Gotowa bibliografia na temat „UCON MODEL”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „UCON MODEL”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "UCON MODEL"

1

Wu, Hai Ying. "Usage Control Model Based on Regular Grammar." Advanced Materials Research 433-440 (January 2012): 4590–96. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.4590.

Pełny tekst źródła
Streszczenie:
Traditional access control models through search Access Control List(ACL) to authorize [1-3]. Traditional access control models fail to satisfy the modern information system, thus Usage Control( UCON ) models were produced and fundamentally enhanced the traditional access control. The UCON models are considered as the next generation access control models. This paper is organized as follow. Section 1 introduces the Usage Control models. Section 2 introduces Regular Grammar ( RG ). Section 3 gives the RG of the 16 core ABC UCON models. Section 4 gives the RG of on-line antivirus procedure. Fina
Style APA, Harvard, Vancouver, ISO itp.
2

Jiang, Ze Tao, and Jia Fei He. "Research on an UCON Extension Model Applicable to Industrial Control." Applied Mechanics and Materials 20-23 (January 2010): 470–76. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.470.

Pełny tekst źródła
Streszczenie:
Although UCON makes a unified framework for research on modern access control, it is not applicable enough due to fact that it only gives out a conceptual model. In this paper, analysis and extension have been made on UCON, role and task factors are introduced to it and combined with the conception of domain, an UCON extension model—UCONTR model, which is applicable to industrial control, is proposed. Its formalized description is given in the next step. Finally, the application of UCONTR on distributed control system for heat treatment is introduced in detail.
Style APA, Harvard, Vancouver, ISO itp.
3

Gan, Sheng Ke, and Feng Bin Wang. "An Extended UCON Model Supporting Distributed Multidomain Applications." Advanced Materials Research 433-440 (January 2012): 5616–19. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5616.

Pełny tekst źródła
Streszczenie:
This paper presents security rules summarized from the analysis of an distributed multidomain application. The paper proposes extensions to the core UCON model to address typical problems and requirements in the distributed multidomain environment such as: dynamic attributes, delegation authorization mechanism. The paper gives the definition of the important part of the extended UCON model such as: the basic sets, the system assertions and the actions.
Style APA, Harvard, Vancouver, ISO itp.
4

Park, Jaehong, and Ravi Sandhu. "The UCON ABC usage control model." ACM Transactions on Information and System Security 7, no. 1 (2004): 128–74. http://dx.doi.org/10.1145/984334.984339.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Xu, Xiao Lin. "Research on Task-Based Usage Control Core Models in Workflow for Manufacturing Environment." Advanced Materials Research 886 (January 2014): 378–81. http://dx.doi.org/10.4028/www.scientific.net/amr.886.378.

Pełny tekst źródła
Streszczenie:
With widespread application of Workflow (WF) management system, problem in access control becomes more and more important. At present, the TBAC Model and TRBAC Model cannot satisfy the requirements of access control in Modern information systems. Therefore, the task in WF is the center which combine UCON model with WF, and establish the Task-Based Usage Control (TUCON) Model in which the access control of WF use the UCON Model.
Style APA, Harvard, Vancouver, ISO itp.
6

Chang, He, Yang Lu, and Yantao Sun. "Simultaneous Prediction, Determination, and Extraction of Four Polycyclic Aromatic Hydrocarbons in the Environment Using a UCON–NaH2PO4 Aqueous Two-Phase Extraction System Combined with High-Performance Liquid Chromatography-Ultraviolet Detection." Molecules 27, no. 19 (2022): 6465. http://dx.doi.org/10.3390/molecules27196465.

Pełny tekst źródła
Streszczenie:
In this paper, a new aqueous two-phase extraction system(ATPES) consisting of UCON (poly(ethylene glycol-ran-propylene glycol) monobutyl ether)–NaH2PO4 was established, and four trace polycyclic aromatic hydrocarbons (PAHs: fluorene, anthracene, pyrene and phenanthrene) in water and soil were analyzed by high-performance liquid chromatography (HPLC)–ultraviolet detection. In the multi-factor experiment, the central composite design (CCD) was used to determine the optimum technological conditions. The final optimal conditions were as follows: the concentration of UCON was 0.45 g·mL−1, the conce
Style APA, Harvard, Vancouver, ISO itp.
7

Tang, Jia. "Research on Design of Network Platform Based on UCON Access Control Model." Applied Mechanics and Materials 543-547 (March 2014): 4589–92. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4589.

