To see the other types of publications on this topic, follow the link: Permission lattices.

Journal articles on the topic 'Permission lattices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 journal articles for your research on the topic 'Permission lattices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ji, Yanda, Rui Pan, Hanyang Chen, et al. "Shear strain stabilized high-temperature metallic monoclinic VO2 variants with symmetry permission." Applied Physics Letters 122, no. 11 (2023): 111603. http://dx.doi.org/10.1063/5.0136980.

Full text
Abstract:
In this work, temperature-dependent in situ x-ray diffraction reciprocal space mappings are employed to reveal three-dimensional lattice shear deformation in epitaxial VO2 variants, and linear Lagrangian strain tensors of epitaxial lattices are deduced by metric tensors of the reciprocal space at various temperatures. An equilibrium modulated-monoclinic phase is identified above the critical temperature, which is permitted in a translationengleiche subgroup from high symmetry with an index of 4. Being different from the conventional low-temperature monoclinic phase, the high-temperature monocl
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Tao, and Qiang Wu. "Role Minimization Optimization Algorithm Based on Concept Lattice Factor." Mathematics 11, no. 14 (2023): 3047. http://dx.doi.org/10.3390/math11143047.

Full text
Abstract:
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains. One of the critical challenges in RBAC is the efficient assignment of roles to users while minimizing the number of roles involved. This article presents a novel role minimization optimization algorithm (RMOA) based on the concept lattice factor to address this challenge. The proposed RMOA leverages the concept lattice, a mathematical structure derived from formal concept analysis, to model and analyze the relationships between roles, p
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Zhiwu, Hongxu Chen, Alwen Tiu, Yang Liu, and Kunal Sareen. "A permission-dependent type system for secure information flow analysis." Journal of Computer Security 29, no. 2 (2021): 161–228. http://dx.doi.org/10.3233/jcs-200036.

Full text
Abstract:
We introduce a novel type system for enforcing secure information flow in an imperative language. Our work is motivated by the problem of statically checking potential information leakage in Android applications. To this end, we design a lightweight type system featuring Android permission model, where the permissions are statically assigned to applications and are used to enforce access control in the applications. We take inspiration from a type system by Banerjee and Naumann to allow security types to be dependent on the permissions of the applications. A novel feature of our type system is
APA, Harvard, Vancouver, ISO, and other styles
4

D’Antoni, Loris, Shuo Ding, Amit Goel, Mathangi Ramesh, Neha Rungta, and Chungha Sung. "Automatically Reducing Privilege for Access Control Policies." Proceedings of the ACM on Programming Languages 8, OOPSLA2 (2024): 763–90. http://dx.doi.org/10.1145/3689738.

Full text
Abstract:
Access control policies are programs used to secure cloud resources. These polices should only grant the necessary permissions that a given application needs. However, it is challenging to write and maintain policies as applications and their required permissions change over time. In this paper, we focus on the Amazon Web Services (AWS) IAM policy language and present an approach that, given a policy, synthesizes a modified policy that is more restrictive and better abides to the principle of least privilege. Our approach looks at the actual access history (e.g., access logs) used by an applic
APA, Harvard, Vancouver, ISO, and other styles
5

Bogachenko, N. F. "Permissions engineering in the task of constructing a role-based access control policy." Mathematical structures and modeling, no. 1 (2024): 94–102. http://dx.doi.org/10.24147/2222-8772.2024.1.94-102.

