Filters








18,673 Hits in 5.9 sec

Model Transformation With A Visual Control Flow Language

László Lengyel, Tihamér Levendovszky, Gergely Mezei, Hassan Charaf
2008 Zenodo  
Graph rewriting-based visual model processing is a widely used technique for model transformation.  ...  This paper presents the visual control flow support of Visual Modeling and Transformation System (VMTS), which facilitates composing complex model transformations of simple transformation steps and executing  ...  A test rule is a special expression and it is used to change the control flow during execution. A test rule has only LHS.  ... 
doi:10.5281/zenodo.1076889 fatcat:7fdvlq4xnzaxzbntxmgkik7fpi

Property Verification for Generic Access Control Models

Vincent C. Hu, D. Richard Kuhn, Tao Xie
2008 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
Popular access control models with these types of properties include Role-Based Access Control (RBAC) [2] and Multi-Level Access Control [3] .  ...  Thus a pseudo code representation of the access control rules is: if u_l >= f_l & act = rd then GRANT; else if f_l >= u_l & act = wr then GRANT; else DENY; The Static Constraints property of this policy  ... 
doi:10.1109/euc.2008.22 dblp:conf/euc/HuKX08 fatcat:cgauvgs74jhtfk75kfwpdyaewa

Analysis and Comparison of Access Control Policies Validation Mechanisms

Muhammad Aqib, Riaz Ahmed Shaikh
2014 International Journal of Computer Network and Information Security  
These three [1] types of models are: Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access Control (RBAC). In this section we will briefly describe these models.  ...  In MAC, certain rules are defined by the administrators of the system and access to different resources is granted on the basis of those rules.  ...  According to authors, the access control rules are collection of attributes.  ... 
doi:10.5815/ijcnis.2015.01.08 fatcat:5l57q7pkdvfwbe2bxxnewtkn4a

Distributed Usage Control Architecture for Business Coalitions

M. Stihler, A. O. Santin, A. Calsavara, A. L. Marcon
2009 2009 IEEE International Conference on Communications  
We present a brokered access control architecture, based on UCON ABC , to obtain an integrated usage control management for BC.  ...  The consumer defines user-level policies to control the usage of the contracted services. We developed a web services based prototype to evaluate the feasibility of our proposal.  ...  USAGE CONTROL AND POLICY ARCHITECTURES Traditional access controls (i.e. discretionary access control, mandatory access control and role-based access control) are unable to take into account changes that  ... 
doi:10.1109/icc.2009.5198940 dblp:conf/icc/StihlerSCM09 fatcat:gbxk6a4nizarvmv6u44oixfady

Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk

Pengshou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guoqiang Ma, Xue-Ming Han
2020 International Journal of Network Security  
Traditional access control models have been difficult to meet the requirements of various access control conditions and dynamic adaptive adjustment of access control strategy.  ...  Aimed at the problem of adaptive access control model of vehicular network big data environment, XACML powerful ability of expressing access strategy is used in the paper, and we conduct the risk quantification  ...  Acknowledgement This research is supported by the National Natural Science Foundations of China under Grants No.61862040 and No.61762059.  ... 
dblp:journals/ijnsec/XieFFYMH20 fatcat:2kipokagwzbk5p6s4cjvvfldlm

Toward Protecting the Privacy of Individuals When Disseminating Data: Challenges in Disclosure Risk Assessment

Tom Krenzke, Jianzhu Li
2019 Zenodo  
missing values, query tools, geography, attribute disclosure, risk of synthetic data, and external data.  ...  Link to recording Description: We discuss the theory and background of useful approaches for determining the level of data disclosure risk prior to disseminating data.  ...  and Attribute disclosure -Special cases of Inferential Vulnerable to Inferential disclosure Up until now, data controllers not too concerned about inferential disclosure, due to strict access controls  ... 
doi:10.5281/zenodo.4122091 fatcat:77dmgfzdgnfutm3qw3lw6d3w6q

Graph- versus Vector-Based Analysis of a Consensus Protocol

Giorgio Delzanno, Arend Rensink, Riccardo Traverso
2014 Electronic Proceedings in Theoretical Computer Science  
We compare the results with those obtained by the standard model checker Spin on the basis of a vector-based encoding of the algorithm.  ...  Due to asynchronous communication, exhaustive analysis may generate very large state spaces already for small model instances.  ...  Figure 3 : 3 Example initial configuration of the Paxos protocol Figure 4 : 4 Top-level control and initialization rule created as a result of the rule, as are the +-prefixed attributes in the Proposer  ... 
doi:10.4204/eptcs.159.5 fatcat:n2gb7td7u5emlhyleieyye6mym

Class-based Visibility from an MDA Perspective: From Access Graphs to Eiffel Code

Gilles Ardourel, Marianne Huchard
2004 Journal of Object Technology  
In this paper, we describe the integration of AGATE, a suite of access graph based tools dedicated to access control, in the MDA process.  ...  We explore solutions for introducing design and implementation of class-based access control from a Model-Driven Architecture (MDA) perspective.  ...  CERES is the result of research supported by France Télécom R&D. 192 JOURNAL OF OBJECT TECHNOLOGY VOL 3, NO. 4  ... 
doi:10.5381/jot.2004.3.4.a10 fatcat:pmrotcquxfgx7nr7vuj4gfxchq

