Haiyan Che

  • Citations Per Year
Learn More
RB-RBAC (Rule-Based RBAC) provides the mechanism to dynamically assign users to roles based on a finite set of authorization rules defined by the enterprise's security policy. The RB-RBAC family introduces negative authorization, represented by negative roles, which may bring conflict, and conflict detection and resolution become an import work in RB-RBAC(More)
Public-key infrastructures (PKIs) are essential for providing electronic payment security services such as authentication and privacy in open networks like Internet. The purpose of this paper is to propose a description logic-based approach to modeling and reasoning about PKI trust domain. In the formalism, concept model is used to formalize PKI entities(More)
Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it is important to clarify the difference between them. The difference above refers to the logical difference, not syntactic one. Examples of the logical difference include the difference in(More)
Modularity and rigor are two key elements for multi-agent technology. Hong Zhu’s multi-agent system (MAS) development method provides proper language facilities supporting modularity. To enhance this method with rigor advocates a DL method to map the specification of MAS into a DL TBox. Thus, we can use the existing DL reasoners and systems to verify and(More)