. 3.27 (2018): 412. http://dx.doi.org/10.14419/ijet.v7i3.27.17986.

Full text
Abstract:
A secure and verifiable access control scheme for enormous information storage in cloud is based on open source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data .To overcome the decryption failures of the original LLL, the NTRU decryption algorithm is analysed. It allows to analyze it correctness, accuracy, security qualities and computational effectiveness. When a new entry permission is granted by the data users. It allows the cloud main system to update the cipher method details. It also able to update the counter against the hacking behavior on the c
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiayu, Yineng Chen, Xinghui Zhu, Cheng Li, and Kui Fang. "A Redactable Blockchain Scheme Supporting Quantum-Resistance and Trapdoor Updates." Applied Sciences 14, no. 2 (2024): 832. http://dx.doi.org/10.3390/app14020832.

Full text
Abstract:
Applying chameleon hash functions to redactable blockchains is still challenging work. Most redactable blockchain solutions using this technique have potential problems, such as too weak decentralization performance and trapdoors with exposure risks. In addition, quantum computing also threatens the security of blockchain systems. The above two issues imply that the development of redactable blockchains is still constrained, and that quantum-resistance will be requirements for blockchain applications. Therefore, we constructed a chameleon hash function over lattices while utilizing a hierarchi
APA, Harvard, Vancouver, ISO, and other styles
9

Schwab, R., J. Reade, and M. Jankauski. "Quasi three-dimensional deformable blade element and unsteady vortex lattice reduced-order modeling of fluid–structure interaction in flapping wings." Physics of Fluids 34, no. 12 (2022): 121903. https://doi.org/10.5281/zenodo.7650964.

Full text
Abstract:
Flapping, flexible insect wings deform under inertial and fluid loading. Deformation influences aerodynamic force generation and sensorimotor control, and is thus important to insect flight mechanics. Conventional flapping wing fluid–structure interaction models provide detailed information about wing deformation and the surrounding flow structure, but are impractical in parameter studies due to their considerable computational demands. Here, we develop two quasi three-dimensional reduced-order models (ROMs) capable of describing the propulsive forces/moments and deformation profiles of flexib
APA, Harvard, Vancouver, ISO, and other styles
10

CAMELO-NETO, G., and S. COUTINHO. "DYNAMICAL MODEL FOR VIRUS SPREAD." Fractals 04, no. 02 (1996): 113–22. http://dx.doi.org/10.1142/s0218348x96000169.

Full text
Abstract:
The steady state properties of the mean density population of infected cells in a viral spread is simulated by a general forest like cellular automaton model with two distinct populations of cells (permissive and resistant ones) and studied in the framework of the mean field approximation. Stochastic dynamical ingredients are introduced into this model to mimic cells regeneration (with probability p) and to consider infection processes by other means than contiguity (with probability f). Simulations are carried out on a L×L square lattice taking into consideration the eighth first neighbors. T
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!