نتایج جستجو برای: graph protection

تعداد نتایج: 376537  

1994
Sylvia Osborn

This paper examines the concept of role-based protection and, in particular, role organization. From basic role relationships, a model for role organization is developed. The role graph model, its operator semantics based on graph theory and algorithms for role administration are proposed. The role graph model, in our view, presents a very generalized form of role organization for access rights...

Journal: :Indonesian Journal of Computing, Engineering and Design (IJoCED) 2019

2003
Yuanqiu Luo Nirwan Ansari

This article proposes a survivability evaluation model for multifiber WDM networks, in which the extended layered graph is developed to jointly optimize the wavelength routing and wavelength assignment problems, and three different edge cost functions are evaluated in terms of traffic engineering. Linear programming (LP) equations are formulated to optimally determine the working lightpath and ...

Journal: :CoRR 2012
Denis Brechka

The article contains the algorithm for searching a certain kind of bridges in the protection graph of Take-Grant model. The proposed algorithm is based on a classical breadth-first search algorithm.

2014
Ruimin Hu Haitao Lv Jun Chen

In this paper, the protection coverage area of a security system is considered. The protection coverage is determined by applying the protection model of security systems, which is brought forward according to Neyman-Pearson Criterion. The protection model can be used to define the protection probability on a grid-modeled field. The security systems deployed in a guard field are regarded abstra...

2005
M. Sarper Erdogan Cavit Yavuz Cigdem Caglayan Nilay Etiler Onur Hamzaoglu

Purpose – This paper has been produced to enumerate and discuss threats which are caused by industry and may affect health in the province of Kocaeli. Design/methodology/approach – Industries in the province, depending on their function, were grouped into sectors. Air, water and solid waste pollutants produced by each sector were assessed for each region of the province. Findings – Of the 7,400...

2003
Akira Amano Naoki Asada

Structure analysis of table form document is important because printed documents and also electronical documents only provide geometrical layout and lexical information explicitly. To handle these documents automatically, logical structure information is necessary. In this paper, we first propose a general representation of table form document based on XML, which contains both structure and lay...

2010
Quazi Rahman Subir Bandyopadhyay Ataul Bari Arunita Jaekel Yash P. Aneja

Translucent WDM networks are receiving attention as longhaul back bone networks. One important aspect of such networks that has not received attention is the possibility of cycles in the path of a translucent network. This is the first work on implementing path protection in translucent networks, considering the possibility of cycles. Two formulations have been proposed here for dynamic lightpa...

2009
Wenjuan Xu Xinwen Zhang Gail-Joon Ahn

Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید