Interceptor Based Constraint Violation Detection

Author(s):  
Qianxiang Wang ◽  
A. Mathur
Author(s):  
Apiwat Reungwetwattana ◽  
Shigeki Toyama

Abstract This paper presents an efficient extension of Rosenthal’s order-n algorithm for multibody systems containing closed loops. Closed topological loops are handled by cut joint technique. Violation of the kinematic constraint equations of cut joints is corrected by Baumgarte’s constraint violation stabilization method. A reliable approach for selecting the parameters used in the constraint stabilization method is proposed. Dynamic analysis of a slider crank mechanism is carried out to demonstrate efficiency of the proposed method.


2016 ◽  
Vol 113 (21) ◽  
pp. E2874-E2875
Author(s):  
Yan Mu ◽  
Shinobu Kitayama ◽  
Shihui Han ◽  
Michele J. Gelfand

2014 ◽  
Vol 519-520 ◽  
pp. 181-184
Author(s):  
Jian Feng Lu ◽  
Xuan Yan ◽  
Yi Ding Liu

Role mapping is a basic technique for facilitating interoperation in RBAC-based collaborating environments. However, role mapping lacks the flexibility to specify access control policies in the scenarios where the access control is not a simple action, but consists of a sequence of actions and events from subjects and system. In this paper, we propose an attribute mapping technique to establish secure context in multi-domain environments. We first classify attributes into eight types and show that only two types of attributes need to be translated. We second give the definition of attribute mapping technique, and analysis the properties of attribute mapping. Finally, we study how cardinality constraint violation arises and shows that it is efficient to resolve this security violation.


Sign in / Sign up

Export Citation Format

Share Document