Granular Computing on Binary Relations
TSCTC '02 Proceedings of the Third International Conference on Rough Sets and Current Trends in Computing
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Covering based granular computing for conflict analysis
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Related family: A new method for attribute reduction of covering information systems
Information Sciences: an International Journal
Hi-index | 0.01 |
Brewer and Nash, updated by this author immediately, introduced Chinese wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, this paper introduced a practical way of computing an extended model.