115,272 Hits in 6.7 sec

Usage Control: A Vision for Next Generation Access Control [chapter]

Ravi Sandhu, Jaehong Park
2003 Lecture Notes in Computer Science  
The term usage control (UCON) is a generalization of access control to cover obligations, conditions, continuity (ongoing controls) and mutability.  ...  In this paper we motivate the need for usage control, define a family of ABC models as a core model for usage control and show how it encompasses traditional access control, such as mandatory, discretionary  ...  We believe usage control will provide a solid foundations for a robust framework for next generation access control.  ... 
doi:10.1007/978-3-540-45215-7_2 fatcat:gapcvcwwmjgjfhefe7g27pvocu

A virtualized usage control bus system

Cornelius Moucha, Enrico Lovat, Alexander Pretschner
2011 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Usage control is an extension of access control that additionally defines what must and must not happen to data after access has been granted.  ...  In this paper, we present a bus system to support system-wide usage control enforcement that, for security and performance reasons, is implemented in a hypervisor.  ...  These issues, albeit orthogonal to the contributed solution, are mentioned for completeness, since they are relevant for our vision of a comprehensive usage control environment.  ... 
doi:10.22667/jowua.2011.12.31.084 dblp:journals/jowua/MouchaLP11 fatcat:wmoppf7pobdyfnaufy5zpkusui

Data Usage Control in the Future Internet Cloud [chapter]

Michele Bezzi, Slim Trabelsi
2011 Lecture Notes in Computer Science  
Laws and regulations are evolving and new ones are continuously cropping up in order to try to control the terms of usage of these collected data, but generally not providing a real efficient solution.  ...  The increasing collection of private information from individuals is becoming a very sensitive issue for citizens, organizations, and regulators.  ...  Open Access.  ... 
doi:10.1007/978-3-642-20898-0_16 fatcat:jyjw3po4hjfuxk7ead6igh7aiu

Cognitive radio for TVWS usage

Diego Pineda, Cesar Hernandez
2019 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
, challenges for future research projects, and suggestions to improve current models.  ...  Spectrum scarcity is an emerging issue in wireless communication systems due to the increasing demand of broadband services like mobile communications, wireless internet access, IoT applications, among  ...  Acknowledgments The authors wish to thank Universidad Distrital Francisco José de Caldas for funding and support during the course of this research work.  ... 
doi:10.12928/telkomnika.v17i6.13111 fatcat:irncws45knhyzhrb2c2sp4vf44

Factors Affecting Controlled Vocabulary Usage in Art Museum Information Systems

Alison Gilchrest
2003 Art Documentation  
Linda McRae, "Indexing Images for Subject Access: Controlled Vocabularies in the VISION Project." Art Documentation, 19(2):2000, 8. 13 Joan M.  ...  In general, vocabulary control in collections management systems has yet to register as a significant priority for many institutions, but forming committees demonstrates that many are making an important  ... 
doi:10.1086/adx.22.1.27949230 fatcat:6vbjkhs4vrcrzkph77z2rk3cxy

PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution [article]

Yang Xiao, Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou
2020 arXiv   pre-print
In this paper, we propose PrivacyGuard, a system that leverages blockchain smart contract and trusted execution environment (TEE) to enable individual's control over the access and usage of their private  ...  and non-repudiable data usage record.  ...  PrivacyGuard empowers individuals with full control over the access and usage of their private data in a data market.  ... 
arXiv:1904.07275v2 fatcat:rxyphawisrfxzmlz7ydv52iuj4

Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions

Enrico Carniani, Gianpiero Costantino, Francesco Marino, Fabio Martinelli, Paolo Mori
2016 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
To consider these aspects, our paper proposes a video surveillance framework based on the Usage Control model.  ...  In this paper, we present the architecture of the proposed framework, we provide an example of Usage Control policy in a real scenario and we describe the main details of our two implementations.  ...  The Video Stream Elaborator is a software component developed as a Java application, and it uses JavaCV 3 to implement the functions for real-time computer vision, to access the camera video stream and  ... 
doi:10.22667/jowua.2016.12.31.020 dblp:journals/jowua/CarnianiCMMM16 fatcat:jihlg6r6ivcepm2vlbz3wzgk44

A model for context-sensitive usage control in healthcare information systems

Rodolfo Barriviera, Carlos Maziero
2017 Communiation Papers of the 2017 Federated Conference on Computer Science and Information Systems  
The results presented a great lack of computerization, the use of paper charts, and the need for a computer model of access control that considers the aspects of a real medical-hospital environment.  ...  The aim of this work is to define a continuous access control model for patient's medical information, which considers contextual information and that can be implemented in large scale environments, such  ...  RODOLFO BARRIVIERA, CARLOS MAZIERO: A MODEL FOR CONTEXT-SENSITIVE USAGE CONTROL  ... 
doi:10.15439/2017f439 dblp:conf/fedcsis/BarrivieraM17 fatcat:ddx5nc5eq5aqfhep2dvcu5vlvi

