-
1
-
-
80052946685
-
Analysis of the Petri net model of parallel manufacturing processes with shared resources
-
F. Ahmad, H. Huang, X. Wang, Analysis of the Petri net model of parallel manufacturing processes with shared resources, Information Sciences 181 (2011) 5249-5266.
-
(2011)
Information Sciences
, vol.181
, pp. 5249-5266
-
-
Ahmad, F.1
Huang, H.2
Wang, X.3
-
2
-
-
0003515463
-
-
Prentice-Hall
-
R.K. Ahuja, T.L. Magnanti, J.B. Orlin, Network Flows: Theory, Algorithms, and Applications, Prentice-Hall, 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
5
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
Y. Deng, J.C. Wang, J. Tsai, K. Beznosov, An approach for modeling and analysis of security system architectures, IEEE Transactions on Knowledge and Data Engineering 15 (2003) 1099-1119.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, pp. 1099-1119
-
-
Deng, Y.1
Wang, J.C.2
Tsai, J.3
Beznosov, K.4
-
6
-
-
0002395410
-
Feedback set problems
-
D. Du, P.M. Pardalos (Eds.), Kluwer Academic Publishers
-
P. Festa, P.M. Pardalos, M.G.C. Resende, Feedback set problems, in: D. Du, P.M. Pardalos (Eds.), Handbook of Combinatorial Optimization, Kluwer Academic Publishers, 1999, pp. 209-258.
-
(1999)
Handbook of Combinatorial Optimization
, pp. 209-258
-
-
Festa, P.1
Pardalos, P.M.2
Resende, M.G.C.3
-
10
-
-
84995390402
-
-
World Scientific Publishing
-
H. Huang, L. Jiao, T.Y. Cheung, W.M. Mak, Property-Preserving Petri Net Process Algebra in Software Engineering, World Scientific Publishing, 2012.
-
(2012)
Property-Preserving Petri Net Process Algebra in Software Engineering
-
-
Huang, H.1
Jiao, L.2
Cheung, T.Y.3
Mak, W.M.4
-
11
-
-
80052886058
-
Formal specification and verification of modular security policy based on colored Petri nets
-
H. Huang, H. Kirchner, Formal specification and verification of modular security policy based on colored Petri nets, IEEE Transactions on Dependable and Secure Computing 18 (2011) 852-865.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.18
, pp. 852-865
-
-
Huang, H.1
Kirchner, H.2
-
12
-
-
70349968221
-
Handling inheritance violation for secure interoperation of heterogeneous systems
-
H. Huang, H. Kirchner, S. Liu, W. Wu, Handling inheritance violation for secure interoperation of heterogeneous systems, International Journal of Security and Networks 4 (2009) 223-233.
-
(2009)
International Journal of Security and Networks
, vol.4
, pp. 223-233
-
-
Huang, H.1
Kirchner, H.2
Liu, S.3
Wu, W.4
-
13
-
-
62949140645
-
Deadlock-free design of JSP with multi-resource sharing
-
H. Huang, J. Li, W. Zhou, Deadlock-free design of JSP with multi-resource sharing, in: Proceedings of the 2008 International Conference on Computer and Electrical Engineering, 2008, pp. 412-416.
-
(2008)
Proceedings of the 2008 International Conference on Computer and Electrical Engineering
, pp. 412-416
-
-
Huang, H.1
Li, J.2
Zhou, W.3
-
14
-
-
0001604985
-
Coloured Petri nets: A high level language for system design and analysis
-
K. Jensen, Coloured Petri nets: a high level language for system design and analysis, Lecture Notes in Computer Science 483 (1991) 342-416.
-
(1991)
Lecture Notes in Computer Science
, vol.483
, pp. 342-416
-
-
Jensen, K.1
-
16
-
-
25444456646
-
Property-preserving composition by place merging
-
L. Jiao, H. Huang, T.Y. Chueng, Property-preserving composition by place merging, Journal of Circuits, Systems and Computers 14 (2005) 793-812.
-
(2005)
Journal of Circuits, Systems and Computers
, vol.14
, pp. 793-812
-
-
Jiao, L.1
Huang, H.2
Chueng, T.Y.3
-
17
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for GTRBAC
-
J. Joshi, E. Bertino, A. Ghafoor, Temporal hierarchies and inheritance semantics for GTRBAC, in: Proceedings of Seventh ACM Symposium on Access Control Models and Technologies, 2002, pp. 74-83.
-
(2002)
Proceedings of Seventh ACM Symposium on Access Control Models and Technologies
, pp. 74-83
-
-
Joshi, J.1
Bertino, E.2
Ghafoor, A.3
-
20
-
-
77958593747
-
Activity-oriented access control to ubiquitous hospital information and services
-
X.H. Le, S. Lee, Y.K. Lee, H. Lee, M. Khalid, R. Sankar, Activity-oriented access control to ubiquitous hospital information and services, Information Sciences 180 (2010) 2979C2990.
-
(2010)
Information Sciences
, vol.180
-
-
Le, X.H.1
Lee, S.2
Lee, Y.K.3
Lee, H.4
Khalid, M.5
Sankar, R.6
-
21
-
-
34250699018
-
Deadlock control of flexible manufacturing systems via invariant-controlled elementary siphons of Petri nets
-
Z. Li, N. Wei, Deadlock control of flexible manufacturing systems via invariant-controlled elementary siphons of Petri nets, International Journal of Advanced Manufacturing Technology 33 (2007) 24-35.
-
(2007)
International Journal of Advanced Manufacturing Technology
, vol.33
, pp. 24-35
-
-
Li, Z.1
Wei, N.2
-
22
-
-
0742307433
-
Elementary siphons of Petri nets and their application to deadlock prevention in flexible manufacturing systems
-
Z. Li, M. Zhou, Elementary siphons of Petri nets and their application to deadlock prevention in flexible manufacturing systems, IEEE Transactions on System, Man, and Cybernetics 34 (2004) 38-51.
