Filters








227,819 Hits in 10.5 sec

XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy [article]

Tran Khanh Dang, Xuan Son Ha, Luong Khiem Tran
2020 arXiv   pre-print
The datasets are XACML 3.0-based policies, including three samples of real-world policy sets.  ...  However, of late, the growing popularity of big data has created a new challenge which the security policy management is facing with such as dynamic and update policies in run time.  ...  On the one hand, using attribute-based approach is to express the dynamic security policy in terms of security and flexibility, and the dynamic archi-tecture gives dynamic authorization decisions.  ... 
arXiv:2005.07160v1 fatcat:dxpe77xqxbbnlonjec2s3ppu6a

Dynamic Knowledge Update Using Three-Way Decisions in Dominance-Based Rough Sets Approach While the Object Set Varies

Lei Wang, Min Li, Jun Ye, Xiang Yu, Ziqi Wang, Shaobo Deng
2019 International Journal of Computational Intelligence Systems  
Keywords Dominance-based rough sets approach (DRSA) Three-way decisions (3wds) Approximations Dynamic maintenance Vector inner product A B S T R A C T Dominance-based rough set approach is the extension  ...  of classical Pawlak rough set theories and methodologies, in which the information with preference-ordered relation on the domain of attribute value is fully considered.  ...  ACKNOWLEDGMENTS The author would like to thank reviewers of the paper for their constructive comments which greatly improve the quality of this paper.  ... 
doi:10.2991/ijcis.d.190807.001 fatcat:lorkvqjh5rgkfaykidbbpqqdx4

Dynamic Online learning Algorithm For Three-way decision

Gaojie Cheng, Jianmo Liu, Jianfeng Xu, Xiqiu Wang, Yansong Wang
2018 MATEC Web of Conferences  
Then, the logical reasoning for three-way decision regions changing are discussed based on the dynamic incremental and decreasing learning models.  ...  And a novel dynamic online learning algorithm for three-way decision online computing is proposed based on the above theory.  ...  Acknowledgement This work is supported by :National Natural Science Foundation of China (61763031)The Opening Project of Collaborative Innovation Center for Economics crime investigation and prevention  ... 
doi:10.1051/matecconf/201823203024 fatcat:p5arftrsdvfrbb5gt47xmspmpq

The Interval Parameter Optimization Model Based on Three-Way Decision Space and Its Application on "Green Products Recommendation"

Mingxia Li, Kebing Chen, Caiyun Liu, Baoxiang Liu
2020 Discrete Dynamics in Nature and Society  
The interval concept lattice theory, a new method of mining objects based on interval parameters, can more accurately deal with uncertain information than the classical concept lattice theory.  ...  From the perspective of three-way decision space, we first combine the theories of interval concept lattice and three-way decision and then put forward interval three-way decision space theory; second,  ...  as the rules of decision-making based on three-way decision space.  ... 
doi:10.1155/2020/9587353 doaj:1f329d973b7449bea8378e7cf8a2ebbc fatcat:25gg54iupjc6bkzy3igcs46yrm

Usage Control Model Specification in XACML Policy Language [chapter]

Um-e-Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal
2012 Lecture Notes in Computer Science  
Usage control model (UCON) is one of the emerging and comprehensive attribute based access control model that has the ability of monitoring the continuous updates in a system making it better than the  ...  other models of access control.  ...  AM handles the updating of attribute values in three access phases; before, during and after access.  ... 
doi:10.1007/978-3-642-33260-9_5 fatcat:pswynhwrhfhthglmhy7ukm6a2e

Dynamic composite decision-theoretic rough set under the change of attributes

Linna Wang, Xin Yang, Yong Chen, Ling Liu, Shiyong An, Pan Zhuo
2018 International Journal of Computational Intelligence Systems  
Moreover, we propose the incremental updating mechanisms and algorithms under the addition and deletion of attributes.  ...  Subsequently, we present a novel matrix-based approach to compute the upper and lower approximations in proposed model.  ...  The authors would like to thank Professor Yiyu Yao for useful comments on this study.  ... 
doi:10.2991/ijcis.11.1.27 fatcat:grlkhgucsjg5fmqlutvbrmlbv4

Distributed Modeling Architecture of a Multi-Agent-Based Behavioral Economic Landscape (MABEL) Model

Zhen Lei, Bryan C. Pijanowski, Konstantinos T. Alexandridis, Jennifer Olson
2005 Simulation (San Diego, Calif.)  
Based on agentbased modeling methodologies, MABEL presents a bottom-up approach to allow the analysis of dynamic features and relations among geographic, environmental, human, and socioeconomic attributes  ...  The authors discuss a distributed modeling architecture in a multi-agent-based behavioral economic landscape (MABEL) model that simulates land-use changes over time and space.  ...  The authors wish to thank the following agencies for funding of this work: National Science Foundation Biocomplexity Program (BE/CNH 0308420), National Science Foundation Water Cycle Research Program (  ... 
doi:10.1177/0037549705058067 fatcat:piv7ubqm5bekfifrps44dnfvw4

New advances in three-way decision, granular computing and concept lattice

Xizhao Wang, Jinhai Li
2020 International Journal of Machine Learning and Cybernetics  
, multi-granularity incremental three-way concept learning, approximation updating and attribute reduction, multi-granularity sequential clustering, decision making and active learning, and so on.  ...  In the fifth paper entitled "An efficient three-way clustering algorithm based on gravitational search"  ...  In the tenth paper entitled "A general conflict analysis model based on three-way decision", Guangming Lang proposes a general framework for three-way conflict analysis, and shows that the existing five  ... 
doi:10.1007/s13042-020-01117-3 fatcat:rsophae27nhf5d3f6cyvnciyd4

Risk-Aware Usage Decision Making in Highly Dynamic Systems

Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin
2010 2010 Fifth International Conference on Internet Monitoring and Protection  
Usage control model (UCON) is based on the idea that attributes required for decision-making can be changed over a period of usage.  ...  The proposed approach could be useful for designers of the policy enforcement engines based on the UCON model.  ...  Freshness of attribute values Since the UCON model assumes that attributes may change, fresh values of the attributes are essential for a correct access decision [11] , [5] .  ... 
doi:10.1109/icimp.2010.13 fatcat:b35suwqduzg37ejhwo6ldxvuge

Autogenerator-Based Modelling Framework for Development of Strategic Games Simulations: Rational Pigs Game Extended

Robert Fabac, Danijel Radošević, Ivan Magdalenić
2014 The Scientific World Journal  
In addition, due to the existence of particular attributes of the new player, "the tramp," one equilibrium point from the original game is destabilized which has an influence on the decision-making of  ...  When considering strategic games from the conceptual perspective that focuses on the questions of participants' decision-making rationality, the very issues of modelling and simulation are rarely discussed  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2014/158679 pmid:25254228 pmcid:PMC4165201 fatcat:j5mhkzp2t5egboq2ydph7qmcne

Uncertainty-Aware Authentication Model for Fog Computing in IoT

Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa
2019 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)  
Therefore, we have proposed a novel prediction model based on the extension of Attribute Based Access Control (ABAC) model. Our data-driven model is able to handle uncertainty in authentication.  ...  This work defines the uncertainty challenge for authentication phase of the access control in fog computing because on one hand fog has a number of characteristics that amplify uncertainty in authentication  ...  In other words, the way of updating the model parameters in logistic regression is the same as the way of updating the weights in neural network model.  ... 
doi:10.1109/fmec.2019.8795332 dblp:conf/fmec/HeydariMKBTB19 fatcat:bvekpnlpqjesxfbhnmdf2wzmqm

Towards a VMM-based usage control framework for OS kernel integrity protection

Min Xu, Xuxian Jiang, Ravi Sandhu, Xinwen Zhang
2007 Proceedings of the 12th ACM symposium on Access control models and technologies - SACMAT '07  
In this paper we present a simple but effective usage control model UCONKI with unique properties of decision continuity and attribute mutability for OS kernel integrity protection.  ...  Protecting kernel integrity is one of the fundamental security objectives in building a trustworthy operating system (OS).  ...  That is, authorization decisions should be based on the real-time attribute values of requesting subjects and target objects.  ... 
doi:10.1145/1266840.1266852 dblp:conf/sacmat/XuJSZ07 fatcat:da4655rgkbhobcudgwa5vkikdu

HEAD Metamodel: Hierarchical, Extensible, Advanced, and Dynamic Access Control Metamodel for Dynamic and Heterogeneous Structures

Nadine Kashmar, Mehdi Adda, Hussein Ibrahim
2021 Sensors  
To address this issue, we propose a Hierarchical, Extensible, Advanced, and Dynamic (HEAD) AC metamodel for dynamic and heterogeneous structures that is able to encompass the heterogeneity of the existing  ...  What makes this reality also challenging is the diversity and the heterogeneity of access control (AC) models, which are implemented and integrated with a countless number of information systems.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21196507 pmid:34640825 pmcid:PMC8512299 fatcat:ghktpm7tv5gsdaldzixlor5exq

Anticipating habit formation

Chao Zhang, Arlette van Wissen, Daniël Lakens, Joaquin Vanschoren, Boris de Ruyter, Wijnand A. IJsselsteijn
2016 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - UbiComp '16  
based on model predictions.  ...  We present here an approach where the system implements a formal model of habit formation based on psychology theories, anticipates the behaviors and cognitive states of the users, and picks interventions  ...  Finally, the dynamics of affective and instrumental attitude can be modeled as the updates of beliefs towards the value distributions of attributes for different options, following principles of reinforcement  ... 
doi:10.1145/2968219.2968439 dblp:conf/huc/ZhangWLVRI16 fatcat:62ldpqhpenee5ie3ovjkhtytby

A Unified Data and Service Integration Approach for Dynamic Business Collaboration

Chen Liu, Jianwu Wang, Yan Wen, Yanbo Han
2012 2012 IEEE First International Conference on Services Economics  
This approach can help dynamic businss collaboration by on demand and automatic updates of both data integration results and service integration results.  ...  In this paper, we propose a businss object model where data and its services are correlated, and a corresponding unified approach in which the modeling, composition and interaction of both data and service  ...  Secondly, based on the lifecycle of the business object model, a unified data and service integration approach, called UDSI, is proposed for dynamic collaboration.  ... 
doi:10.1109/se.2012.16 fatcat:5dsep6nn6few5mw5j2t3l5ufpq
« Previous Showing results 1 — 15 out of 227,819 results