29 research outputs found

    A linear logic of authorization and knowledge

    No full text
    Abstract. We propose a logic for specifying security policies at a very high level of abstraction. The logic accommodates the subjective nature of affirmations for authorization and knowledge without compromising the objective nature of logical inference. In order to accurately model consumable authorizations and resources, we construct our logic as a modal enrichment of linear logic. We show that the logic satisfies cut elimination, which is a proof-theoretic expression of its soundness. We also demonstrate that the logic is amenable to meta-reasoning about specifications expressed in it through several examples.

    Real Options at the Interface of Finance and Operations: Exploiting Embedded Supply Chain Real Options to Gain Competitiveness

    No full text
    Exploiting embedded supply-chain real options creates powerful opportunities for competitive manufacturing in high-cost environments. Rather than seeking competitiveness through standardization as is common to lean production, real-options reasoning explores opportunities to use supply-chain variability as a strategic weapon. We present an illustrative case study of a Swiss manufacturer of cable extrusion equipment supported by a formal real-options model that aids in valuing the embedded options that make up supply-chain flexibility: postponement, contraction, expansion, switching, and abandonment. Real-options reasoning provides a plausible retrospective rationale for the case firm's use of supply-chain flexibility that provided protection against competition from low cost, but less responsive competitors. Their intuitive real-options reasoning facilitated incorporating fuller information concerning volatility, flexibility, and control into choosing what products to make, in what quantity, and with work allocated to which supplier. The case study also highlights how competing through exploiting embedded real options requires a different managerial skill set than does competing through cost reduction. Skills such as customer communication, supplier management, and ability to ensure a smooth flow of production join the ability to reduce and control lead times as key sources of competitive advantage

    Dynamic Event-based Access Control as Term Rewriting

    No full text
    Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especially well suited and for which implementations of RBAC do not enable properties of access control policies to be adequately defined and proven. To address these issues, we propose a form of access control model that is based upon the key notion of an event. The access control model that we propose is intended to permit the representation of access control requirements in a distributed and changing computing environment, the proving of properties of access control policies defined in terms of our model, and direct implementations for access control checking.
    corecore