To see the other types of publications on this topic, follow the link: Access control decisions.

Journal articles on the topic 'Access control decisions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Access control decisions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Savchyn, M., A. Zavydniak, and V. Olashyn. "Direct Effect of the Constitution of Ukraine in Focus: Access to the Justice and Judicial Control of the Enforcement of Judgment." Uzhhorod National University Herald. Series: Law, no. 70 (June 18, 2022): 146–55. http://dx.doi.org/10.24144/2307-3322.2022.70.21.

Full text
Abstract:
Proper enforcement of court decisions is part of the general concept of access to justice, as it involves the restoration of violated rights by third parties or public authorities. From the point of view of the supremacy of the constitution and their direct effect, the article analyzes the enforcement of court decisions in relation to access to justice. The first part reveals the relationship between constitutional and international standards of access to justice. The second part highlights the main components of access to administrative justice. The third part of the paper analyzes the standards of due process and judicial control over the execution of court decisions. Since we are talking about judicial control over the execution of a court decision and the execution of such a decision as ways of achieving results for persons who have applied for protection of their rights with a lawsuit, it is worth focusing on the applicants. Such in the enforcement proceedings will be the parties to the enforcement proceedings, or rather one of the parties - the claimant. Access to justice in the context of the principles of constitutional and international law is interpreted on the grounds that the right to judicial protection is not absolute and may be limited on the basis of proportionality, in particular for reasons of procedural economy, efficiency and effectiveness of legal protection. The concept of access to justice follows from the understanding of the rule of law and Rechtsstaat in their relationship. The components of access to justice are the following: 1) pre-trial settlement procedures, in particular mediation; 2) access to legal aid and court fees; 3) terms of consideration of the case; 4) the procedure for appealing court decisions; 5) efficiency and effectiveness of execution of court decisions. Together, they form the notion of access to justice, which is complete provided that court decisions are effectively enforced within a reasonable time. This is influenced by a number of institutional and procedural factors that depend on the degree of development of the legal culture of society.
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Kun, and Yun Song Jian. "Research on a New Access Control Technology." Advanced Materials Research 765-767 (September 2013): 1858–62. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1858.

Full text
Abstract:
The term usage control (UCON)[1] is a generalization of access control to cover obligations, conditions, continuity (ongoing controls) and mutability. Traditionally, access control has dealt only with authorization decisions on a subject's access to target resources, and as a consequence of access have not been systematically studied. In this paper we motivate the need for usage control, study a family of ABC models as a core model for usage control and show how it encompasses traditional access control, such as mandatory, discretionary and role-based access control,. In addition, we also discuss architectures that introduce a new reference monitor for usage control and some variations.
APA, Harvard, Vancouver, ISO, and other styles
3

Barrilleaux, Charles J., and Mark E. Miller. "Decisions without Consequences: Cost Control and Access in State Medicaid Programs." Journal of Health Politics, Policy and Law 17, no. 1 (1992): 97–118. http://dx.doi.org/10.1215/03616878-17-1-97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (October 27, 2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.

Full text
Abstract:
Recent years have seen an increasing popularity of online collaborative systems like social networks and web-based collaboration platforms. Collaborative systems typically offer their users a digital environment in which they can work together and share resources and information. These resources and information might be sensitive and, thus, they should be protected from unauthorized accesses. Multi-party access control is emerging as a new paradigm for the protection of co-owned and co-managed resources, where the policies of all users involved in the management of a resource should be accounted for collaborative decision making. Existing approaches, however, only focus on the jointly protection of resources and do not address the protection of the individual user policies themselves, whose disclosure might leak sensitive information. In this work, we propose a privacy-preserving mechanism for the evaluation of multi-party access control policies, which preserves the confidentiality of user policies while remaining capable of making collaborative decisions. To this end, we design secure computation protocols for the evaluation of policies in protected form against an access query and realize such protocols using two privacy-preserving techniques, namely Homomorphic Encryption and Secure Functional Evaluation. We show the practical feasibility of our mechanism in terms of computation and communication costs through an experimental evaluation.
APA, Harvard, Vancouver, ISO, and other styles
5

Atlam, Hany F., Muhammad Ajmal Azad, and Nawfal F. Fadhel. "Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model." Sensors 22, no. 5 (March 4, 2022): 2005. http://dx.doi.org/10.3390/s22052005.

Full text
Abstract:
Providing a dynamic access control model that uses real-time features to make access decisions for IoT applications is one of the research gaps that many researchers are trying to tackle. This is because existing access control models are built using static and predefined policies that always give the same result in different situations and cannot adapt to changing and unpredicted situations. One of the dynamic models that utilize real-time and contextual features to make access decisions is the risk-based access control model. This model performs a risk analysis on each access request to permit or deny access dynamically based on the estimated risk value. However, the major issue associated with building this model is providing a dynamic, reliable, and accurate risk estimation technique, especially when there is no available dataset to describe risk likelihood and impact. Therefore, this paper proposes a Neuro-Fuzzy System (NFS) model to estimate the security risk value associated with each access request. The proposed NFS model was trained using three learning algorithms: Levenberg–Marquardt (LM), Conjugate Gradient with Fletcher–Reeves (CGF), and Scaled Conjugate Gradient (SCG). The results demonstrated that the LM algorithm is the optimal learning algorithm to implement the NFS model for risk estimation. The results also demonstrated that the proposed NFS model provides a short and efficient processing time, which can provide timeliness risk estimation technique for various IoT applications. The proposed NFS model was evaluated against access control scenarios of a children’s hospital, and the results demonstrated that the proposed model can be applied to provide dynamic and contextual-aware access decisions based on real-time features.
APA, Harvard, Vancouver, ISO, and other styles
6

Yu, Hui, and Dongyan Chen. "New Optimal Control Decisions for Channel System With Lagged Effect: Dynamic Advertising and Pricing Cases." IEEE Access 7 (2019): 75350–59. http://dx.doi.org/10.1109/access.2019.2918347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Laitrakun, Seksan. "Decision fusion for composite hypothesis testing in wireless sensor networks over a shared and noisy collision channel." International Journal of Distributed Sensor Networks 16, no. 7 (July 2020): 155014772094020. http://dx.doi.org/10.1177/1550147720940204.

Full text
Abstract:
We consider the composite hypothesis testing problem of time-bandwidth-constrained distributed detection. In this scenario, the probability distribution of the observed signal when the event of interest is happening is unknown. In addition, local decisions are censored and only those uncensored local decisions will be sent to the fusion center over a shared and noisy collision channel. The fusion center also has a limited time duration to collect transmitted decisions and make a final decision. Two types of medium access control that the sensor nodes apply to send their decisions are investigated: time division multiple access and slotted-Aloha. Unlike using the time division multiple access protocol, the slotted-Aloha-based distributed detection will experience packet collisions. However, in this article, since only uncensored decisions are sent, packet collisions are informative. We derive fusion rules according to generalized likelihood ratio test, Rao test, and Wald test for both the time division multiple access–based distributed detection and the slotted-Aloha-based distributed detection. We see that the fusion rules for the slotted-Aloha-based distributed detection here also exploit packet collisions in the final decision-making. In addition, the asymptotic performances and energy consumption of both schemes are analyzed. Extensive simulation and numerical results are provided to compare the performances of these two schemes. We show that, for a given time delay, the slotted-Aloha-based distributed detection can outperform the time division multiple access–based distributed detection by increasing the number of sensor nodes which results in higher energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
8

MIAO, Siwei, Xiaojuan ZHANG, and Zhe LIU. "Fine-Grained Access Control Mechanism of Energy Internet." Wuhan University Journal of Natural Sciences 27, no. 3 (June 2022): 231–39. http://dx.doi.org/10.1051/wujns/2022273231.

Full text
Abstract:
The Energy Internet has generated huge amounts of information on the production devices, transmission devices, and energy consumption devices. The leakage of data in the collection, transmission, and storage process will cause serious security problems. The existing Energy Internet security methods rely on traditional access control mechanisms and specific network boundary defense mechanisms, which has the limitations of static strategies and coarse design. We combine the advantages of role-based access control (RBAC) and attribute-based access control (ABAC), and propose a trusted Energy Internet fine-grained access control model based on devices' attribute and users' roles. We have not only achieved fine-grained Energy Internet resource allocation, but also ensured that the access control process is related to the security status of the environment in real time. Experimental results show that the access control model can safely and accurately execute access decisions in the Energy Internet scenario, and the processing performance is more stable.
APA, Harvard, Vancouver, ISO, and other styles
9

Arudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.

Full text
Abstract:
With the wide adoption of Internet, security of web database is a key issue. In web-based applications, due to the use of n-tier architecture, the database server has no knowledge of the web application user and hence all authorization decisions are based upon execution of specific web application. Application server has full access privileges to delegate to the end user based upon the user requirement. The identity of the end user is hidden , subsequently database server fails to assign proper authorizations to the end user. Hence, current approaches to access control on databases do not fit for web databases because they are mostly based on individual user identities. To fill this security gap, the definition of application aware access control system is needed. In this paper, RBAC+ Model, an extension of NIST RBAC provides a application aware access control system to prevent attacks with the notion of application, application profile and sub-application session.
APA, Harvard, Vancouver, ISO, and other styles
10

Et. al., Kriti Srivastava,. "NdRAdAC: Need based Access Control Framework for an Emergency Response System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1414–28. http://dx.doi.org/10.17762/turcomat.v12i5.2037.

Full text
Abstract:
Access control is easy to implement in a static system with resource-role mapping and known policies. It becomes challenging if the system is dynamic and volatile, which means there are unpredictability in the workflow. Existing role based and attribute- based access control systems are very efficient in static and predictable situations. But they are not effective in a dynamic situation. Researchers over the last two decades have tried to propose various probabilistic based, machine learning based and decision theory-based access control to prove adaptability in their access control methods. But there are existing gaps in operational needs and proposed adaptability methods. Under regular scenario access control system may work based on the policies or decided roles. Only if there is a genuine need, then access control should switch to adaptable solutions. Also, a true adaptable system should not allow human intervention, the system should be able to understand the genuineness of the requester and take decisions whether access should be granted or not. In this paper with the help of a disaster management case study, a need-based access control framework – NdRAdAC is proposed. It evaluates the genuineness of the requester and acts appropriately. An ontology-based access control for an emergency response system is developed, which can help the disaster management system to coordinate with different hospitals and help in transferring patient data from one hospital to another if needed. It ensures that data requester is authenticated with the help of access control module. The framework is tested for three main parameters: Adaptability, Consistency and Computational Efficiency. It was found that framework was accurately adaptable, consistent with all the different types of cases and computationally efficient.
APA, Harvard, Vancouver, ISO, and other styles
11

Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.

Full text
Abstract:
Attribute-based access control (ABAC) is a maturing authorization technique with outstanding expressiveness and scalability, which shows its overwhelmingly competitive advantage, especially in complicated dynamic environments. Unfortunately, the absence of a flexible exceptional approval mechanism in ABAC impairs the resource usability and business time efficiency in current practice, which could limit its growth. In this paper, we propose a feasible fuzzy-extended ABAC (FBAC) technique to improve the flexibility in urgent exceptional authorizations and thereby improving the resource usability and business timeliness. We use the fuzzy assessment mechanism to evaluate the policy-matching degrees of the requests that do not comply with policies, so that the system can make special approval decisions accordingly to achieve unattended exceptional authorizations. We also designed an auxiliary credit mechanism accompanied by periodic credit adjustment auditing to regulate expediential authorizations for mitigating risks. Theoretical analyses and experimental evaluations show that the FBAC approach enhances resource immediacy and usability with controllable risk.
APA, Harvard, Vancouver, ISO, and other styles
12

Sadeghi, Mersedeh, Luca Sartor, and Matteo Rossi. "A semantic-based access control approach for systems of systems." ACM SIGAPP Applied Computing Review 21, no. 4 (December 2021): 5–19. http://dx.doi.org/10.1145/3512753.3512754.

Full text
Abstract:
Access control management in a System of Systems---i.e., a collaborative environment composed of a multitude of distributed autonomous organizations---is a challenging task. To answer the challenge, in this paper we propose a novel approach that incorporates semantic technologies in the Attribute-Based Access Control (ABAC) approach. Building on the basic principles of ABAC, our approach allows for a highly expressive modeling of the context in which access decisions are made, by providing mechanisms to describe rich relationships among entities, which can evolve over time. In addition, our system works in a truly decentralized manner, which makes it suitable for geographically distributed enterprise systems. We show the feasibility in practice of our approach through some experimental results.
APA, Harvard, Vancouver, ISO, and other styles
13

Demurjian, Steven A., Eugene Sanzi, Thomas P. Agresta, and William A. Yasnoff. "Multi-Level Security in Healthcare Using a Lattice-Based Access Control Model." International Journal of Privacy and Health Information Management 7, no. 1 (January 2019): 80–102. http://dx.doi.org/10.4018/ijphim.2019010105.

Full text
Abstract:
Controlling access to sensitive personal information is a primary concern in healthcare. Regardless of whether access control policies are determined by patients, healthcare professionals, institutions, legal and regulatory authorities, or some combination of these, assuring the strict enforcement of policies across all systems that store personal health information is the overriding, essential goal of any healthcare security solution. While a comprehensive healthcare security architecture may need to impose specific controls on individual data items, most access control decisions will be based on sensitivity levels automatically assigned to information classes by a “sensitivity profile,” combined with the authorization level of the user. This article proposes the use of multi-level security, defined by lattice-based sensitivity profiles, to ensure compliance with data access restrictions between systems. This security approach accommodates the complexities needed for health data access and benefits from existing, proven tools that are used for defense and national security applications.
APA, Harvard, Vancouver, ISO, and other styles
14

Boluma Mangata, Bopatriciat, Dominique Ilunga N’kashama, Parfum Bukanga Christian, and Donatien Kadima Muamba. "COMPARATIVE STUDIES BETWEEN A FACIAL RECOGNITION SYSTEM AND A FINGERPRINT RECOGNITION SYSTEM FOR ACCESS CONTROL." IJISCS (International Journal of Information System and Computer Science) 6, no. 2 (August 31, 2022): 69. http://dx.doi.org/10.56327/ijiscs.v6i2.1237.

Full text
Abstract:
This paper investigates the decisions made on two singles modal biometric systems based on facial recognition and fingerprints for access control. In order to carry out this study on the access control system based on fingerprint and facial recognition, we made biometric recognition systems based on fingerprints and facial recognition that interacts with an embedded system under Arduino to give us the possibility to assemble the performances of programming and electronics, more precisely, we programmed electronic systems for the automatic opening of doors without the action of a human being. In a sample of one hundred individuals composed of 40 females and 60 males, 75 of whom were enrolled and 25 of whom were not, our two singles modal access control systems each obtained the following results: 70 true positives, 5 false negatives, 8 false positives and 17 true negatives for the facial recognition system, compared to 73 true positives, 2 false negatives, 4 false positives and 21 true negatives for the fingerprint recognition system, which constitute our confusion matrix. From all the tests carried out, we can say that the decisions made by the fingerprint recognition system are better than the decisions made by the facial recognition system.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhao, Bin, Guiyue Zheng, Yilong Gao, and Yanchen Zhao. "Access-Control Model of Super Business System Based on Business Entity." Electronics 11, no. 19 (September 27, 2022): 3073. http://dx.doi.org/10.3390/electronics11193073.

Full text
Abstract:
To address the problem that the traditional access-control model is no longer suitable for access control and authorization in the super business system—which has the characteristics of many businesses and complex permissions—a business entity-based access-control model (BE-BAC) is proposed in this paper. The BE-BAC model realizes the relationship between users, business entities, and business permissions. Firstly, according to the characteristics of the super business system, the concept of business entity is put forward, introducing the composition and relationship of the business entity. Secondly, the business entity is introduced into the access-control model, formally describing the basic relationship, constraint, mapping, and authorization strategy of the BE-BAC model. Finally, the access-control workflow, based on the business entity, is designed, and the security analysis and comprehensive comparison of the model are carried out. Compared with the existing access-control model, the BE-BAC model has higher security and flexibility, and better protects resources, through more secure access-request decisions.
APA, Harvard, Vancouver, ISO, and other styles
16

Argall, Brenna D. "Autonomy in Rehabilitation Robotics: An Intersection." Annual Review of Control, Robotics, and Autonomous Systems 1, no. 1 (May 28, 2018): 441–63. http://dx.doi.org/10.1146/annurev-control-061417-041727.

Full text
Abstract:
Within the field of human rehabilitation, robotic machines are used both to rehabilitate the body and to perform functional tasks. Robotics autonomy that would enable perception of the external world and reasoning about high-level control decisions, however, is seldom present in these machines. For functional tasks in particular, autonomy could help to decrease the operational burden on the human and perhaps even increase access, and this potential only grows as human motor impairments become more severe. There are, however, serious and often subtle considerations for incorporating clinically feasible robotics autonomy into rehabilitation robots and machines. Today, the fields of robotics autonomy and rehabilitation robotics are largely separate, and the topic of this article is at the intersection of these fields: the incorporation of clinically feasible autonomy solutions into rehabilitation robots and the opportunities for autonomy within the rehabilitation domain.
APA, Harvard, Vancouver, ISO, and other styles
17

Shen, Hai Bo, and Yu Cheng. "A Semantic-Aware Context-Based Access Control Framework for Mobile Web Services." Applied Mechanics and Materials 195-196 (August 2012): 498–503. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.498.

Full text
Abstract:
As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible access control mechanisms. Unlike traditional approaches based on the identity/role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic-aware context-based access control framework (called SA_CBAC) to be applied in mobile web services environment by combining semantic web technologies with context-based access control mechanism. In order to handle context information in the framework, this paper proposes a context ontology to represent contextual information and employ it in the inference engine. This paper also focuses on access control policies and addresses these issues by representing context, user attributes and resource attributes in knowledge base and extending XACML to incorporate the knowledge base.
APA, Harvard, Vancouver, ISO, and other styles
18

Choi, Donghee, Dohoon Kim, and Seog Park. "A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/265132.

Full text
Abstract:
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment.
APA, Harvard, Vancouver, ISO, and other styles
19

Ezeoha, Abel Ebeh, Ebele Ogamba, and Ndi Okereke Onyiuke. "Corporate nationality, foreign control and capital structure decisions in Nigeria." Corporate Ownership and Control 6, no. 1-3 (2008): 371–81. http://dx.doi.org/10.22495/cocv6i1c3p4.

Full text
Abstract:
The main objective of this study is to investigate whether corporate nationality and degree of foreign control influence capital structure decisions in a developing economy. The study makes use of eighteen-year time series data from 70 non-financial quoted firms in Nigeria. Using fixed effects panel regression models, it is found that though firm nationality and the degree of foreign control are significant determinants of corporate financing decisions in the country, they are not as important as acclaimed by local corporate stakeholders who champion discriminatory polcies in favour of indigenous firms. Thus, there is need for the Nigerian government to devote more attention in improving policy frameworks on areas such as corporate tax, corporate governance and bankruptcy practices, which are found by previous studies to be very important determinants of firm’s access to long-term investment capital.
APA, Harvard, Vancouver, ISO, and other styles
20

Namane, Sarra, Nassira Ghoualmi, and Mustafa Kaiiali. "Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 99–116. http://dx.doi.org/10.4018/ijisp.2021010105.

Full text
Abstract:
Access control mechanisms are the way to guarantee secure access to grid resources. Recent research works were focused on how to improve the representation of the resources' security policies for faster decisions making. PCM, HCM, GAG, and WGAG are all different ways to represent these security policies. This paper presents an enhancement to WGAG, the action-weighted grid authorization graph (Action-WGAG). A security policy-parser (SP-Parser) has been developed to implement the Action-WGAG. The evaluation results of the proposed model showed that it assures a smaller number of security rule checking in some cases and a reduction of the answer time to an access control request.
APA, Harvard, Vancouver, ISO, and other styles
21

Han, Jiujiang, Yuxiang Zhang, Jian Liu, Ziyuan Li, Ming Xian, Huimei Wang, Feilong Mao, and Yu Chen. "A Blockchain-Based and SGX-Enabled Access Control Framework for IoT." Electronics 11, no. 17 (August 29, 2022): 2710. http://dx.doi.org/10.3390/electronics11172710.

Full text
Abstract:
With the rapid development of physical networks, tens of billions of Internet of Things (IoT) devices have been deployed worldwide. Access control is essential in the IoT system, which manages user access to vital IoT data. However, access control for the IoT is mainly based on centralized trusted servers, which face problems such as a single point of failure and data leakage. To tackle these challenges, we propose an access control framework for the IoT by combining blockchain and Intel software guard extension (SGX) technology. A blockchain validates both IoT devices and edge servers added to the network. The access control contract is deployed on the blockchain, which can manage attribute-based access control policies in a fine-grained manner and make access control decisions flexibly. SGX technology is introduced into the edge computing server to realize the confidentiality of data processing. Finally, we implemented the prototype of the framework on Quorum and conducted extensive experiments and theoretical analyses on the performance of the blockchain. The results of the experimental tests and theoretical analyses show that our framework has more advantages in computing costs and on-chain storage costs.
APA, Harvard, Vancouver, ISO, and other styles
22

Patil, Mallanagouda, and Rajashekhar C. Biradar. "Media Access Control in Wireless Sensor Networks using Priority Index." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 2 (February 1, 2017): 416. http://dx.doi.org/10.11591/ijeecs.v5.i2.pp416-426.

Full text
Abstract:
As the nodes in Wireless Sensor Networks (WSNs) have limited power, energy conservation is essential at different layers of the protocol stack to prolong lifetime. In our previous work, ”Priority based slot allocation for media access in wireless sensor networks” (PSAWSN), probability based priority scheme is used to allocate slots to competing nodes. Limitations of this work include 1) It does not handle dynamic and variable slot allocation based on varying requirements of nodes. 2) Error control is not taken into account. To overcome these limitations, we propose a Medium Access Control scheme using Priority Index (MACPI) that generates Priority Index (PI) to allocate varying slots based on parameters: message length (ML), node energy (NE), number of requests (NR) and message urgency (MU). Models have been de- signed for all these parameters and an expert system is proposed that makes decisions based on collective knowledge of these parameters. Analysis and simulation results for various message sizes and error conditions show that there is an improvement in terms of energy efficiency, optimal message length and throughput compared to the ”Reliable data deliveries using packet optimization in multi-hop underwater sensor networks”(RDPSN).
APA, Harvard, Vancouver, ISO, and other styles
23

Castagnoli, Steven P. "Internet-based Decision Tools for Orchard Pest Management—Adoption in the Hood River Valley of Oregon." HortTechnology 16, no. 1 (January 2006): 133–38. http://dx.doi.org/10.21273/horttech.16.1.0133.

Full text
Abstract:
The Internet has expanded access to real-time decision tools for pest management in agriculture. Starting in 2000, site-specific weather data and decision tools for key insect pests and diseases became available through the Internet to fruit growers and pest control advisors (PCAs) in the Hood River Valley of Oregon. Adoption of these decision tools was supported by educational programs conducted by extension. In this study, surveys were conducted to assess the importance of different sources of pest management information and the adoption of four Internet-based pest management decision tools by fruit growers and PCAs in the Hood River Valley. Growers relied on diverse sources for pest management information and ranked PCAs as the most important source for making pest management decisions. Grower use of the Internet-based pest management decision tools was relatively low despite computer ownership and Internet use that were higher than national trends. Growers preferred the website that provided the most complete access to up-to-date weather data and pertinent pest and disease models, despite somewhat less streamlined access. PCA use of the decision tools was proportionately higher, and included greater use of additional websites. Both growers and PCAs considered use of the Internet tools to have important benefits on pest management programs. In the Hood River Valley, fruit growers had access to technology-driven decision support tools, but continued to rely on more traditional information sources, particularly PCAs, for making pest management decisions. In view of trends in shrinking extension resources, these results suggest that the most efficient use of time and potential for greatest impact can be derived from focusing educational efforts on PCAs.
APA, Harvard, Vancouver, ISO, and other styles
24

Crick, James M., and Dave Crick. "Angel investors’ predictive and control funding criteria." Journal of Research in Marketing and Entrepreneurship 20, no. 1 (July 9, 2018): 34–56. http://dx.doi.org/10.1108/jrme-11-2016-0043.

Full text
Abstract:
PurposeThis study aims to investigate the question involving what factors affect angel investors’ decision-making in funding new start-ups with specific reference to their evolving business models. Without funding and access to networks and experience, certain entrepreneurs will not get their business model through the start-up phase.Design/methodology/approachData arise from 20 semi-structured interviews with angel investors in New Zealand plus supplementary interviews with business incubator managers and textual data.FindingsThe findings suggest a degree of causation-based decision-making, in that certain linear thinking was evident. The implication is that, without the ability of the entrepreneurs to convince the investors about key criteria in their decision-making, investment is unlikely. Nevertheless, a degree of effectuation-based decision-making was also evident, the implication being investors having to balance risk/reward decisions in the context of their own perceptions of affordable losses against an evolving business model. However, angel investors may take on co-investment, including from overseas, that takes decision-making away from management teams.Originality/valueThe study draws attention to the need to consider entrepreneurial ecosystems in angel investor’s decision-making and especially those with a small domestic market that may require management teams to look for scalability internationally. Furthermore, an effectuation lens contributes to knowledge in respect of predictive and control criteria, in particular, assessing risks and rewards against affordable losses involving an evolving business model.
APA, Harvard, Vancouver, ISO, and other styles
25

James, Sarah, Maree Toombs, and Wendy Brodribb. "Barriers and enablers to postpartum contraception among Aboriginal Australian women: factors influencing contraceptive decisions." Australian Journal of Primary Health 24, no. 3 (2018): 241. http://dx.doi.org/10.1071/py17041.

Full text
Abstract:
This qualitative research obtained insights into factors influencing postpartum contraception use among Aboriginal women in southern Queensland. Seventeen women participated in focus groups or interviews from July to October 2015 at an Aboriginal and Torres Strait Islander Community-Controlled Health Organisation. Data were analysed with open coding and thematic analysis. The results affirmed Aboriginal women want control over family planning. Participants indicated more could be done to improve health literacy and contraception uptake. A variety of family planning preferences were revealed, with an almost universal desire for increased access to postpartum contraception. Participants wanted information given antenatally and postnatally. Obtaining and using contraception were difficult for many. Social factors that hinder access such as shame, ideas surrounding women’s health, cultural disengagement, social isolation and using childbearing to control relationships were identified. The reproductive outcomes of Aboriginal women often do not reflect their preferences. A mandate exists to provide information about and access to postpartum contraception, empowering women with greater control over their reproductive practices. Health professionals can play a key role in dismantling barriers to autonomous family planning by offering information and resources both antenatally and postnatally.
APA, Harvard, Vancouver, ISO, and other styles
26

Sousa, Rosilene Paiva Marinho de, Marckson Roberto Ferreira de Sousa, and Guilherme Ataíde Dias. "Entre o acesso aberto e a proteção autoral: os limites autorais nas decisões judiciais." Páginas a&b : Arquivos & Bibliotecas, esp. (2020): 137–41. http://dx.doi.org/10.21747/21836671/pagnesppk15.

Full text
Abstract:
Information and communication technologies have revolutionized traditional forms of production of intellectual property with a view to the diversity of creations of the human intellect. However, the institutes of copyright protection do not always allow the resolution of certain peculiarities of the protected assets, and the control is the responsibility of judicial decisions. In this sense, this work aims to discuss the authorial limits in judicial decisions, between open access and copyright protection. For this, it seeks to present the main characteristics of authorial regulation in Brazil today. It examines the new perspectives of open access, in view of the use of technologies, outline with the conditions established for registration, access and sharing. Finally, it conducts an approach on the diversity of understandings in judicial decisions, in processes that involve attribution of authorship and conditions for the publication of intellectual property. It is concluded that there is a need for studies on judicial decisions that can identify the main gaps that make it impossible to align the interpretation of copyright law in judicial decisions, in order to make them more effective.
APA, Harvard, Vancouver, ISO, and other styles
27

Ma, Yao, Hong Wei Lu, and Yi Zhu Zhao. "Building a Risk-Aware Adaptive Trust Negotiation Framework." Advanced Materials Research 171-172 (December 2010): 7–10. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.7.

Full text
Abstract:
In the uncertain environment, trust and risk are both key elements for making trust-based decisions. Risk is regarded as a supplement to trust or even omitted in the most existing trust models, which will lead to one-sided or subjective decisions. To solve the issues, a risk-aware adaptive trust negotiation framework is proposed in this paper. According to the specific negotiation context, the framework analyzes the potential risks and adapts dynamic access control levels appropriately with risk management methods. The use case results indicate that this framework can identify the potential risk and adapt access control polices according to the specific entity and transaction, which avoid risks and provides more efficient trust negotiation services.
APA, Harvard, Vancouver, ISO, and other styles
28

Li, Qing, Peter Magati, Raphael Lencucha, Ronald Labonte, Donald Makoka, and Jeffrey Drope. "The Economic Geography of Kenyan Tobacco Farmers’ Livelihood Decisions." Nicotine & Tobacco Research 21, no. 12 (January 25, 2019): 1711–14. http://dx.doi.org/10.1093/ntr/ntz011.

Full text
Abstract:
Abstract Introduction The narrative of prosperous economic livelihood of tobacco farmers in Kenya as alleged by the tobacco industry deserves challenge as evidence increasingly suggests that smallholder tobacco farmers are making little or no profits. Article 17 of the World Health Organization Framework Convention on Tobacco Control encourages viable alternative livelihoods for tobacco farmers. There is little evidence, however, on how tobacco farmers make livelihood choice decisions. Methods A total of 527 purposefully selected smallholder tobacco farmers in Kenya from three main tobacco-growing regions participated in a 2017 economic livelihood survey. Geo-economic data were matched to surveyed farmers’ Global Positioning System coordinates to estimate each farmer’s access to nearby economic centers. Ownership of cell phones or radios was also used to estimate farmers’ virtual access to nearby economic activities to understand better the role of information. Multivariate logistic regressions were used to control socioeconomic status and self-reported activity in nearby economic centers. Results Tobacco farmers rarely live within 10 km of an economic center. Results suggest that the further away farmers live from economic centers, the less likely they are to grow tobacco, but more likely to grow tobacco under contract. Also, farmers owning a cell phone or radio are not only less likely to grow tobacco, but also to not engage in farming under contract if they do grow tobacco. Conclusions Physical and virtual access to nearby economic activities is significantly associated with tobacco farmers’ livelihood choice decision and should be taken into consideration by decision makers while developing interventions for FCTC Article 17. Implications Smallholder tobacco farmers in lower-income countries are making little or no profits, but few studies have been conducted to illuminate what perpetuates tobacco production, with such studies urgently needed to support governments to develop viable alternative livelihoods for tobacco farmers. This study suggests that geographic and technological factors that shape farmers’ economic decisions can help policy makers tailor alternative livelihood policies to different regional contexts and should be a focus of future research in this area.
APA, Harvard, Vancouver, ISO, and other styles
29

Knight, Jonathan D., and John D. Mumford. "Decision Support Systems in Crop Protection." Outlook on Agriculture 23, no. 4 (December 1994): 281–85. http://dx.doi.org/10.1177/003072709402300408.

Full text
Abstract:
All farmers and growers have at some time faced the decision of whether to control a pest in their crop. In order to make the correct decision the farmer needs access to, and an understanding of, sufficient information relevant to such pest problems. Decision support systems are able to help farmers make these difficult decisions by providing information in an easily understandable and quickly accessed form. The increasing use of computers by farmers for record-keeping and business management is putting the hardware necessary for the implementation of these systems onto more and more farms. The scarcity of expert advice, increasingly complex decisions and reduced economic margins all increase the importance of making the right pest management decision at the right time. It is against this background that decision support systems have an important role to play in the fight against losses caused by pests and diseases.
APA, Harvard, Vancouver, ISO, and other styles
30

Kuczyński, Tadeusz. "SHAPING THE SYSTEM OF JUDICIAL CONTROL OF DISCIPLINARY DECISIONS IN SERVICE RELATIONSHIPS." Roczniki Administracji i Prawa specjalny, no. XXI (December 30, 2021): 599–609. http://dx.doi.org/10.5604/01.3001.0015.6200.

Full text
Abstract:
Initially, disciplinary liability was not subject to judicial control. The shaping of the judicial control of disciplinary decisions was a long-standing process which was finally established with the entry into force of the constitutional principle right of access to court. A systemic analysis of the provisions in question indicates that the system and functioning of this institution are not based on clear and rational assumptions that meet the postulated criteria of a satisfactory (decent) regulation. Existing provisions often regulate institutional, material and procedural aspects of this control in a different way. This approach to the control system puts the litigant parties (especially the accused) in unjustifiably different procedural situations resulting from different rules of procedure in force in common courts of law and administrative courts.
APA, Harvard, Vancouver, ISO, and other styles
31

de Carolis, Daniele. "Jurisdiction of the Italian Tax Judge on Administrative Acts Denying Access to the Arbitration Convention on Transfer Pricing: Towards a Dispute Resolution Procedure Ever More Independent of State Con." Intertax 44, Issue 2 (February 1, 2016): 180–84. http://dx.doi.org/10.54648/taxi2016012.

Full text
Abstract:
The Court of Cassation’s orders n. 12759 and 12760 of 2015, in acknowledging jurisdiction of the Italian tax judges on administrative acts denying access to the Arbitration Convention on Transfer Pricing, represent two fundamental decisions for the development of this Convention towards a dispute resolution regime which is more and more independent of State control. In order to illustrate the extreme importance of these decisions, this article first provides a synthesis of their contents, then it analyses the debate within the Joint Transfer Pricing Forum on the denial of access to the Arbitration Convention: this debate will allow some reflections on the role which the issue of denial of access to the Conventions plays, together with the improvement of the arbitral phase, in the process of rendering the dispute resolution regime envisaged by the Convention more efficient and, at the same time, ever more independent of State control.
APA, Harvard, Vancouver, ISO, and other styles
32

Romaniuk, Oleksandr, Pavlo Skladannyi, and Svitlana Shevchenko. "COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 98–112. http://dx.doi.org/10.28925/2663-4023.2022.16.98112.

Full text
Abstract:
Abuse of privileges in the IT environment is defined as one of the threats to the information assets of the business at the present stage. The article examines and analyzes these problems, which are closely related to the leakage of information due to legitimate access to it and / or unauthorized access to it. Reports, research, acts, surveys at various enterprises contain a large amount of analytical and statistical materials that confirm the relevance and importance of this work. Based on the scientific literature, a review of key definitions on this issue, namely: characterized the definition of "privileged access"; the main examples of privileged access in the IT environment are considered; describes the risks and threats of information from attack vectors associated with privileged access to the IT environment. The mechanism for control and management of privileged access - RAM is presented, the steps of this process are highlighted and its expediency is substantiated. Experimental techniques allowed to choose the most applicable solutions of RAM: WALLIX Bastion PAM, One Identity Safeguard PAM, CyberArk PAM. The essence and functionality of each of these solutions are revealed. The advantages and disadvantages of each technology are established. As a result of research of technical and functional characteristics the comparative analysis of data of three decisions is carried out: obligatory components of the decision on control and management of privileged access are the manager of passwords and the manager of sessions (sessions), and additional - the module with analytics of privileged sessions and the access manager. use a VPN to access privileged assets. It can also be noted that the functionality of all products is very similar, so the implementation plays a big role, namely the practical approach during operation, internal algorithms, additional opportunities for integration and innovation. PAM solutions are recommended for organizations as a means to mitigate information security risks and threats due to insider activities of company employees who have privileged access to the IT environment.
APA, Harvard, Vancouver, ISO, and other styles
33

Churubrova, S. M. "Information security policy in the systems of information and analytical maintenance for support of organizational decisions." PROBLEMS IN PROGRAMMING, no. 4 (December 2016): 097–103. http://dx.doi.org/10.15407/pp2016.04.097.

Full text
Abstract:
This article describes an information security policy in systems of support of organizational decisions. It defines the basic requirements for the protection of information objects, information resources and features of functioning Intellectual information technology support organizational decisions are described. The general rules and regulations separation and control access based on ABAC model are developed.
APA, Harvard, Vancouver, ISO, and other styles
34

Jagadish, H. V., Julia Stoyanovich, and Bill Howe. "COVID-19 Brings Data Equity Challenges to the Fore." Digital Government: Research and Practice 2, no. 2 (March 2021): 1–7. http://dx.doi.org/10.1145/3440889.

Full text
Abstract:
The COVID-19 pandemic is compelling us to make crucial data-driven decisions quickly, bringing together diverse and unreliable sources of information without the usual quality control mechanisms we may employ. These decisions are consequential at multiple levels: They can inform local, state, and national government policy, be used to schedule access to physical resources such as elevators and workspaces within an organization, and inform contact tracing and quarantine actions for individuals. In all these cases, significant inequities are likely to arise and to be propagated and reinforced by data-driven decision systems. In this article, we propose a framework, called FIDES, for surfacing and reasoning about data equity in these systems.
APA, Harvard, Vancouver, ISO, and other styles
35

Maslennikova, L. N. "TRANSFORMATION OF PRE-TRIAL PROCEEDINGS IN THE INITIAL STAGE OF CRIMINAL PROCEEDINGS, ENSURING ACCESS TO JUSTICE IN THE INDUSTRY 4.0 ERA." Actual Problems of Russian Law, no. 6 (July 18, 2019): 137–46. http://dx.doi.org/10.17803/1994-1471.2019.103.6.137-146.

Full text
Abstract:
The paper deals with topical issues of ensuring access to justice in criminal proceedings, and substantiates the need to change the paradigm of the pre-trial proceedings. The new digital reality Industry 4.0 assumes a tremendous pace of development, profound changes in all spheres of society, including criminal proceedings. The author argues that the digital transformation of criminal proceedings in terms of ensuring access to justice is impossible unless the legislative model (algorithm) of the initial stage of criminal proceedings ensuring access to justice is changed. The key point in the transformation of the pre-trial proceedings should be the electronic interaction of the state and society (population) in the new digital reality. There are fundamentally new opportunities for participation in criminal proceedings (including remotely) and new opportunities to influence decision making and control over decision making (automatization of a crime report and the start of investigation registration, the ability to file complaints, petitions, receive notifications, copies of decisions in electronic form).
APA, Harvard, Vancouver, ISO, and other styles
36

Kaczmarczyk, Martyna. "CONTROLLING ACCESS TO WEAPONS IN A SYSTEMIC ASPECT." PRZEGLĄD POLICYJNY 135, no. 3 (September 2, 2019): 195–206. http://dx.doi.org/10.5604/01.3001.0013.7544.

Full text
Abstract:
In Poland, access to certain types of weapons, in particular to fi rearms, is subject to regulation, which involves requirements and procedures relevant to the weapons and ammunition specifi ed in the law. Individual police authorities, as public administration bodies, are entitled to issue (as part of administrative and law-enforcement activities) administrative decisions, including weapon permits. This activity is of great importance to society because of the control over the users of weapons and the weapons themselves possessed by individuals in the country. In recent years, there has been growing interest in weapons in Poland, as evidenced by police statistics. The aspirations and needs of individuals vary in this respect. The aim of the system of regulating access to weapons is therefore to control the holders of weapons within the framework of the generally understood public safety and order.
APA, Harvard, Vancouver, ISO, and other styles
37

Roba, Rufo, and Reuben Wambua Kikwatha. "Influence of Women Participation on Sustainability of the Community Conservation Project Implemented by Jaldesa Community Conservancy in Marsabit County, Kenya." European Journal of Business and Management Research 6, no. 3 (June 19, 2021): 188–94. http://dx.doi.org/10.24018/ejbmr.2021.6.3.898.

Full text
Abstract:
Biodiversity conservation is a new paradigm shift in the management of Community wildlife resources as a tool to sustainable growth of the economy, improved livelihood, and preservation of nature. The study established the role of women participation in projects and the sustainable wildlife conservation project at Jaldesa community in Marsabit County, Kenya. The study utilized four variables that included women in decision making, control & access to resources, project implementation and capacity building of women leaders &sustainable Jaldesa community conservation project. The design approach in the study was a cross-sectional survey having a mixed mode of research methods characterized with qualitative and quantitative. The Participatory and Ecological Feminism Theory were significant for the study. The probability and non-probability sampling were utilized to obtain sample size of 443 samples drawn from a target population of 19,860. Pilot study was obtained using a fraction of the sample. The reliability analysis was attained through Cronbach’s Alpha coefficient of α>0.7. The research instrument was utilized. The researcher herself collected the Primary data using questionnaires and focus group discussions as research instrument. Descriptive and inferential statistics were analyzed with SPSS version 25. The Pearson’s moment correlation concluded that Access & Control of Resources, Capacity Building, Decision Making and Implementation has a significant influence on the sustainable conservation of Jaldesa community projects in Marsabit County, Kenya and there is a strong relationship. The study recommends that the authorities at national and county government of Marsabit County involve women in decision making, leadership roles, attend meeting, be party to decisions made by the conservancy board and making them well versed on the decision-making processes. Also, recommends that women manage, control, and have full access to resources through financial liberty, have voice on access to and control of resources and giving them right to resources and ownership.
APA, Harvard, Vancouver, ISO, and other styles
38

Xie, Pengshou, Haoxuan Yang, Liangxuan Wang, Shuai Wang, Tao Feng, and Yan Yan. "Service-Based Hybrid Access Control Technology with Priority Level for the Internet of Vehicles under the Cloud Architecture." Security and Communication Networks 2021 (December 3, 2021): 1–18. http://dx.doi.org/10.1155/2021/4646087.

Full text
Abstract:
The communication process of devices in IoV under cloud architecture needs to be protected by access control models. However, existing access control models have difficulty establishing the appropriate granularity of permissions in the face of large amounts of data in IoV. Moreover, the access control model may need to temporarily change user privileges to accommodate the dynamic nature of IoV scenarios, a requirement that is difficult to implement for traditional access control models. The unstable connection status of devices in IoV also creates problems for access control. The service (composed of role and attribute) based access control model (in IoV) S-RABAC (V), under the Cloud computing architecture, introduces a formal theoretical model. The model uses attribute grouping and prioritization mechanisms to form a hierarchical structure. The permission combination pattern in the hierarchical structure can avoid duplicate permissions and reduce the number of permissions while ensuring fine-grained permissions. Different layers in the model have different priorities, and when a user’s permission requires temporary changes, it can be adjusted to the corresponding layers according to the user’s priority. In addition, users are allowed to keep their assigned privileges for a period to avoid frequent access control because of unstable connections. We have implemented the proposed access control model in Alibaba Cloud Computing and given six example demonstrations. The experiment shows that this is an access control model that can protect IoV security more effectively. Various unique mechanisms in the model enable S-RABAC(V) to improve the overall access control efficiency. The model adds some extra features compared to ABAC and RBAC and can generate more access control decisions using the priority mechanism.
APA, Harvard, Vancouver, ISO, and other styles
39

Bitoun, Ariane, Hans ten Bergen, and Yann Prudent. "Smart Simulation for Decision Support at Headquarters." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (June 1, 2019): 81–90. http://dx.doi.org/10.2478/kbo-2019-0122.

Full text
Abstract:
Abstract While serious games are being widely adopted by NATO and partner nations, their use is currently limited to training and operations planning. In this paper, we explore new methods that use simulations for decision support during the execution of military operations. During this phase, the commander makes decisions based on knowledge of the situation and the primary objectives. We propose here to take a simulation containing smart and autonomous units, and use it to create new kinds of decision support tools capable of improving situation awareness, and consequently the quality of decisions. The breakthrough behind this initiative is the realization that we can provide HQ decision makers with access to a version of the information that smart simulated units use to make decisions. To ensure the approach was sound we first studied decision-making processes, and analyzed how situation awareness improves decision-making. After analysis of the decision-making processes at various headquarters, and the types of decision criteria employed, we are able to produce innovative information, computed by the simulation, and fed by the command and control system. We then propose a prerequisite architecture and describe the first results of our proof of concept work based on the SWORD (Simulation War gaming for Operational Research and Doctrine) simulation.
APA, Harvard, Vancouver, ISO, and other styles
40

Tomaiuolo, Michele. "Trust Enforcing and Trust Building, Different Technologies and Visions." International Journal of Cyber Warfare and Terrorism 2, no. 4 (October 2012): 49–66. http://dx.doi.org/10.4018/ijcwt.2012100104.

Full text
Abstract:
Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive cyber-control over personal activities and data. This article discusses some new technologies that are being integrated into computing devices for realizing so-called Trusted Computing and Digital Rights Management systems, which can remotely attest their current hardware/software state and can enforce external policies to access protected content. These technologies are then confronted with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law.
APA, Harvard, Vancouver, ISO, and other styles
41

Kim, Andrew H., Afaf Girgis, Neda Karimi, Alexandra J. Sechi, Joseph Descallar, Jane M. Andrews, Corey A. Siegel, and Susan J. Connor. "A Web-Based Decision Aid (myAID) to Enhance Quality of Life, Empowerment, Decision Making, and Disease Control for Patients With Ulcerative Colitis: Protocol for a Cluster Randomized Controlled Trial." JMIR Research Protocols 9, no. 7 (July 10, 2020): e15994. http://dx.doi.org/10.2196/15994.

Full text
Abstract:
Background Patients with ulcerative colitis (UC) often face complex treatment decisions. Although shared decision making (SDM) is considered important, tools to facilitate this are currently lacking for UC. A recent pilot study of a novel Web-based decision aid (DA), my Actively Informed Decision (myAID), has suggested its acceptability and feasibility for informing treatment decisions and facilitating SDM in clinical practice. Objective This paper describes the study protocol of the myAID study to assess the clinical impact of systematic implementation of myAID in routine UC management. Methods The myAID study is a multicenter, cluster randomized controlled trial (CRCT) involving 22 Australian sites that will assess the clinical efficacy of routine use of myAID (intervention) against usual care without access to myAID (control) for UC patients. Participating sites (clusters) will be randomly allocated in a 1:1 ratio between the 2 arms. Patients making a new treatment decision beyond 5-aminosalicylate agents will be eligible to participate. Patients allocated to the intervention arm will view myAID at the time of recruitment and have free access to it throughout the study period. The effect of the myAID intervention will be assessed using the results of serial Web-based questionnaires and fecal calprotectin at baseline, 2 months, 6 months, and 12 months. A Web-based questionnaire within 2-4 weeks of referral will determine early change in quality of decision making and anxiety (both arms) and intervention acceptability (intervention arm only). Results Study recruitment and funding began in October 2016, and recruitment will continue through 2020, for a minimum of 300 study participants at baseline at the current projection. The primary outcome will be health-related quality of life (Assessment of Quality of Life-8D), and secondary outcomes will include patient empowerment, quality of decision making, anxiety, work productivity and activity impairment, and disease activity. In addition, we aim to determine the predictors of UC treatment decisions and outcomes and the cost-effectiveness of implementing myAID in routine practice. Feedback obtained about myAID will be used to determine areas for improvement and barriers to its implementation. Completion of data collection and publication of study results are anticipated in 2021. Conclusions myAID is a novel Web-based DA designed to facilitate SDM in UC management. The results of this CRCT will contribute new evidence to the literature in comparing outcomes between patients who routinely access such decision support intervention versus those who do not, across multiple large inflammatory bowel disease centers as well as community-based private practices in Australia. Trial Registration Australian New Zealand Clinical Trial Registry ACTRN12617001246370 http://anzctr.org.au/Trial/ Registration/TrialReview.aspx?ACTRN=12617001246370 International Registered Report Identifier (IRRID) DERR1-10.2196/15994
APA, Harvard, Vancouver, ISO, and other styles
42

Armando, Alessandro, Michele Bezzi, Nadia Metoui, and Antonino Sabetta. "Risk-Based Privacy-Aware Information Disclosure." International Journal of Secure Software Engineering 6, no. 2 (April 2015): 70–89. http://dx.doi.org/10.4018/ijsse.2015040104.

Full text
Abstract:
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It has many advantages compared to classical approaches, allowing for more flexibility, and ultimately supporting for a better exploitation of data. The authors propose and demonstrate a risk-aware access control framework for information disclosure, which supports run-time risk assessment. In their framework access-control decisions are based on the disclosure-risk associated with a data access request and, differently from existing models, adaptive anonymization operations are used as risk-mitigation method. The inclusion of on-the-fly anonymization allows for extending access to data, still preserving privacy below the maximum tolerable risk. Risk thresholds can be adapted to the trustworthiness of the requester role, so a single access control framework can support multiple data access use cases, ranging from sharing data among a restricted (highly trusted) group to public release (low trust value). The authors have developed a prototype implementation of their framework and have assessed it by running a number of queries against the Adult Data Set from the UCI Machine Learning Repository, a publicly available dataset that is widely used by the research community. The experimental results are encouraging and confirm the feasibility of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
43

Johansyah, Johansyah. "PUTUSAN MAHKAMAH KONSTITUSI BERSIFAT FINAL DAN MENGIKAT (BINDING)." Solusi 19, no. 2 (May 1, 2021): 165–82. http://dx.doi.org/10.36546/solusi.v19i2.359.

Full text
Abstract:
The Constitutional Court has the authority to judge at the first and last levels whose decisions are final and binding. The Constitutional Court decision which is final and binding, contains 4 (four) legal meanings, namely: First, in order to realize legal certainty as soon as possible for the disputing parties. Second, the existence of the Constitutional Court as a constitutional court. Third, meaning as a form of social control exercised by the Constitutional Court. Fourth, as the guardian and sole interpreter of the constitution. The Constitutional Court's decision is final and binding, giving birth to a number of legal consequences in its application. Constitutional Court decisions can be classified into 2 (two) broad lines, namely decisions of the Constitutional Court which have positive legal consequences and negative legal consequences. As for the legal consequences that have positive meanings, namely: Ending a legal dispute; Maintain the principle of checks and balances; and Encouraging the political process. Meanwhile, the legal consequences arising from the Constitutional Court's decision are final and binding in a negative meaning, namely: The closure of access to legal remedies and the occurrence of legal vacuum.
APA, Harvard, Vancouver, ISO, and other styles
44

He, Xiaoshuang, Hechuan Guo, and Xueyu Cheng. "Blockchain-Based Privacy Protection Scheme for IoT-Assisted Educational Big Data Management." Wireless Communications and Mobile Computing 2021 (August 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/3558972.

Full text
Abstract:
Adoption of the Internet of Things (IoT) in education brings many benefits. However, the poor implementation of access control of educational data produced by the IoT devices has brought students’ and teachers’ privacy into danger. Attackers can access educational data that they are not permitted to access and even erase the records during access. To tackle this problem, we employ blockchain technology to guarantee the integrity of access control rules and trace the records of access events. In this paper, we propose a blockchain-based access control scheme for the data produced by IoT devices. The scheme consists of three components: (1) a well-implemented data collection module that is deployed in smart classrooms, which collects and uploads data about the real-time situation inside the smart classroom to the data center; (2) a MongoDB-based data center and its control module that makes access control decisions based on the verification of the permissions of visitors, where the permissions are managed by blockchain; and (3) a customized blockchain system that stores and keeps security policy updates of the role-based access control module and records access events in a trusted way. Our analysis indicates that the proposed access control scheme guarantees the correctness of the access control process and makes the access of collected educational data auditable and responsible. Our system collectively analyzes the context of the smart classroom and is capable of detecting multiple scenarios such as absence, lateness, and gunshot. We show how the scheme preserves students’ and teachers’ privacy by carrying out extensive experimental studies. The results indicate that the proposed data management system can give correct responses as quickly as a traditional data server does while preserving privacy.
APA, Harvard, Vancouver, ISO, and other styles
45

ElAshry, Abdelrahman F., Mohamed M. Ramadan, Ziad A. ElAlaily, Mahmoud M. Zaied, Catherine M. Elias, Omar M. Shehata, and Elsayed I. Morgan. "Development of a hybrid multi-layer control architecture for a cooperative team of N − homogeneous robots." Transactions of the Institute of Measurement and Control 42, no. 3 (September 27, 2019): 404–21. http://dx.doi.org/10.1177/0142331219872862.

Full text
Abstract:
This paper proposes a hybrid centralized control architecture for formation control of N-homogeneous mobile robots. The addressed problem is maintaining an equilateral triangular formation using three mobile robots while moving towards a desired target avoiding any collision. The proposed architecture is divided into four main subsystems; a main path-planner, a nonlinear Lyapunov-based controller, a Secure Shell (SSH) communication module and an image processing algorithm. The main path-planner subsystem itself is subdivided into three algorithms; brain-like algorithm, sub-path-planner and an information center algorithm. The brain-like algorithm is responsible for all the decision making. On the other hand, the sub-path-planner works on translating the decisions of the brain into more precise decisions to the individual robots. Meanwhile, the information center acts as the memory for the brain to access saved information previously shared between the robots. It is shown that the control algorithm allows any initial allocation of the three robots to converge to a triangle formation in an optimal manner while avoiding collisions. Finally, the potential use of this formation as a platform acting as an autonomous mobile helipad is introduced as a practical application for the proposed architecture.
APA, Harvard, Vancouver, ISO, and other styles
46

Boluma Mangata, Bopatriciat, Dominique Ilunga Nakashama, Donatien Kadima Muamba, and Parfum Bukanga Christian. "Implementation of an access control system based on bimodal biometrics with fusion of global decisions: Application to facial recognition and fingerprints." Journal of Computing Research and Innovation 7, no. 2 (October 4, 2022): 43–53. http://dx.doi.org/10.24191/jcrinn.v7i2.289.

Full text
Abstract:
Single-mode biometric systems suffer from several problems that make them unsuitable for current biometric applications that require high levels of reliability and security. These problems include the use of a single biometric trait that is prone to noise, poor capture, lack of biometric points, and deterioration of biometric input quality. In this paper, we are interested in decision fusion access control on a biometric bimodal pattern recognition system based on fingerprints and facial recognition. To realize this access control system based on facial recognition and fingerprints, we used an embedded system under Arduino, we programmed electronic systems for the automatic opening of doors without human action being. The performance evaluation of decision fusion access control on a biometric bimodal pattern recognition system is realized by means of the confusion matrix, the calculations of the evaluation parameters (Sensitivity, Specificity, Positive Predictive Value, Negative Predictive Value and False Negative). From a sample of 500 individuals, 250 of whom were registered and 250 non-registered, our access control system obtained the results of 248 true positives, 2 false negative, 1 false positive and 249 true negatives which constitute our confusion matrix. However, from the set of tests performed we can conclude that by taking advantage of the fusion of these two modalities, we increase the verification performance of system as the verification performance of bimodal system (fingerprint decision fusion and facial recognition) is applied to give even better results compared to single mode systems.
APA, Harvard, Vancouver, ISO, and other styles
47

Suleiman, Dima, Malek Al-Zewairi, and Adnan Shaout Shaout. "Enhanced Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System." International Journal of Online and Biomedical Engineering (iJOE) 18, no. 04 (March 22, 2022): 31–51. http://dx.doi.org/10.3991/ijoe.v18i04.27485.

Full text
Abstract:
Risk-based access control systems are part of identity management systems used to accommodate environments with needs for dynamic access control decisions. The risk value is subjected to overestimation or underestimation since it is measured qualitatively, thus; causing uncertainty problems, which was apparent in a previously proposed hybrid risk adaptive (HRA) access control system. Conversely, Fuzzy Inference Systems can deal with the uncertainty of measures and control the outcomes more precisely; therefore, a multilevel fuzzy inference system (HRA-MFIS) was proposed to replace the risk assessment model in HRA. This paper continues to improve the previous model by introducing an enhanced multilevel fuzzy inference system (EHRA-MFIS), which utilizes user behaviour and time analysis to detect anomalous access behaviour. Moreover, it improves the hybrid adaptive risk calculation module by adding authentication, classification and the degree of user anomalous behaviour to the risk calculation algorithm. The results show that the proposed model has smoothed out the transition between the different risk levels and enhanced the system's overall security by considering the failed authorization attempts and failed authentication attempts, asset classification, and user behaviour when calculating the risk level.
APA, Harvard, Vancouver, ISO, and other styles
48

Melnychenko, Andriy. "Restrictions of individual’s rights, freedoms and legal interests within temporary access to items and documents: practical aspects." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 3, no. 3 (September 30, 2021): 277–84. http://dx.doi.org/10.31733/2078-3566-2021-3-277-284.

Full text
Abstract:
Temporary access to things and a document as an institution that restricts human rights and freedoms in criminal proceedings and its main properties have been studied. Attention is drawn to the problem of numerous risks of human rights violations during the application of temporary access to things and documents due to unfounded and weak argumentation of investigators' requests for temporary access, as well as a superficial assessment of circumstances by the investigating judge due to overload of requests. Statistical data have been studied, which indicate the need for consistent reform of judicial control in the direction of studying the materials and making informed decisions. Temporary access to things and documents in the criminal process is part of the institution of measures to ensure criminal proceedings. It attracts the attention of scholars because it has a rather complicated procedure for obtaining a decision on temporary access to things and documents, which must be provided by the investigating judge based on the results of the petition. The mechanism of judicial control indicates that this measure to some extent restricts the rights, freedoms or legitimate interests of a person – a participant in criminal proceedings or a third party. Related to this is the problem of the measure under investigation, which is the risk of violation of the rights of individuals, because every year the investigating judges receive a large number of requests for temporary access, and there are specific features in terms of providing temporary access to things and documents containing legally protected secret.
APA, Harvard, Vancouver, ISO, and other styles
49

Hsiao, Chiu-Han, Yean-Fu Wen, Frank Yeong-Sung Lin, Yu-Fang Chen, Yennun Huang, Yang-Che Su, and Ya-Syuan Wu. "An Optimization-Based Orchestrator for Resource Access and Operation Management in Sliced 5G Core Networks." Sensors 22, no. 1 (December 24, 2021): 100. http://dx.doi.org/10.3390/s22010100.

Full text
Abstract:
Network slicing is a promising technology that network operators can deploy the services by slices with heterogeneous quality of service (QoS) requirements. However, an orchestrator for network operation with efficient slice resource provisioning algorithms is essential. This work stands on Internet service provider (ISP) to design an orchestrator analyzing the critical influencing factors, namely access control, scheduling, and resource migration, to systematically evolve a sustainable network. The scalability and flexibility of resources are jointly considered. The resource management problem is formulated as a mixed-integer programming (MIP) problem. A solution approach based on Lagrangian relaxation (LR) is proposed for the orchestrator to make decisions to satisfy the high QoS applications. It can investigate the resources required for access control within a cost-efficient resource pool and consider allocating or migrating resources efficiently in each network slice. For high system utilization, the proposed mechanisms are modeled in a pay-as-you-go manner. Furthermore, the experiment results show that the proposed strategies perform the near-optimal system revenue to meet the QoS requirement by making decisions.
APA, Harvard, Vancouver, ISO, and other styles
50

Zúquete, André, Hélder Gomes, João Amaral, and Carlos Oliveira. "Security-Oriented Architecture for Managing IoT Deployments." Symmetry 11, no. 10 (October 19, 2019): 1315. http://dx.doi.org/10.3390/sym11101315.

Full text
Abstract:
Assuring security and privacy is one of the key issues affecting the Internet of Things (IoT), mostly due to its distributed nature. Therefore, for the IoT to thrive, this problem needs to be tackled and solved. This paper describes a security-oriented architecture for managing IoT deployments. Our main goal was to deal with a fine-grained control in the access to IoT data and devices, to prevent devices from being manipulated by attackers and to avoid information leaking from IoT devices to unauthorized recipients. The access control is split: the management of authentication and access control policies is centered on special components (Authentication, Authorization, and Accounting Controllers), which can be distributed or centralized, and the actual enforcement of access control decisions happens on the entities that stay in the path to the IoT devices (Gateways and Device Drivers). The authentication in the entire system uses asymmetric cryptography and pre-distributed unique identifiers derived from public keys; no Public Key Infrastructure (PKI) is used. A Kerberos-like ticket-based approach is used to establish secure sessions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography