272,689 Hits in 7.0 sec

XACML for Building Access Control Policies in Internet of Things

Hany F. Atlam, Madini O. Alassafi, Ahmed Alenezi, Robert J. Walters, Gary B. Wills
2018 Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security  
Building an efficient access control model for the IoT require selecting an appropriate access policy language to implement access policies.  ...  One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request.  ...  ACKNOWLEDGEMENTS We acknowledge Egyptian cultural affairs and mission sector and Menoufia University for their scholarship to Hany Atlam that allows the research to be funded and undertaken.  ... 
doi:10.5220/0006725102530260 dblp:conf/iotbd/AtlamAAWW18 fatcat:numhemwx6vf4jghud73ueplmyi

The Next 700 Policy Miners: A Universal Method for Building Policy Miners [article]

Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin
2019 arXiv   pre-print
To design a policy miner using Unicorn, one needs a policy language and a metric quantifying how well a policy fits an assignment of permissions to users.  ...  From these, one builds the policy miner as a search algorithm that computes a policy that best fits the given permission assignment.  ...  Our method gives a step-by-step procedure to build a policy miner from just the policy language and an objective function that measures how well a policy ts an assignment of permissions to users.  ... 
arXiv:1908.05994v2 fatcat:4sefgd2xv5gpngm6dogjviizii

Building an Application-Aware IPsec Policy System

Heng Yin, Haining Wang
2007 IEEE/ACM Transactions on Networking  
An alternative approach is to configure application-specific IPsec policies, but the current IPsec policy system lacks the knowledge of the context of applications running at upper layers, making it infeasible  ...  In this paper, we propose an application-aware IPsec policy system on the existing IPsec/IKE infrastructure, in which a socket monitor running in the application context reports the socket activities to  ...  FreeS/WAN proposed an extension to IPsec, which is called opportunistic encryption [25] .  ... 
doi:10.1109/tnet.2007.896536 fatcat:el7dsxlksncnxpknwfdnr7ikxe


1978 Building Research Policies  
ACKNOWLEDGMENTS The authors would like to acknowledge Ramdus Murali for his work in implementing the assumption-based truth maintenance used in SATURN, Steve Minnaar and KAre Christiansen for extensively  ...  development of SEED is sponsored by Battelle Pacific Northwest Laboratory, the US Army Corps of Engineers Construction Research Laboratory (USACERL) and the Engineering Design Research Center (EDRC) at CMU, an  ...  Integrating these features into the familiar spreadsheet-like user interface has significantly simplified model building. allowing developers to focus more on the model building process and less on AI-oriented  ... 
doi:10.1016/b978-0-08-022391-9.50004-2 fatcat:js5fyseh25b2blhnefjsyafpje

Policy design for controlling set-point temperature of ACs in shared spaces of buildings

Wayes Tushar, Tao Wang, Lan Lan, Yunjian Xu, Chathura Withanage, Chau Yuen, Kristin L. Wood
2017 Energy and Buildings  
In particular, we choose meeting rooms in an office building as the test case and design a policy according to which each user of the room can give a preference on the temperature set-point and is paid  ...  Therefore, it is a challenging task to design an office policy to decide on a particular set-point based on such a diverse preference set.  ...  To this end, the energy policy discussed in the paper considers an office building as the test case, where the design of the policy considers, on the one hand, each user of a room can provide a preference  ... 
doi:10.1016/j.enbuild.2016.10.027 fatcat:o5m2vt7s5ncutbp4mygbm62zme

Energy in buildings—Policy, materials and solutions

Matthias M. Koebel, Jannis Wernery, Wim J. Malfait
2017 MRS Energy & Sustainability  
This manuscript provides a bird's eye view on energy in buildings. We discuss how energy policy leads to building standards that affect innovation in the building sector.  ...  We describe how policy affects innovative businesses and the adoption of new products and solutions. We investigate how the building envelope and user behavior determine building energy demands.  ...  Smart homes are equipped with sensors that not only feed into the building energy management system but also improve the safety of, e.g., elderly occupants. 174 There is an extensive literature on optimization  ... 
doi:10.1557/mre.2017.14 fatcat:efindt56gjanvcxb6q76xctqni

Building smart cannabis policy from the science up

Susan R.B. Weiss, Katia D. Howlett, Ruben D. Baler
2017 International journal of drug policy  
, has ushered in an evolving climate of acceptance and a new era of improved access to more effective interventions, at least in the United States.  ...  To minimize this risk, science must be front and center in this important policy debate.  ...  an important new sub-field in policy research.  ... 
doi:10.1016/j.drugpo.2017.01.007 pmid:28189459 pmcid:PMC5404989 fatcat:f2uzrvfuufbbpcegz7net5d2tq

Building 'implicit partnerships'? Financial long-term care entitlements in Europe

Joan Costa-Font, Valentina Zigante
2020 Policy sciences  
We build on the concept of 'implicit partnerships', an implicit (or 'silent') agreement, encompassing the financial co-participation of both public funders, and families either by both allocating time  ...  Next, we provide suggestive evidence of policy reforms modifying public entitlements in seven European countries which can be classified as either 'implicit user partnerships' or 'implicit caregiver partnerships  ...  This paper tried to fill the gap by examining the conditions the allow the extension of a partial coverage which we define as an 'implicit partnership'.  ... 
doi:10.1007/s11077-020-09403-1 fatcat:my3ism3rcrdfbckyetnzwwjezq

Towards a very low-energy building stock: modelling the US commercial building sector to support policy and innovation planning

Brian Coffey, Sam Borgeson, Stephen Selkowitz, Joshua Apte, Paul Mathew, Philip Haves
2009 Building Research & Information  
In addition to supporting the interactive exploration of building stock dynamics, the model has been used to study the likely outcomes of specific policy and innovation scenarios targeting very low future  ...  The model is based on a flexible structure that disaggregates the stock into various categories (e.g. by building type, climate, vintage and life-cycle stage) and assigns attributes to each of these (e.g  ...  We intend to further develop the stock model over time to aid in continued policy and R&D planning.  ... 
doi:10.1080/09613210903189467 fatcat:3sxoxr54pfhfrjdw332me7iq2m

Building and sustaining data infrastructures: putting policy into practice [article]

Juan Bicarregui
It ends with an outline of a possible programme of work to begin to implement this new data infrastructure.  ...  This report describes the personal view of the author on the topic of building and sustaining data infrastructures.  ...  enabling the user to search by the actual value of a data field.  ... 
doi:10.6084/m9.figshare.13193774.v1 fatcat:uapytgw6zzfolnngzmehgctl7e

Building an Islamic financial information system based on policy managements

Izzat Alsmadi, Mohammad Zarour
2015 Journal of King Saud University: Computer and Information Sciences  
We developed a model based on XACML policy management to show how an Islamic financial information system can be used to make decisions for day to day bank activities.  ...  rules where policy management systems such as XACML are usually used.  ...  The open source Deny users to withdraw an amount which is more than their balance 2 Prevent Insurance of type: life insurance Figure 3 An example of implementing an authorization rule.  ... 
doi:10.1016/j.jksuci.2014.11.001 fatcat:jystczahmrajvivps3avij7yja


Engkus Engkus Engkus, Engkus Engkus Engkus
2019 Sosiohumaniora  
This study aims to determine how the policy formulation of Bandung Mayor Regulation Number 1023 of 2016 concerning Green Buildings, examined by the system model of David Easton (2003).  ...  Keywords: Policy Formulation; Bandung Mayor Regulation; Green Building; Community Understanding  ...  Over the past 5 years, the average number of electricity users has increased to 43,017 users every year, with an increase in connected power of 121,769 KVA.  ... 
doi:10.24198/sosiohumaniora.v21i3.23612 fatcat:26d5elcgl5dtvmee4xzt2cwwby

Problems of building an effective policy information security of the enterprise

Andrii Pecheniuk
2021 Zenodo  
The necessity of building an effective information security policy of a modern enterprise is substantiated, the main components of such a policy are highlighted; summarizes the main types of information  ...  be considered at construction of a policy of information security is offered; offers a number of recommendations to minimize the risks associated with information security of the enterprise.  ...  Therefore, the preparation and implementation of an effective information security policy is one of the most important tasks to be solved when building an information system of a modern enterprise.  ... 
doi:10.5281/zenodo.4904552 fatcat:eqzd2rxitjastlqpi23ujnbfye

How energy efficiency fails in the building industry

Marianne Ryghaug, Knut H. Sørensen
2009 Energy Policy  
to regulate the building industry, and (3) a conservative building industry.  ...  It argues that energy-efficient construction has been seriously restrained by three interrelated problems: (1) deficiencies in public policy to stimulate energy efficiency, (2) limited governmental efforts  ...  Finally, we want to thank the two anonymous reviewers for very valuable suggestions to improve the paper. Notes  ... 
doi:10.1016/j.enpol.2008.11.001 fatcat:yxcnwdw5cndptao45z4c4jkjzq

Two Rule-Based Building-Block Architectures for Policy-Based Network Control [chapter]

Yasusi Kanada
2000 Lecture Notes in Computer Science  
To support such building-block policies, two architectures for modeling a set of policies have been developed: pipeconnection architecture and label-connection architecture.  ...  Policy-based networks can be customized by users by injecting programs called policies into the network nodes.  ...  An appropriate first step toward active networks is to build an extensible policy-based network, because such a network can be customizable by users by deploying policies and because programs, which are  ... 
doi:10.1007/3-540-40057-5_15 fatcat:l2n5r66xbrbavgqov44cizbw4q
« Previous Showing results 1 — 15 out of 272,689 results