Distributed Control System in Mobile Robot Application: General Approach, Realization and Usage [chapter]

Andrey Vlasov, Anton Yudin
2011 Communications in Computer and Information Science  
This article is aimed to give a general idea of how to organize robot control with a distributed network of embedded devices.  ...  Suggested approach when properly described, understood and implemented is expected to form a good platform for concurrent individual software and hardware development and for educating new team members  ...  If there is a question of simplification, education and general usage involved we should pay more attention to how the system is realized.  ... 
doi:10.1007/978-3-642-27272-1_16 fatcat:vpckrcvfonasbmxdt3wrp5reuq

Open Source Software: An Approach to Controlling Usage and Risk in Application Ecosystems [article]

Stan Zajdel, Diego Elias Costa, Hafedh Mili
2022 arXiv   pre-print
The Open Source Software movement has been growing exponentially for a number of years with no signs of slowing.  ...  The lack of oversight, in general, hinders the quality of this software resulting in a trickle-down effect in the applications that use it.  ...  Maven build dependencies for example contain a group such as org.apache, etc while NPM build configurations generally do not so a default value can substituted for all NPM dependencies. (2) Dependency  ... 
arXiv:2206.10358v1 fatcat:vwwuu3qoejc4vl6clkyndugshq

Exploring iPhone usage

Ahmad Rahmati, Chad Tossell, Clayton Shepard, Philip Kortum, Lin Zhong
2012 Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services - MobileHCI '12  
A group of 10 lower SES participants were later recruited and confirm the influence of SES diversity on device usage.  ...  usage.  ...  As reported more in the next section, this group did not access the web or utilities applications as much.  ... 
doi:10.1145/2371574.2371577 dblp:conf/mhci/RahmatiTSKZ12 fatcat:ffyvtkp36veztpr5fppnnk7ie4

Enabling Usage Control Through Reputation Objects: A Discussion on e-Commerce and the Internet of Services Environments

Rehab Alnemr, Stefan Koenig, Torsten Eymann, Christoph Meinel
2010 Journal of Theoretical and Applied Electronic Commerce Research  
Even well known security mechanisms are not able to close all gaps of access and usage control.  ...  Control.  ...  reputation objects to enable usage control (discussed next section).  ... 
doi:10.4067/s0718-18762010000200005 fatcat:zyvowg2w3bbrbpsywwbzxyxqae

Assessing the Awareness and Usage of Quality Control Tools with Emphasis to Statistical Process Control (SPC) in Ethiopian Manufacturing Industries

Leakemariam Berhe, Tesfay Gidey
2016 Intelligent Information Management  
In general, the industries in Ethiopia are deficient in vigor and found to be stagnant hence less exposed to a highly competitive market  ...  The present work was devoted to assess the awareness and usage of quality control tools with the emphasis on statistical process control in Ethiopian manufacturing industries.  ...  Usage of Quality Control Tools for Quality Management Quality control tool may be described as a method which has a clear role and defined application; it is often limited in its focus and can be and usually  ... 
doi:10.4236/iim.2016.86011 fatcat:i6cfs5std5gpvef74ez7u37uci

Interactive publications: creation and usage

George R. Thoma, Glenn Ford, Michael Chung, Kirankumar Vasudevan, Sameer Antani, Jan P. Allebach, Hui Chao
2006 Digital Publishing  
As envisioned here, an "interactive publication" has similarities to multimedia documents that have been in existence for a decade or more, but possesses specific differentiating characteristics.  ...  The main characteristic that differentiates an interactive publication from a traditional multimedia document is that the reader would be able to reuse the media content for analysis and presentation,  ...  ACKNOWLEDGMENTS We gratefully acknowledge receiving CT, MRI and ultrasound images in the DICOM format from Eliot Siegel, M.D. of the VA Maryland Healthcare System, Baltimore, MD, and a cell development  ... 
doi:10.1117/12.641252 fatcat:avmwi4g7gvdkhmuqh2sdsxgavu

Understanding Internet Usage

Robert Larose, Dana Mastro, Matthew S. Eastin
2001 Social science computer review  
Finally, the negative outcomes of online behavior were analyzed for their impact on Internet usage.  ...  In a survey of 171 college students, the social-cognitive model explained 60% of the available variance in Internet usage using multiple regression analysis, a significant improvement over prior uses and  ...  He is a member of the National Academy of Sciences and a fellow of the American Academy of Arts and Sciences and has been a Guggenheim fellow and a fellow of the Center for Advanced Study in the Behavioral  ... 
doi:10.1177/089443930101900401 fatcat:7xggydjopjcw5ojbfhyxj4sudu
« Previous Showing results 1 — 15 out of 115,272 results