Pełny tekst źródła
Streszczenie:
Network teaching as a new teaching methods, taking full advantage of computer, networking and multimedia technologies, making teaching behaviors across time and space constraints, has a great deal of flexibility and interactivity. However, access control is very important in network teaching platform, and it decides the security of such platform. In this paper, we analyze the UCON access control model in detail, propose a UCON based access control model, and design a network teaching platform with the proposed access control model.
Style APA, Harvard, Vancouver, ISO itp.
8

Dai, Chang Ying, Wen Tao Gong, and Jing Liu. "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML." Advanced Materials Research 143-144 (October 2010): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1275.

Pełny tekst źródła
Streszczenie:
With the rapid development of information technology, more and more requesters need accessing the services in different access domains, which make the access process in cross-domain become more difficultly. The traditional access control models couldn’t solve the access process for their design limitations and diversity access policies. Usage control model (UCON) was proposed to strengthen the expression of access control model, but UCON is only a conceptual model. How to use the UCON in access process? It is worthwhile to further study. Extensible access control markup language (XACML) is an
Style APA, Harvard, Vancouver, ISO itp.
9

Liu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.

Pełny tekst źródła
Streszczenie:
With the continuous progress of computer technology, static identity authentication technology has encountered challenges in practical applications; in addition, it has deficiencies in continuity and mutability. For these reasons, we propose a risk-based dynamic identity authentication method based on the Usage Control (UCON) model. When authenticating a user, we consider their access rights based on the degree of risk, except in case of password authentication. We propose a risk assessment method, and blockchain technology is used in the scheme to provide a reliable process for risk assessmen
Style APA, Harvard, Vancouver, ISO itp.
10

JASIM AL-FARTTOOSI, DAWOOD SALMAN. "Formal model and Policy specification for software defined networks." Journal of Kufa for Mathematics and Computer 3, no. 2 (2016): 55–62. http://dx.doi.org/10.31642/jokmc/2018/030207.

Pełny tekst źródła
Streszczenie:
Software-defined networking SDN is gaining a sharp increase in adoption by very well-known companies Like Google and Microsoft. Currently, the two stands out reliability and security are the most issues that hampering the SDN rapid growth. This paper aims to contribute to this growing area of research by exploring the SDN security issues. Novel approach will be proposed by utilizing the well-known access control approach called theusage control UCON model and also the Flog policy language of software defined networks SDNs. This work will be produced as a formal modelling via high-level abstrac
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "UCON MODEL"

1

Camy, Alexandre Rosa. "Aplicação do modelo UCON abc em sistemas de comércio eletrônico B2B." Florianópolis, SC, 2005. http://repositorio.ufsc.br/handle/123456789/102447.

Pełny tekst źródła
Streszczenie:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduaçõa em Ciência da Computação.<br>Made available in DSpace on 2013-07-16T00:58:32Z (GMT). No. of bitstreams: 1 220823.pdf: 1700842 bytes, checksum: 339544c3cbf00d6d06566d73e3518766 (MD5)<br>Recentemente foi proposto um modelo de controle de acesso, denominado UCONABC, que além de unir alguns dos principais conceitos de controle de acesso ainda propõe novos conceitos como: obrigações, condições, continuidade e mutabilidade. Apesar de abrangente, o UCONABC possui limitações e existem ainda m
Style APA, Harvard, Vancouver, ISO itp.
2

Teigão, Rafael Coninck. "Controle de uso de recursos em sistemas operacionais utilizando o modelo UCON ABC / Rafael Coninck Teigão ; orientador, Carlos Maziero." reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2007. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=1417.

