there is ample evidence which shows that social media users struggle to make appropriate accesscontrol decisions while disclosing their information and smarter mechanisms are needed to assist them. Using profile info...
详细信息
ISBN:
(纸本)9781509032051
there is ample evidence which shows that social media users struggle to make appropriate accesscontrol decisions while disclosing their information and smarter mechanisms are needed to assist them. Using profile information to ascertain similarity between users and provide suggestions to them during the process of making accesscontrol decisions has been put forth as a possible solution to this problem. this paper presents an empirical study aimed at identifying the minimal subset of attributes which are most suitable for being used to create profile vectors for the purpose of predicting accesscontrol decisions. We begin with an exhaustive list of 30 profile attributes and identify a subset of 2 profile attributes which are shown to be sufficient in obtaining similarity between profiles and predicting accesscontrol decisions withthe same accuracy as previous models. We demonstrate that using this pair of attributes will help mitigate the challenges encountered by similarity based accesscontrol mechanisms.
this paper is dedicated to ate methodical analysis of distributed communication and control systems, such like systems inside modern vehicles or systems of networked vehicles, For runtime and time-behavior analyses, t...
详细信息
this paper is dedicated to ate methodical analysis of distributed communication and control systems, such like systems inside modern vehicles or systems of networked vehicles, For runtime and time-behavior analyses, the basic models of a communication access and a cycle crossing between program components are discussed. For these subproblems, exemplary simulation results are shown and validated. Regarding both problems together, a mathematic approach is introduced, which describes the structure of a subsuming process, relevant for time analysis in distributed systems. the simulation of this complete process allows the derivation of realistic statements on the tolerable limits in time critical control systems. (C) 2016, IFAC (International Federation of Automatic control) Hosting, by Elsevier Ltd. All rights reserved.
the introduction of new technologies to build 'More Electric Aircraft' induces new challenges for boththe design and safety analysis of new aircraft. A model-based approach is needed for both design and valid...
详细信息
the introduction of new technologies to build 'More Electric Aircraft' induces new challenges for boththe design and safety analysis of new aircraft. A model-based approach is needed for both design and validation processes in order to manage the complexity and validate the conformance to safety requirements. In this paper, a SysML-based approach merging MBSE and MBSA is presented. this approach is applied to a Flight control System (FCS) both for the design and the validation processes. A parallel is made to compare the models used in each of these processes. this comparison led to suggestions of improvements both for the design and verification and validation approaches. (C) 2016, IFAC (International Federation of Automatic control) Hosting by Elsevier Ltd. All rights reserved.
An enterprise search represents a new area for a searching. this article provide base information what the enterprise search is about and the information about an implementation.
An enterprise search represents a new area for a searching. this article provide base information what the enterprise search is about and the information about an implementation.
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based accesscontrol;an accesscontrol concept for novel automotive HMI systems;monitor placem...
ISBN:
(纸本)9781450329392
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based accesscontrol;an accesscontrol concept for novel automotive HMI systems;monitor placement for large-scale systems;anomaly detection and visualization in generative RBAC models;reduction of accesscontrol decisions;towards more usable information flow policies for contemporary operating systems;attribute based accesscontrol for APIs in spring security;comprehensive integrity protection for desktop Linux;game theoretic analysis of multiparty accesscontrol in online social networks;scalable and precise automated analysis of administrative temporal role-based accesscontrol;accesscontrolmodels for geo-social computing systems;limiting access to unintentionally leaked sensitive documents using malware signatures;and user-centric identity as a service-architecture for eIDs with selective attribute disclosure.
Withthe aim of evading the difficulties of the Lyapunov function-based techniques in the control of nonlinear systems recently the Sigmoid Generated Fixed Point Transformation (SGFPT) has been introduced. this system...
详细信息
Withthe aim of evading the difficulties of the Lyapunov function-based techniques in the control of nonlinear systems recently the Sigmoid Generated Fixed Point Transformation (SGFPT) has been introduced. this systematic method has been presented for the generation of whole families of Fixed Point Transformations that can be used in nonlinear adaptive control of Single Input Single Output (SISO) as well as Multiple Input Multiple Output (MIMO) systems. this paper proposes a new control strategy based on the combination of the adaptive and optimal control by applying time-sharing in the SGFPT method. the scheduling strategy supports error containment by cyclic control of the different variables. Further, this paper introduces new improvements on SGFPT technique by introducing Stretched Sigmoid Functions. the efficiency of the presented control solution has been applied in the adaptive control of an underactuated mechanical system. Simulation results validate that the proposed scheme is far promising.
We address the generation and analysis of hard instances for verification problems in accesscontrolthat are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particu...
详细信息
ISBN:
(纸本)9781450335560
We address the generation and analysis of hard instances for verification problems in accesscontrolthat are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particular problem, the user-authorization query problem (UAQ) in Role-Based accesscontrol (RBAC). We show how to systematically generate hard instances for it. We then analyze what we call the structure of those hard instances. Our work brings the important aspect of systematic investigation of hard input classes to accesscontrol research.
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary de...
详细信息
ISBN:
(纸本)9781450335560
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary decisions to utilize users' blacklists in accesscontrol policies, resulting into eight access restrictions. We formally define these restrictions in a hybrid logic for relationship-based accesscontrol, and provide syntactical transformations to rewrite a hybrid logic accesscontrol formula when fixing an access restriction. this enables a flexible and user-friendly approach for restricting access in social networks. We develop efficient algorithms for enforcing a subset of accesscontrol policies with restrictions. the effectiveness of the access restrictions and the efficiency of our algorithms are evaluated on a Facebook dataset.
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes accesscontrol decisions. Existing cloud...
详细信息
暂无评论