Full text
Abstract:
The problem of role engineering is extended by the subproblem of permissions engineering. It is assumed that discretionary access control is specified in the information system. To build a role-based security policy, a technique based on algorithms for formal concept analysis is proposed. Based on the access matrix, a Galois lattice is constructed, the nodes of which are interpreted as possible permissions. Criteria for choosing the optimal set of permissions are determined and a heuristic algorithm for solving the problem is discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

MERIN, ARTHUR. "Permission Sentences Stand in the Way of Boolean and Other Lattice–Theoretic Semantices." Journal of Semantics 9, no. 2 (1992): 95–162. http://dx.doi.org/10.1093/jos/9.2.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

S. Akshaya Subhasri, R., M. Ranganayaki, K. Ulaga Priya, K. Kalaivani, and A. Sartiha. "A Survey on Secure and Verifiable Access Control Scheme for Enormous Information Storage In Clouds." International Journal of Engineering & Technology 7, no. 3.27 (2018): 412. http://dx.doi.org/10.14419/ijet.v7i3.27.17986.

Full text
Abstract:
A secure and verifiable access control scheme for enormous information storage in cloud is based on open source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data .To overcome the decryption failures of the original LLL, the NTRU decryption algorithm is analysed. It allows to analyze it correctness, accuracy, security qualities and computational effectiveness. When a new entry permission is granted by the data users. It allows the cloud main system to update the cipher method details. It also able to update the counter against the hacking behavior on the c
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiayu, Yineng Chen, Xinghui Zhu, Cheng Li, and Kui Fang. "A Redactable Blockchain Scheme Supporting Quantum-Resistance and Trapdoor Updates." Applied Sciences 14, no. 2 (2024): 832. http://dx.doi.org/10.3390/app14020832.

Full text
Abstract:
Applying chameleon hash functions to redactable blockchains is still challenging work. Most redactable blockchain solutions using this technique have potential problems, such as too weak decentralization performance and trapdoors with exposure risks. In addition, quantum computing also threatens the security of blockchain systems. The above two issues imply that the development of redactable blockchains is still constrained, and that quantum-resistance will be requirements for blockchain applications. Therefore, we constructed a chameleon hash function over lattices while utilizing a hierarchi
APA, Harvard, Vancouver, ISO, and other styles
9

Schwab, R., J. Reade, and M. Jankauski. "Quasi three-dimensional deformable blade element and unsteady vortex lattice reduced-order modeling of fluid–structure interaction in flapping wings." Physics of Fluids 34, no. 12 (2022): 121903. https://doi.org/10.5281/zenodo.7650964.

Full text
Abstract:
Flapping, flexible insect wings deform under inertial and fluid loading. Deformation influences aerodynamic force generation and sensorimotor control, and is thus important to insect flight mechanics. Conventional flapping wing fluid–structure interaction models provide detailed information about wing deformation and the surrounding flow structure, but are impractical in parameter studies due to their considerable computational demands. Here, we develop two quasi three-dimensional reduced-order models (ROMs) capable of describing the propulsive forces/moments and deformation profiles of flexib
APA, Harvard, Vancouver, ISO, and other styles
10

CAMELO-NETO, G., and S. COUTINHO. "DYNAMICAL MODEL FOR VIRUS SPREAD." Fractals 04, no. 02 (1996): 113–22. http://dx.doi.org/10.1142/s0218348x96000169.

Full text
Abstract:
The steady state properties of the mean density population of infected cells in a viral spread is simulated by a general forest like cellular automaton model with two distinct populations of cells (permissive and resistant ones) and studied in the framework of the mean field approximation. Stochastic dynamical ingredients are introduced into this model to mimic cells regeneration (with probability p) and to consider infection processes by other means than contiguity (with probability f). Simulations are carried out on a L×L square lattice taking into consideration the eighth first neighbors. T
APA, Harvard, Vancouver, ISO, and other styles
11

Bravo-Cordero, Jose Javier. "Abstract ED9-2: The contribution of the tumor microenvironment to cancer dormancy." Cancer Research 83, no. 5_Supplement (2023): ED9–2—ED9–2. http://dx.doi.org/10.1158/1538-7445.sabcs22-ed9-2.

Full text
Abstract:
Abstract In this seminar I will discuss how breast cancer DTCs modify the metastatic microenvironment to favor seeding and dormancy. In order to extravasate efficiently and form metastasis, cancer cells have to become migratory and coordinate both invasive and proliferative programs at distant organs. High-resolution lattice light-sheet with adaptive optics imaging in living cells revealed that DTCs extravasate from the blood vessels by forming actin-rich invadopodium protrusions. We have identified a population of breast cancer DTCs with pro-invasive and pro-dormancy capacities. These cells d
APA, Harvard, Vancouver, ISO, and other styles
12

Lehman, Thiel A., and Karen A. Sanguinet. "Auxin and Cell Wall Crosstalk as Revealed by the Arabidopsis thaliana Cellulose Synthase Mutant Radially Swollen 1." Plant and Cell Physiology 60, no. 7 (2019): 1487–503. http://dx.doi.org/10.1093/pcp/pcz055.

Full text
Abstract:
AbstractPlant cells sheath themselves in a complex lattice of polysaccharides, proteins and enzymes forming an integral matrix known as the cell wall. Cellulose microfibrils, the primary component of cell walls, are synthesized at the plasma membrane by CELLULOSE SYNTHASE A (CESA) proteins throughout cellular growth and are responsible for turgor-driven anisotropic expansion. Associations between hormone signaling and cell wall biosynthesis have long been suggested, but recently direct links have been found revealing hormones play key regulatory roles in cellulose biosynthesis. The radially sw
APA, Harvard, Vancouver, ISO, and other styles
13

Mansur, Md Abul. "A Quantum-Safe, Interoperable, and Decentralized Payment Infrastructure for the Post-Classical Era as a Strategic Framework for Secure Global Transactions." European Scientific Journal, ESJ 21, no. 19 (2025): 17. https://doi.org/10.19044/esj.2025.v21n19p17.

Full text
Abstract:
The rise of quantum computing introduces a profound threat to existing digital security frameworks, particularly those that underpin modern payment systems. Current cryptographic standards, such as RSA, ECC, and ECDSA are susceptible to being broken by quantum algorithms like Shor's and Grover's, jeopardizing the confidentiality, authenticity, and integrity of transactions across financial networks. This study presents a comprehensive investigation into the design, feasibility, and architecture of a universal quantum-safe payment platform capable of processing all types of digital transactions
APA, Harvard, Vancouver, ISO, and other styles
14

Emmerson, Parker Yehushuason, and J. Buchanan Buchanan Ryan. "Potentiation vs. Permission: Formalizing Implicit Associations in Mathematical Structures." May 6, 2025. https://doi.org/10.5281/zenodo.15347483.

Full text
Abstract:
This paper investigates the formalization of implicit associations within mathematical structures through the contrasting lenses of&nbsp;<em>potentiation</em>&nbsp;and&nbsp;<em>permission</em>. While implicit associations&mdash;underlying, often non-definitional relationships between structural elements&mdash;play a critical role in shaping mathematical behavior, their abstract nature has hindered systematic analysis. We propose a dual framework where&nbsp;<em>potentiation</em>&nbsp;characterizes the inherent capacity of elements to enable or amplify specific properties or operations, while&nb
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Kui, and Xianchang Meng. "Correction to: Visible lattice points along curves." Ramanujan Journal, July 27, 2021. http://dx.doi.org/10.1007/s11139-021-00487-8.

Full text
Abstract:
The article “Visible lattice points along curves”, written by Kui Liu and Xianchang Meng, was originally published electronically on the publisher’s internet portal on 27 July 2020 without open access. With the author(s)’ decision to opt for Open Choice the copyright of the article changed on 9 July 2021 to © The Author(s) 2020 and the article is forthwith distributed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and t
APA, Harvard, Vancouver, ISO, and other styles
16

Alfadhli, Ayna, CeAnn Romanaggi, Robin Lid Barklis, and Eric Barklis. "Second site reversion of HIV-1 envelope protein baseplate mutations maps to the matrix protein." Journal of Virology, January 9, 2024. http://dx.doi.org/10.1128/jvi.01742-23.

