• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,126
Next 10 →

Table 3 Deduction rules for the permission relation.

in Operational semantics for MSC'96
by S. Mauw A, M. A. Reniers A 1997
"... In PAGE 11: ...s allowed to precede a process x, i.e., we want to a determine x PPP . Then we use the deduction rules from Table3 which are defined on the structure of the expressions. The empty process can be pre- ceded by event a; there is no reason not to allow a to be executed.... ..."
Cited by 8

Table 3. Permission management virtual permissions

in The Newton MessagePad Personal Digital Assistant
by unknown authors
"... In PAGE 6: ... Figure 5 shows the effect we would like to achieve: each physical sub-page is associated with a single virtual address. Table3 shows how permissions are manipulated to assure the one-to-one relationship required for proper sub-page storage management. The table shows four mappings to the same physical page and their associated permissions.... ..."

Table 3. Permission management virtual permissions

in The Newton Operating System
by Robert Welland, Greg Seitz, Lieh-Wuu Wang, Landon Dyer, On Dyer, Tim Harrington, Daniel Culbert
"... In PAGE 6: ... Figure 5 shows the effect we would like to achieve: each physical sub-page is associated with a single virtual address. Table3 shows how permissions are manipulated to assure the one-to-one relationship required for proper sub-page storage management. The table shows four mappings to the same physical page and their associated permissions.... ..."

Table 1: Permission assignments for the example. Role Permissions

in SESAME: Scalable,Environment Sensitive Access Management Engine
by Guangsen Zhang, Manish Parashar
"... In PAGE 17: ... lt;POLICY gt; lt;SUBJECTID gt;gszhang lt;/SUBJECTID gt; lt;BEGIN_ROLE gt;Super User lt;/BEGIN_ROLE gt; lt;EVENT gt;Unsecure Link lt;/EVENT gt; lt;END_ROLE gt;General User lt;/END_ROLE gt; lt;/POLICY gt; lt;/ROLE_TRANSITION gt; Figure 8: Sample RoleTransition policy in XML implementation, consider a simple example with a single user with three roles and a Grid resource with three permissions, as shown in Table1 and Table 2 respectively. The role and permission hierarchies for this example are shown in Figure 9.... ..."

Table 2: Parameters and doubling ratios across experiments that have investigated the effects of speed. Reprinted with permission from [11].

in Perceiving Roughness Via A Rigid Probe: Psychophysical Effects Of Exploration Speed And Mode Of Touch
by Susan J. Lederman, Roberta L. Klatzky, Cheryl L. Hamilton, Gillian I. Ramsay
"... In PAGE 11: ... 11 For interelement spacing, similarly, the scaled perceived roughness value was: (6) spacing n spacing/mi max FECT) XSPACINGEF antilog(MA * 2 effect doubling Spacing = The doubling effects for speed and interelement spacing are shown in Table2 , along with the associated ratios of the parameter ranges for speed and interelement spacing used in the scaling procedure (i.e.... In PAGE 11: ... DOUBLING RATIO = speed doubling effect/spacing doubling effect (7) The doubling ratios for Experiment 1 were substantial, that is about 24% and 21% of the corresponding effect of interelement spacing for active- and passive-touch, respectively. Corresponding values based on data from the two previous experiments that investigated the effect of speed of relative motion on perceived roughness using the bare finger are also shown in Table2 . The doubling ratios in Experiment 1 were a little larger than those pertaining to the Lederman [15] study, and considerably larger than the value for active touch that was based on the Lederman [14] study.... In PAGE 11: ... 3. EXPERIMENT 2 Based on the order of magnitude of doubling ratios in Table2 for the first three studies shown ([14] [15] Expt. 1, current study), an intriguing hypothesis is that the strength of the speed effect varies inversely with the size of speed range, as measured by the maximum:minimum speed ratio.... In PAGE 14: ...40 and .38 (see Table2 ), that is, the speed variable produced about 40% of the corresponding effects due to interelement spacing. As predicted, therefore, the effect of speed, as measured by the doubling ratio, increased markedly when the range of speeds was reduced to a 4-fold change.... In PAGE 15: ... To quantitatively evaluate this idea, linear fits were applied separately to the active and passive conditions relating the doubling ratio (y-axis) to the maximum:minimum speed ratio (x-axis) (Figure 4). All experiments by Lederman and her colleagues that have examined the effect of speed on perceived roughness were included (see Table2 ), regardless of the type of end effector used. In support of our prediction, a linear fit to the functions provided good to excellent results, with r 2 values of .... In PAGE 16: ... This is because speed affects the vibratory signals that are likely to prove even more important when exploration is limited to the use of a rigid probe. Indeed, the doubling ratios initially seem to confirm our prediction, inasmuch as they are considerably larger than those for the bare-finger experiments when the ratios in Table2 are expressed as percentages (cf.... In PAGE 17: ... The results reported in Experiment 1 led us to speculate further that the magnitude of the speed effect would vary inversely with the size of speed range, as measured by maximum:minimum speed ratio. Experiment 2 confirmed this prediction (see Table2 , column 2). We noted that linear equations applied to the doubling ratio as a function of maximum speed:minimum speed ratio produced good to excellent linear fits for both active and passive modes of touch (Figure 4).... ..."