Knowledge Extraction and Prediction from Behavior Science Randomized Controlled Trials: A Case Study in Smoking Cessation

Francesca Bonin, Martin Gleize, Yufang Hou, Debasis Ganguly, Ailbhe N Finnerty, Charles Jochim, Alessandra Pascale, Pierpaolo Tommasi, Pol Mac Aonghusa, Susan Michie
2021 AMIA Annual Symposium Proceedings  
, given the extracted knowledge, in the domain of behavior change for smoking cessation.  ...  Due to the fast pace at which randomized controlled trials are published in the health domain, researchers, consultants and policymakers would benefit from more automatic ways to process them by both extracting  ...  Rule-based Flair (w/o Table) Flair (w/ Table) and without the pseudo-sentences from tables (w/o Table) compared with the unsupervised rule-based baseline.  ... 
pmid:33936397 pmcid:PMC8075460 fatcat:t3chbqb2uvcrziljdffyczhgfu

Notification Oriented and Object Oriented Paradigms Comparison via Sale System

Jean M. Simão, Danillo L. Belmonte, Adriano F. Ronszcka, Robson R. Linhares, Glauber Z. Valença, Roni F. Banaszewski, João A. Fabro, Cesar A. Tacla, Paulo C. Stadzisz, Márcio V. Batista
2012 Journal of Software Engineering and Applications  
according to the principles of NOP based on a NOP framework in C++.  ...  This paper presents a new programming paradigm named Notification-Oriented Paradigm (NOP) and analyses the performance aspects of NOP programs by means of an experiment.  ...  In turn, the Figure 8 shows the pseudo-code of the process to create a sale order based on the OOP paradigm.  ... 
doi:10.4236/jsea.2012.59083 fatcat:oipfwxnfzfgkfitqjclhdb4kaq

A Flexible SDN-based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks using Machine Learning

Jesus Arturo Perez-Diaz, Ismael Amezcua Valdovinos, Kim-Kwang Raymond Choo, Dakai Zhu
2020 IEEE Access  
In our testing topology, the intrusion prevention detection system mitigates all attacks previously detected by the IDS system.  ...  We also remark that in our deployment, we use the open network operating system (ONOS) controller running on Mininet virtual machine in order for our simulated environment to be as close to real-world  ...  ACKNOWLEDGMENT We thank José Abraham Torres, Abel Daniel Yañez, Bernardo Laing and Leví Carbellido for their assistance in the testing and deployment of the architecture.  ... 
doi:10.1109/access.2020.3019330 fatcat:4ipcy2yik5davmvobivba5dz4y

Heuristic-based feature selection for rough set approach

U. Stańczyk, B. Zielosko
2020 International Journal of Approximate Reasoning  
Experimental results show that elimination of less relevant attributes through the proposed methodology led to inferring rule sets with reduced cardinalities, while maintaining rule quality necessary for  ...  Zielosko, Heuristic-based feature selection for rough set approach, Int.  ...  For each 510 reduced set of attributes new rule sets were inferred and the performance of rule classifiers evaluated with test sets, as shown in the next section.  ... 
doi:10.1016/j.ijar.2020.07.005 fatcat:mlcovuoylbdedlxt6ldhx42hhu

Survey of Interoperability in Electronic Health Records Management and Proposed Blockchain Based Framework: MyBlockEHR

Rahul G. Sonkamble, Shraddha P. Phansalkar, Vidyasagar M. Potdar, Anupkumar M. Bongale
2021 IEEE Access  
An exhaustive study of these questions establishes the potential of a blockchain-based EHR management framework in privacy preservation, access control and efficient storage.  ...  The research gaps culminate in proposing a blockchain-based EHR framework with privacy preservation and access control design.  ...  IAM solutions, data anonymization, role-based access control, patient-centric access-controls for EHR are some of the objectives of EHR privacy preservation system.  ... 
doi:10.1109/access.2021.3129284 fatcat:o4shlvvcmvfahkstrxvq3piq64

A graph partitioning heuristic for the parallel pseudo-exhaustive logical test of VLSI combinational circuits

Alexandre A. Andreatta, Celso C. Ribeiro
1994 Annals of Operations Research  
The pseudo-exhaustive approach for the logical test of integrated circuits consists in partitioning the original circuit to be tested into non-overlapping subcircuits with a small, bounded number of subcircuits  ...  , which are then exhaustively tested in parallel.  ...  Controllability concerns the possibility of accessing and applying a complete set of input test patterns to a circuit through external inputs or control points.  ... 
doi:10.1007/bf02085633 fatcat:hiaqr3xr5rdgrbwhidjbunntq4

A hardware security solution against scan-based attacks

Ankit Mehta, Darius Saif, Rashid Rashidzadeh
2016 2016 IEEE International Symposium on Circuits and Systems (ISCAS)  
pseudo exhaustive testing, and pseudo random testing.  ...  Pseudo Random Testing In this type of testing, a pseudo-random test pattern generator is used (PRPG) for generating the pseudo random test sequences [9, 10, 15] .  ... 
doi:10.1109/iscas.2016.7538894 dblp:conf/iscas/MehtaSR16 fatcat:vyg6war4xfg57fjezfneaxj7nq
« Previous Showing results 1 — 15 out of 18,673 results