Full text
Abstract:
ABSTRACT The HIV-1 Envelope (Env) protein cytoplasmic tail (CT) recently has been shown to assemble an unusual trimeric baseplate structure that locates beneath Env ectodomain trimers. Mutations at linchpin residues that help organize the baseplate impair virus replication in restrictive T cell lines but not in permissive cell lines. We have identified and characterized a second site suppressor of these baseplate mutations, located at residue 34 in the viral matrix (MA) protein, that rescues viral replication in restrictive cells. The suppressor mutation was dependent on the CT to exert its ac
APA, Harvard, Vancouver, ISO, and other styles
17

Zeng, Zezhu, Xingchen Shen, Ruihuan Cheng, et al. "Pushing thermal conductivity to its lower limit in crystals with simple structures." Nature Communications 15, no. 1 (2024). http://dx.doi.org/10.1038/s41467-024-46799-3.

Full text
Abstract:
AbstractMaterials with low thermal conductivity usually have complex crystal structures. Herein we experimentally find that a simple crystal structure material AgTlI2 (I4/mcm) owns an extremely low thermal conductivity of 0.25 W/mK at room temperature. To understand this anomaly, we perform in-depth theoretical studies based on ab initio molecular dynamics simulations and anharmonic lattice dynamics. We find that the unique atomic arrangement and weak chemical bonding provide a permissive environment for strong oscillations of Ag atoms, leading to a considerable rattling behaviour and giant la
APA, Harvard, Vancouver, ISO, and other styles
18

Novikova, Mariia, Lucas J. Adams, Juan Fontana, et al. "Identification of a Structural Element in HIV-1 Gag Required for Virus Particle Assembly and Maturation." mBio 9, no. 5 (2018). http://dx.doi.org/10.1128/mbio.01567-18.

Full text
Abstract:
ABSTRACTLate in the HIV-1 replication cycle, the viral structural protein Gag is targeted to virus assembly sites at the plasma membrane of infected cells. The capsid (CA) domain of Gag plays a critical role in the formation of the hexameric Gag lattice in the immature virion, and, during particle release, CA is cleaved from the Gag precursor by the viral protease and forms the conical core of the mature virion. A highly conserved Pro-Pro-Ile-Pro (PPIP) motif (CA residues 122 to 125) [PPIP(122–125)] in a loop connecting CA helices 6 and 7 resides at a 3-fold axis formed by neighboring hexamers
APA, Harvard, Vancouver, ISO, and other styles
19

Fontaine, Matthieu. "Adaptive structure seeking dialogues." Logic Journal of the IGPL, February 5, 2025. https://doi.org/10.1093/jigpal/jzae099.

Full text
Abstract:
Abstract In dialogical logic, the proof process is conceived in terms of argumentative games in which a proponent of a thesis and an opponent interact. Different levels of rules allow to define different logical contexts of argumentation. This provides to dialogical logic a genuine pluralistic dimension. In this paper, we introduce the rules of a new modal dialogical approach referred to as “Adaptive Structure Seeking Dialogues” (A-SSD). A-SSD have their roots in Structure Seeking Dialogues (SSD), on the one hand, and in adaptive logics, on the other hand. SSD are dialogues in which assumption
APA, Harvard, Vancouver, ISO, and other styles
20

Fresen, Jill W., Robin K. Hill, and Fawei Geng. "A collection of suggested electronic course templates for use in higher education." Research in Learning Technology 22 (April 1, 2014). http://dx.doi.org/10.3402/rlt.v22.21669.

Full text
Abstract:
The collection of electronic course templates suggested in this article results from collaborative investigation between instructional support staff and academic staff users of the virtual learning environment (VLE) at two institutions, one in the United Kingdom and the other in the United States. The particular VLE in use at both institutions was Sakai, although the experience described here can be applied to the design process and workflow using any VLE that allows the selection and some configuration of standard tools.We applied the lattice model of Hill, Fresen and Geng (2012) to design an
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!