Pełny tekst źródła
Streszczenie:
Dissertação (mestrado) - Pontifícia Universidade Católica do Paraná, Curitiba, 2007<br>Bibliografia: p. 69-73<br>Esta dissertação discorre sobre as necessidades modernas de controle de utilização de recursos em sistemas operacionais multi-usuários, e apresenta uma proposta de projeto para a implementação do modelo de controle de uso UCONABC em um sistema operacional<br>This work addresses the modern needs of resource utilization control in multi-user operating systems, and presents a project proposal for implementing the UCONABC usage control model in a real operating system, by using a gramma
Style APA, Harvard, Vancouver, ISO itp.
3

Akram, Raja. "A user centric security model for tamper-resistant devices." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/aca52f8c-6233-4f73-a9da-025d25ab1295/1/.

Pełny tekst źródła
Streszczenie:
In this thesis, we propose a ubiquitous and interoperable device based on the smart card architecture to meet the challenges of privacy, trust, and security for traditional and emerging technologies like personal computers, smart phones and tablets. Such a device is referred as User Centric Tamper-Resistant Device (UCTD). To support the smart card architecture for the UCTD initiative, we propose the delegation of smart card ownership from a stringent centralised authority (i.e. the card issuer) to users. This delegation mandated the review of existing smart card mechanisms and their adequate m
Style APA, Harvard, Vancouver, ISO itp.
4

JOSHI, NIDHI. "AUGMENTATION IN UCON MODEL." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15219.

Pełny tekst źródła
Streszczenie:
In this dissertation, we have presented a new architecture of UCON access control model for e-healthcare domain. This enhanced UCON model can scale effectively as per user demand, perform isolation of sensitive data from non-sensitive data and data transmission between different modules is via secure model and thus helps in achieving high availability, performance, scalability, resilience and security. Features of Cloud computing have also been explored and used to achieve some of the features listed above. Existing implementation of UCON for e-healthcare domain do not cater for all of these r
Style APA, Harvard, Vancouver, ISO itp.
5

Lu, Po-Hung, and 呂柏鋐. "The Business Model of UCOM IT Training Center." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/7wyktv.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>102<br>The Professional Technical Certification and Training Industry has been flourished for years in tandem with the advancement in information technology and knowledge transfer. Professional training centers have provided high quality and to-the-point expertise advices for their customers. Apparently, professional training centers not only speeds up their customers’ knowledge but also help their customers to acquire the professional certifications. SYSTEX Information - UCOM Training Centre has enjoyed its great success in the field of information technology profes
Style APA, Harvard, Vancouver, ISO itp.
6

WANG, SHIH-YA, and 王詩亞. "A Study on Latent Growth Model of UCAN Common Competency Self-Evaluation─A Case of M University." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3ktwdj.

Pełny tekst źródła
Streszczenie:
碩士<br>銘傳大學<br>應用統計與資料科學學系碩士班<br>106<br>In recent years, influenced by the higher education policy universalization, teachers, curriculum and teaching, etc, all have significant changes, institutions of higher education is also increased dramatically, but along with the popularization of higher education, made higher education because of oversupply, and cause a college degree value, lead to college students after graduation, can't seem to put this to use, the unemployed college grads are still much higher than the rest of the education in socioeconomic status. The purpose of this study is to ex
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "UCON MODEL"

1

Díaz Bautista, Alejandro, and Mayrén Polanco Gaytán. Regional Economic Growth In Mexico: The 21st Century Economy. 2022nd ed. Universidad de Colima, 2022. http://dx.doi.org/10.53897/li.2022.0007.ucol.

