Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Lattice

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
It is a partially ordered set in which every two pair of elements in the set has only one least upper bound and only one greatest lower bound.
Published in Chapter:
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
Omkar Badve (National Institute of Technology Kurukshetra, India), B. B. Gupta (National Institute of Technology Kurukshetra, India), and Shashank Gupta (National Institute of Technology Kurukshetra, India)
DOI: 10.4018/978-1-5225-0105-3.ch020
Abstract
Numerous vulnerabilities have a tendency to taint modern real-world web applications, allowing attackers in retrieving sensitive information and exploiting genuine web applications as a platform for malware activities. Moreover, computing techniques are evolved from the large desktop computer systems to the devices like smartphones, smart watches and goggles. This needs to be ensure that these devices improve their usability and will not be utilized for attacking the personal credentilas (such as credit card numbers, transaction passwords, etc.) of the users. Therefore, there is a need of security architecture over the user's credentials so that no unauthorized user can access it. This chapter summarizes various security models and techniques that are being discovered, studied and utilized extensively in order to ensure computer security. It also discusses numerous security principles and presents the models that ensure these security principles. Security models (such as access control models, information flow models, protection ring, etc.) form the basis of various higher level and complex models. Therefore, learning such security models is very much essential for ensuring the security of the computer and cyber world.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Neural/Fuzzy Computing Based on Lattice Theory
A lattice is a poset (L,=) any two of whose elements have both a greatest lower bound (g.l.b.), denoted by x?y, and a least upper bound (l.u.b.), denoted by x?y.
Full Text Chapter Download: US $37.50 Add to Cart
Morphological Filtering Principles
A complete lattice is a set of elements with a partial ordering relationship and two operations called supremum and infimum.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR