• Citations Per Year
Learn More
Automata theory has played an important role in modeling behavior of systems since last couple of decades. The algebraic automaton has emerged with several modern applications because of having properties and structures from algebraic theory. Design of a complex system not only requires behavior but it also needs to model its functionality. Z notation is an(More)
Automata theory has played an important role in theoretical computer science since last couple of decades. The algebraic automaton has emerged with several modern applications, for example, optimization of programs, design of model checkers, development of theorem provers because of having certain interesting properties and structures from algebraic theory(More)
Cloud Computing is an emerging field of technology that relies on sharing of resources over the Internet to achieve economy of scales. It has gained momentum among both individuals and corporate sectors due to a variety of applications such as ease of administration, mobility and collaboration, reduction of hardware and licensing cost, and scalability.(More)
Protection of shared data from unauthorized users is the most challenging problem of cyber security for which different access control models have been introduced. However, to provide flexibility in access control models, access rights are delegated within a single security domain or across multiple security domains for different collaborative activities.(More)
Automata theory has played an important role in computer science and engineering particularly modeling behavior of systems since last couple of decades. The algebraic automaton has emerged with several modern applications, for example, optimization of programs, design of model checkers, development of theorem provers because of having properties and(More)
Delegation of access rights is becoming a common requirement of cloud based organizations. In this regard, various delegation models have been proposed. These models are strongly coupled with their specific access control model (ACM). For instance, if organization has deployed Role based Access Control (RBAC) model then it must use Role Based Delegation(More)