Pełny tekst źródła
Streszczenie:
Regional economics in Mexico is concerned with the spatial allocation of economic activity. It is centered along the analysis within regions and states or metropolitan areas of a country. Mexico as a country is now one of the fastest-growing economies in Latin America and a model of financial and commercial integration. But formidable development and economic growth challenges lie ahead for Mexico in the next quarter century, as it observed the deep contrasts between Mexico's rich and poor states, growing urban centers and destitute rural areas, and between Mexicans rich enough to be considere
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "UCON MODEL"

1

Liu, Yanpei, Yuesheng Gu, and Junhui Fu. "A New UCON Model for Web Industrial Control." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2169-2_140.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Lili, Xie, and Zhai Zhigang. "Formal Specification of Concurrent Enforcement UCON Model with CTL Logic." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24265-7_54.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hariri, Ali, Amjad Ibrahim, Bithin Alangot, et al. "UCON+: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization." In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-16088-2_10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Resatsch, Florian. "Designing an Ubiquitous Computing Application Development and Evaluation Process Model (UCAN)." In Ubiquitous Computing. Gabler, 2010. http://dx.doi.org/10.1007/978-3-8349-8683-2_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Sariyar, Murat, and Jürgen Holm. "Embedding Risk-Based Anonymization into Data Access Control for Providing Individual-Level Health Data in a Secure Way." In Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti210953.

Pełny tekst źródła
Streszczenie:
Especially in biomedical research, individual-level data must be protected due to the sensitivity of the data that is associated with patients. The broad goal of scientific data re-use is to allow many researchers to derive new hypotheses and insights from the data while preserving privacy. Data usage control (DUC) as an attribute-based access mechanism promises to overcome the limitations of traditional access control models achieving that goal. Park and Sandhu provided the usage control (UCON) model as an instance of DUC, which defines policies that evaluate certain attributes. Here, we pres
Style APA, Harvard, Vancouver, ISO itp.
6

Berisha-Muharremi, Venera. "Perspective Chapter: Crosstalk between Bone Metabolism and Insulin Resistance." In Hypoglycemia - New Insights [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.1005653.

Pełny tekst źródła
Streszczenie:
Bone has traditionally been considered a passive organ, serving only as a scaffold for other organs and the entire body. However, over the past few years, an increasing number of studies have highlighted its function as an endocrine organ regulating energy and adipose tissue metabolism by producing undercarboxylated osteocalcin (ucOC). In mice, ucOC administration through different routes has been explored for its potential as a therapeutic or preventive method for reducing adipocyte size and normalising glucose homeostasis. The discovery of these endocrine properties of ucOC in rodent models
Style APA, Harvard, Vancouver, ISO itp.
7

Li Ming, Xu Gangyan, Shao Saijun, Lin Peng, and Huang G.Q. "Ubiquitous Cloud Object for Fine-Grained Resource Management in E-Commerce Logistics." In Advances in Transdisciplinary Engineering. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-779-5-1049.

Pełny tekst źródła
Streszczenie:
Logistics resources are of great importance in E-commerce as the essential factors of production, basically including man, machine and material. Optimization for E-commerce logistics always relys on the real-time information of logistics resources. Actually, these resources are exchanging information continuously when they interacting with each other. Since the management granularity for logistics resources still remains at a coarse level, most of the interaction information between resources cannot be well recorded and organized. To achieve fine-grained management of logistics resources that
Style APA, Harvard, Vancouver, ISO itp.
8

"It’s Not about You: The UConn Social Entrepreneur Corps Global Commonwealth Study Abroad Model." In The Handbook of Practice and Research in Study Abroad. Routledge, 2010. http://dx.doi.org/10.4324/9780203876640-40.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Akram Raja Naeem, Markantonakis Konstantinos, and Mayes Keith. "Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions." In Cryptology and Information Security Series. IOS Press, 2013. https://doi.org/10.3233/978-1-61499-328-5-107.

Pełny tekst źródła
Streszczenie:
Remote attestation mechanisms are well studied in the high-end computing environments; however, the same is not true for embedded devices &amp;ndash; especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multi-application platform, verifying the current state of the smart card is significant to the overall security of such proposals. The initiatives proposed by GlobalPlatform Consumer Centric Model (GP-CCM) and User Centric Smart Card Ownership Model (UCOM) enables a user to download any application as she desire &amp;ndash; depending
Style APA, Harvard, Vancouver, ISO itp.
10

Abdrabo, Amal Adel. "Third-Spaces and the Creation of Socio-Spatial Identity." In Advances in Electronic Government, Digital Divide, and Regional Development. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4948-3.ch008.