-
(2004)
IEEE Transactions on System, Man, and Cybernetics
, vol.34
, pp. 38-51
-
-
Li, Z.1
Zhou, M.2
-
23
-
-
0033308410
-
A research on Petri net properties using transitive matrix
-
J. Liu, Y. Itoh, I. Miyazawa, T. Sekiguchi, A research on Petri net properties using transitive matrix, in: Proceeding IEEE SMC, 1999, pp. 888-893.
-
(1999)
Proceeding IEEE SMC
, pp. 888-893
-
-
Liu, J.1
Itoh, Y.2
Miyazawa, I.3
Sekiguchi, T.4
-
26
-
-
79957469269
-
Flexible secure inter-domain interoperability through attribute conversion
-
C. Martinez-Garcia, G. Navarro-Arribas, S.N. Foley, V. Torra, J. Borrell, Flexible secure inter-domain interoperability through attribute conversion, Information Sciences 181 (2011) 3491C3507.
-
(2011)
Information Sciences
, vol.181
-
-
Martinez-Garcia, C.1
Navarro-Arribas, G.2
Foley, S.N.3
Torra, V.4
Borrell, J.5
-
27
-
-
84947263112
-
Automatic code generation method based on coloured Petri net models applied on an access control system
-
K.H. Mortensen, Automatic code generation method based on coloured Petri net models applied on an access control system, Lecture Notes in Computer Science 1825 (2000) 367-386.
-
(2000)
Lecture Notes in Computer Science
, vol.1825
, pp. 367-386
-
-
Mortensen, K.H.1
-
29
-
-
33947655896
-
Analyzing security interoperability during component integration
-
E.A. Oladimeji, L. Chung, Analyzing security interoperability during component integration, in: Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, 2006, pp. 121-129.
-
(2006)
Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse
, pp. 121-129
-
-
Oladimeji, E.A.1
Chung, L.2
-
30
-
-
84865737952
-
Policy analysis for administrative role-based access control
-
A. Sasturkar, P. Yang, S.D. Stoller, C. Ramakrishnan, Policy analysis for administrative role-based access control, Theoretical Computer Science 412 (2011) 6208C6234.
-
(2011)
Theoretical Computer Science
, vol.412
-
-
Sasturkar, A.1
Yang, P.2
Stoller, S.D.3
Ramakrishnan, C.4
-
31
-
-
28244460211
-
Secure interoperation in a multidomain environment employing RBAC policies
-
B. Shafiq, J.B.D. Joshi, E. Bertino, A. Ghafoor, Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering 17 (2005) 1557-1577.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
32
-
-
27544484252
-
A role-based access control policy verification framework for real-time systems
-
B. Shafiq, A. Masood, J. Joshi, A. Ghafoor, A role-based access control policy verification framework for real-time systems, in: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, 2005, pp. 13-20.
-
(2005)
NProceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
, pp. 13-20
-
-
Shafiq, B.1
Masood, A.2
Joshi, J.3
Ghafoor, A.4
-
33
-
-
67349124845
-
Specification and enforcement of flexible security policy for active cooperation
-
Y. Sun, B. Gong, X. Meng, Z. Lin, E. Bertino, Specification and enforcement of flexible security policy for active cooperation, Information Sciences 179 (2009) 2629-2642.
-
(2009)
Information Sciences
, vol.179
, pp. 2629-2642
-
-
Sun, Y.1
Gong, B.2
Meng, X.3
Lin, Z.4
Bertino, E.5
-
35
-
-
41549093270
-
Mediator-free secure policy interoperation of exclusively-trusted multiple domains
-
X. Wang, D. Feng, Z. Xu, H. Hu, Mediator-free secure policy interoperation of exclusively-trusted multiple domains, Lecture Notes in Computer Science 4991 (2008) 248-262.
-
(2008)
Lecture Notes in Computer Science
, vol.4991
, pp. 248-262
-
-
Wang, X.1
Feng, D.2
Xu, Z.3
Hu, H.4
-
36
-
-
68149137317
-
Security violation detection for RBAC based interoperation in distributed environment
-
X. Wang, J. Sun, X. Yang, C. Huang, D. Wu, Security violation detection for RBAC based interoperation in distributed environment, IEICE Transactions on Information and Systems E91-D (2008) 1447-1456.
-
(2008)
IEICE Transactions on Information and Systems E91-D
, pp. 1447-1456
-
-
Wang, X.1
Sun, J.2
Yang, X.3
Huang, C.4
Wu, D.5
-
37
-
-
34547247707
-
Modeling Chinese wall policy using colored Petri nets, in
-
Z.L. Zhang, F. Hong, J.G. Liao, Modeling Chinese wall policy using colored Petri nets, in: Proceedings of the 6th IEEE International Conference on Computer and Information Technology, 2006, pp. 162-167.
-
(2006)
Proceedings of the 6th IEEE International Conference on Computer and Information Technology
, pp. 162-167
-
-
Zhang, Z.L.1
Hong, F.2
Liao, J.G.3
-
38
-
-
40249115100
-
Verification of strict integrity policy via Petri nets
-
Z.L. Zhang, F. Hong, H.J. Xiao, Verification of strict integrity policy via Petri nets, in: Proceedings of the International Conference on Systems and Networks Communication, 2006, pp. 23-26.
-
(2006)
Proceedings of the International Conference on Systems and Networks Communication
, pp. 23-26
-
-
Zhang, Z.L.1
Hong, F.2
Xiao, H.J.3
|