Table 4. Semantics of expressions

in Using Access Control for Secure Information Flow in a Java-like Language
by Anindya Banerjee, David A. Naumann 2003
"... In PAGE 6: ... The meaning of an expression a13 a24 a23 a9a50a11 is a function a23a23 a26 a33 a5a7 a26 a40a39 a13 a24a24 a31 a23a23 a11 a25a24a24a55a54 that takes a state a29 a49 a19 a56a0 a47 a25 a23a23 a26 a39a33a27a7 a26 a40a39 a13 a24a24 and returns a value a43 a25 a57a23a23 a11 a25a24a24 (such that a29 a49 a19 a56a43 a47 a25 a23a23 a26 a39a33a27a7 a26 a40a39 a11 a38a24a24 ) or the improper value a1 which represents er- rors. Table4 gives the definition. The meaning of a command a13 a24 a11 is a function a23a23a58a31a34a33 a44 a59a35a37a24a24 a31 a23a23 a26 a39a33a27a7 a26 a40a39 a13 a24a24 a31 a23a23 a26 a33a35a34a37a36 a40 a29 a13 selfa47 a29a24a24 a31 a29 a56a23a23 a26 a39a33a27a7 a26 a60a39 a13 a24a24 a7a47a10a54 that takes a method environment a61 (see below), a state a29 a49 a19 a10a0 a47 , and the enabled permissions a21 a25 a44a23a23 a26 a33a35a34a37a36a39a40 a29 a13 selfa47 a29a24a24 ; it returns a state or a1 which indicates divergence or error or access control violation.... In PAGE 11: ... It is impractical to include such redundancy in the pa- per, however. Instead, when it comes to proving something about a particular construct we make free use of identifiers in the typing rule (in Table 6 or 7), for types and labels, and identifiers in the semantic definition for semantic values (in Table4 or 5). Note that the semantic definition may use different identifiers for types, as the semantics is based on the typing rules in Table 2 rather than the security rules in Tables 6 and 7.... ..."
Cited by 37

Table 3. Axioms for permission

in Modeling Security Requirements through Ownership, Permission and Delegation
by Paolo Giorgini, Fabio Massacci, John Mylopoulos 2005
"... In PAGE 6: ... In this way, confident(owner, a, s) holds if owner a is confident to give the permission on service s only to trusted actors. Table3 presents the axioms for permission. P1 and P2 build a delegation chain of permission; P3 and P4 build a trust chain for permission; P5 builds trust chains over mon- itoring steps.... ..."
Cited by 27

Table 1. Examples of permissions.

in Here's Your Lego™ Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need
by Konstantin Beznosov
"... In PAGE 6: ... A permission is constructed out of four distinct elements, as shown in Figure 3. Examples are provided in Table1 at the end of this subsection. Fig.... ..."

Table 1 Combined summary of transcriptome and both isotopic peak height analysis and spectral counting analysis for the proteome for S40/S2 expression ratios. The number of ORFs in each category are shown: up = significantly higher expression in S40 compared to S2; down = significantly lower expression in S40 compared to S2.; no change = no significant difference; NP = not probed in microarrays; ND = not detected using proteomics. The total number of ORFs in the annotated M. maripaludis genome25 is 1722. Portions of this table have been reproduced from Xia et al.8 with permission of the ASBMB

in unknown title
by unknown authors 2006
"... In PAGE 5: ... Using the 95% significance cutoff, 33 M. maripaludis proteins were found to be differentially expressed between S2 and S40 ( Table1 and Fig. 2).... ..."

Table 2. Credential Types and Examples

in Role-based Privilege and Trust Management
by Dongwan Shin, Gail-joon Ahn
"... In PAGE 13: ... Based on the expressions of roles, users, and permissions, five different types of credentials can be expressed as a form of A ! B; which can be read as B is at least as powerful as A. Their types and syntactical examples are shown in Table2 . The semantics of all credential types except for UI are clear.... ..."
Next 10 →
Results 1 - 10 of 11,126
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University