Pełny tekst źródła
Streszczenie:
This chapter provides a polite critique of the conventional ways of thinking about space and the intertwined dialectics of the socio-spatial narratives. Conventionally, the United Nations Educational, Scientific, and Cultural Organization's (UNESCO) main document on the Creative Cities Network (UCCN) emphasizes two crucial pillars of sustainable development and urban regeneration which are creativity and culture. The first term deals with creative cities and urban areas, while the second addresses culture as the human product that takes either a tangible or an intangible form. Regarding the me
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "UCON MODEL"

1

Rojas, Sergio A., �lvaro Orjuela, and Paulo C. Narv�ez. "Deacidification of Used Cooking Oil: Modeling and Validation of Ethanolic Extraction in a Liquid-Liquid Film Contactor." In The 35th European Symposium on Computer Aided Process Engineering. PSE Press, 2025. https://doi.org/10.69997/sct.199202.

Pełny tekst źródła
Streszczenie:
Large quantities of used cooking oil (UCO) are produced globally, primarily in densely populated urban centers. Although UCO is highly heterogeneous due to degradation during cooking, it still contains a significant fraction of triacylglycerols (TG) that could be used as raw materials in oleochemical biorefineries. A major challenge in reintegrating this residue into productive cycles is the presence of free fatty acids (FFA), which can affect subsequent catalytic or enzymatic transformations. Conventional processes for FFA removal are energy-intensive, require alkaline feedstocks, and generat
Style APA, Harvard, Vancouver, ISO itp.
2

Li, Xiangyu, and Bodong Shang. "An Analytical Model for Coordinated Multi-Satellite Joint Transmission System." In 2024 International Conference on Ubiquitous Communication (Ucom). IEEE, 2024. http://dx.doi.org/10.1109/ucom62433.2024.10695881.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Zhang, Zhicheng, Tianyu Zhang, and Jiarun Song. "Assessing Wireless Screen-Casting Services: A Comprehensive Quality of Experience Model." In 2024 International Conference on Ubiquitous Communication (Ucom). IEEE, 2024. http://dx.doi.org/10.1109/ucom62433.2024.10695843.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Zhao, Kai, Zhaohui Yang, Chongwen Huang, Xiaoming Chen, and Zhaoyang Zhang. "FedsLLM: Federated Split Learning for Large Language Models Over Communication Networks." In 2024 International Conference on Ubiquitous Communication (Ucom). IEEE, 2024. http://dx.doi.org/10.1109/ucom62433.2024.10695888.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

"Enforcement of CA-UCON Model." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615001.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zetao Jiang, Shuo Hu, Shengke Gan, and Yuanzhong Shu. "Research on an UCON model supporting distributed management." In 2008 International Conference on Information and Automation (ICIA). IEEE, 2008. http://dx.doi.org/10.1109/icinfa.2008.4608244.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Jiao, Dongliang, Liu Lianzhong, Li Ting, and Ma Shilong. "Realization of UCON Model Based on Extended-XACML." In 2011 International Conference on Future Computer Sciences and Application (ICFCSA). IEEE, 2011. http://dx.doi.org/10.1109/icfcsa.2011.27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Jiang, Zetao, Jiafei He, Shuo Hu, and Bina Zheng. "Research on an UCON Model Supporting Distributed Workflow." In 2009 3rd International Conference on Genetic and Evolutionary Computing (WGEC). IEEE, 2009. http://dx.doi.org/10.1109/wgec.2009.107.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Long, Dan, Juan Wang, Bin Han, Ding Chen, and Lei Shi. "MS-UCON: A Usage Control Model for Meteorological Operational Systems." In 2023 19th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 2023. http://dx.doi.org/10.1109/icnc-fskd59587.2023.10281006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kumar, Manoj, Nidhi Joshi, and Deepak Kumar. "Augmentation in UCON Access Control Model for E-Healthcare Domain." In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2018. http://dx.doi.org/10.1109/iccons.2018.8663205.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!