• A neural network algorithm for hardware-software verification 

      Rebaiaia, M.L.; Jaam, J.M.; Hasnah, A.M. ( IEEE , 2003 , Conference Paper)
      Formal verification is the task of proving that a property holds for a model of a design. This paper examines the idea of a Neural Network-based algorithm used to find the set of states that makes a specification valid. ...
    • Compliance checking for usage-constrained credentials in trust negotiation systems 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference Paper)
      We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
    • Constraint-enhanced role engineering via answer set programming 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Association for Computing Machinery , 2012 , Conference Paper)
      Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
    • Logic programs with ordered disjunction: First-order semantics and expressiveness 

      Asuncion, Vernon; Zhang, Yan; Zhang, Heng ( AAAI Publications , 2014 , Conference Paper)
      Logic programs with ordered disjunction (LPODs) (Brewka 2002) generalize normal logic programs by combining alternative and ranked options in the heads of rules. It has been showed that LPODs are useful in a number of areas ...