Добірка наукової літератури з теми "Access control decisions"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Access control decisions".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Access control decisions":

1

Savchyn, M., A. Zavydniak, and V. Olashyn. "Direct Effect of the Constitution of Ukraine in Focus: Access to the Justice and Judicial Control of the Enforcement of Judgment." Uzhhorod National University Herald. Series: Law, no. 70 (June 18, 2022): 146–55. http://dx.doi.org/10.24144/2307-3322.2022.70.21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Proper enforcement of court decisions is part of the general concept of access to justice, as it involves the restoration of violated rights by third parties or public authorities. From the point of view of the supremacy of the constitution and their direct effect, the article analyzes the enforcement of court decisions in relation to access to justice. The first part reveals the relationship between constitutional and international standards of access to justice. The second part highlights the main components of access to administrative justice. The third part of the paper analyzes the standards of due process and judicial control over the execution of court decisions. Since we are talking about judicial control over the execution of a court decision and the execution of such a decision as ways of achieving results for persons who have applied for protection of their rights with a lawsuit, it is worth focusing on the applicants. Such in the enforcement proceedings will be the parties to the enforcement proceedings, or rather one of the parties - the claimant. Access to justice in the context of the principles of constitutional and international law is interpreted on the grounds that the right to judicial protection is not absolute and may be limited on the basis of proportionality, in particular for reasons of procedural economy, efficiency and effectiveness of legal protection. The concept of access to justice follows from the understanding of the rule of law and Rechtsstaat in their relationship. The components of access to justice are the following: 1) pre-trial settlement procedures, in particular mediation; 2) access to legal aid and court fees; 3) terms of consideration of the case; 4) the procedure for appealing court decisions; 5) efficiency and effectiveness of execution of court decisions. Together, they form the notion of access to justice, which is complete provided that court decisions are effectively enforced within a reasonable time. This is influenced by a number of institutional and procedural factors that depend on the degree of development of the legal culture of society.
2

Huang, Kun, and Yun Song Jian. "Research on a New Access Control Technology." Advanced Materials Research 765-767 (September 2013): 1858–62. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1858.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The term usage control (UCON)[1] is a generalization of access control to cover obligations, conditions, continuity (ongoing controls) and mutability. Traditionally, access control has dealt only with authorization decisions on a subject's access to target resources, and as a consequence of access have not been systematically studied. In this paper we motivate the need for usage control, study a family of ABC models as a core model for usage control and show how it encompasses traditional access control, such as mandatory, discretionary and role-based access control,. In addition, we also discuss architectures that introduce a new reference monitor for usage control and some variations.
3

Barrilleaux, Charles J., and Mark E. Miller. "Decisions without Consequences: Cost Control and Access in State Medicaid Programs." Journal of Health Politics, Policy and Law 17, no. 1 (1992): 97–118. http://dx.doi.org/10.1215/03616878-17-1-97.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (October 27, 2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recent years have seen an increasing popularity of online collaborative systems like social networks and web-based collaboration platforms. Collaborative systems typically offer their users a digital environment in which they can work together and share resources and information. These resources and information might be sensitive and, thus, they should be protected from unauthorized accesses. Multi-party access control is emerging as a new paradigm for the protection of co-owned and co-managed resources, where the policies of all users involved in the management of a resource should be accounted for collaborative decision making. Existing approaches, however, only focus on the jointly protection of resources and do not address the protection of the individual user policies themselves, whose disclosure might leak sensitive information. In this work, we propose a privacy-preserving mechanism for the evaluation of multi-party access control policies, which preserves the confidentiality of user policies while remaining capable of making collaborative decisions. To this end, we design secure computation protocols for the evaluation of policies in protected form against an access query and realize such protocols using two privacy-preserving techniques, namely Homomorphic Encryption and Secure Functional Evaluation. We show the practical feasibility of our mechanism in terms of computation and communication costs through an experimental evaluation.
5

Atlam, Hany F., Muhammad Ajmal Azad, and Nawfal F. Fadhel. "Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model." Sensors 22, no. 5 (March 4, 2022): 2005. http://dx.doi.org/10.3390/s22052005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Providing a dynamic access control model that uses real-time features to make access decisions for IoT applications is one of the research gaps that many researchers are trying to tackle. This is because existing access control models are built using static and predefined policies that always give the same result in different situations and cannot adapt to changing and unpredicted situations. One of the dynamic models that utilize real-time and contextual features to make access decisions is the risk-based access control model. This model performs a risk analysis on each access request to permit or deny access dynamically based on the estimated risk value. However, the major issue associated with building this model is providing a dynamic, reliable, and accurate risk estimation technique, especially when there is no available dataset to describe risk likelihood and impact. Therefore, this paper proposes a Neuro-Fuzzy System (NFS) model to estimate the security risk value associated with each access request. The proposed NFS model was trained using three learning algorithms: Levenberg–Marquardt (LM), Conjugate Gradient with Fletcher–Reeves (CGF), and Scaled Conjugate Gradient (SCG). The results demonstrated that the LM algorithm is the optimal learning algorithm to implement the NFS model for risk estimation. The results also demonstrated that the proposed NFS model provides a short and efficient processing time, which can provide timeliness risk estimation technique for various IoT applications. The proposed NFS model was evaluated against access control scenarios of a children’s hospital, and the results demonstrated that the proposed model can be applied to provide dynamic and contextual-aware access decisions based on real-time features.
6

Yu, Hui, and Dongyan Chen. "New Optimal Control Decisions for Channel System With Lagged Effect: Dynamic Advertising and Pricing Cases." IEEE Access 7 (2019): 75350–59. http://dx.doi.org/10.1109/access.2019.2918347.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Laitrakun, Seksan. "Decision fusion for composite hypothesis testing in wireless sensor networks over a shared and noisy collision channel." International Journal of Distributed Sensor Networks 16, no. 7 (July 2020): 155014772094020. http://dx.doi.org/10.1177/1550147720940204.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We consider the composite hypothesis testing problem of time-bandwidth-constrained distributed detection. In this scenario, the probability distribution of the observed signal when the event of interest is happening is unknown. In addition, local decisions are censored and only those uncensored local decisions will be sent to the fusion center over a shared and noisy collision channel. The fusion center also has a limited time duration to collect transmitted decisions and make a final decision. Two types of medium access control that the sensor nodes apply to send their decisions are investigated: time division multiple access and slotted-Aloha. Unlike using the time division multiple access protocol, the slotted-Aloha-based distributed detection will experience packet collisions. However, in this article, since only uncensored decisions are sent, packet collisions are informative. We derive fusion rules according to generalized likelihood ratio test, Rao test, and Wald test for both the time division multiple access–based distributed detection and the slotted-Aloha-based distributed detection. We see that the fusion rules for the slotted-Aloha-based distributed detection here also exploit packet collisions in the final decision-making. In addition, the asymptotic performances and energy consumption of both schemes are analyzed. Extensive simulation and numerical results are provided to compare the performances of these two schemes. We show that, for a given time delay, the slotted-Aloha-based distributed detection can outperform the time division multiple access–based distributed detection by increasing the number of sensor nodes which results in higher energy consumption.
8

MIAO, Siwei, Xiaojuan ZHANG, and Zhe LIU. "Fine-Grained Access Control Mechanism of Energy Internet." Wuhan University Journal of Natural Sciences 27, no. 3 (June 2022): 231–39. http://dx.doi.org/10.1051/wujns/2022273231.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Energy Internet has generated huge amounts of information on the production devices, transmission devices, and energy consumption devices. The leakage of data in the collection, transmission, and storage process will cause serious security problems. The existing Energy Internet security methods rely on traditional access control mechanisms and specific network boundary defense mechanisms, which has the limitations of static strategies and coarse design. We combine the advantages of role-based access control (RBAC) and attribute-based access control (ABAC), and propose a trusted Energy Internet fine-grained access control model based on devices' attribute and users' roles. We have not only achieved fine-grained Energy Internet resource allocation, but also ensured that the access control process is related to the security status of the environment in real time. Experimental results show that the access control model can safely and accurately execute access decisions in the Energy Internet scenario, and the processing performance is more stable.
9

Arudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the wide adoption of Internet, security of web database is a key issue. In web-based applications, due to the use of n-tier architecture, the database server has no knowledge of the web application user and hence all authorization decisions are based upon execution of specific web application. Application server has full access privileges to delegate to the end user based upon the user requirement. The identity of the end user is hidden , subsequently database server fails to assign proper authorizations to the end user. Hence, current approaches to access control on databases do not fit for web databases because they are mostly based on individual user identities. To fill this security gap, the definition of application aware access control system is needed. In this paper, RBAC+ Model, an extension of NIST RBAC provides a application aware access control system to prevent attacks with the notion of application, application profile and sub-application session.
10

Et. al., Kriti Srivastava,. "NdRAdAC: Need based Access Control Framework for an Emergency Response System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1414–28. http://dx.doi.org/10.17762/turcomat.v12i5.2037.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Access control is easy to implement in a static system with resource-role mapping and known policies. It becomes challenging if the system is dynamic and volatile, which means there are unpredictability in the workflow. Existing role based and attribute- based access control systems are very efficient in static and predictable situations. But they are not effective in a dynamic situation. Researchers over the last two decades have tried to propose various probabilistic based, machine learning based and decision theory-based access control to prove adaptability in their access control methods. But there are existing gaps in operational needs and proposed adaptability methods. Under regular scenario access control system may work based on the policies or decided roles. Only if there is a genuine need, then access control should switch to adaptable solutions. Also, a true adaptable system should not allow human intervention, the system should be able to understand the genuineness of the requester and take decisions whether access should be granted or not. In this paper with the help of a disaster management case study, a need-based access control framework – NdRAdAC is proposed. It evaluates the genuineness of the requester and acts appropriately. An ontology-based access control for an emergency response system is developed, which can help the disaster management system to coordinate with different hospitals and help in transferring patient data from one hospital to another if needed. It ensures that data requester is authenticated with the help of access control module. The framework is tested for three main parameters: Adaptability, Consistency and Computational Efficiency. It was found that framework was accurately adaptable, consistent with all the different types of cases and computationally efficient.

Дисертації з теми "Access control decisions":

1

Misra, Gaurav. "Recommending access control decisions to social media users." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/88134/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Social media has become an integral part of the Internet and has revolutionized interpersonal communication. The lines of separation between content creators and content consumers have blurred as normal users have platforms such as social media sites, blogs and microblogs at their disposal on which they can create and consume content as well as have the opportunity to interact with other users. This change has also led to several well documented privacy problems for the users. The privacy problems faced by social media users can be categorized into institutional privacy (related to the social network provider) and social privacy (related to the interpersonal communication between social media users) problems. The work presented in this thesis focuses on the social privacy issues that affect users on social media due to their interactions with members in their network who may represent various facets of their lives (such as work, family, school, etc.). In such a scenario, it is imperative for them to be able to appropriately control access to their information such that it reaches the appropriate audience. For example, a person may not want to share the same piece of information with their boss at work and their family members. These boundaries are defined by the nature of relationships people share with each other and are enforced by controlling access during communication. In real life, people are accustomed to do this but it becomes a greater challenge while interacting online. The primary contribution of the work presented in this thesis is to design an access control recommendation mechanism for social media users which would ease the burden on the user while sharing information with their contacts on the social network. The recommendation mechanism presented in this thesis, REACT (REcommending Access Control decisions To social media users), leverages information defining interpersonal relationships between social media users in conjunction with information about the content in order to appropriately represent the context of information disclosure. Prior research has pointed towards ways in which to employ information residing in the social network to represent social relationships between individuals. REACT relies on extensive empirical evaluation of such information in order to identify the most suitable types of information which can be used to predict access control decisions made by social media users. In particular, the work in this thesis advances the state of art in the following ways: (i) An empirical study to identify the most appropriate network based community detection algorithm to represent the type of interpersonal relationships in the resulting access control recommendation mechanism. This empirical study examines a goodness of fit of the communities produced by 8 popular network based community detection algorithms with the access control decisions made by social media users. (ii) Systematic feature engineering to derive the most appropriate profile attribute to represent the strength or closeness between social media users. The relationship strength is an essential indicator of access control preferences and the endeavor is to identify the minimal subset of attributes which can accurately represent this in the resulting access control recommendation mechanism. (iii) The suitable representation of interpersonal relationships in conjunction with information about the content that result in the design of an access control recommendation mechanism, REACT, which considers the overall context of information disclosure and is shown to produce highly accurate recommendations.
2

Chuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Whitelisting IP addresses and hostnames allow organizations to employ a default-deny approach to network traffic. Organizations employing a default-deny approach can stop many malicious threats, even including zero-day attacks, because it only allows explicitly stated legitimate activities. However, creating a comprehensive whitelist for a default-deny approach is difficult due to user-supplied destinations that can only be known at the time of usage. Whitelists, therefore, interfere with user experience by denying network traffic to user-supplied legitimate destinations. In this thesis, we focus on creating dynamic whitelists that are capable of allowing user-supplied network activity. We designed and built a system called Harbinger, which leverages user interface activity to provide contextual information in which network activity took place. We built Harbinger for Microsoft Windows operating systems and have tested its usability and effectiveness on four popular Microsoft applications. We find that Harbinger can reduce false positives-positive detection rates from 44%-54% to 0%-0.4% in IP and DNS whitelists. Furthermore, while traditional whitelists failed to detect propagation attacks, Harbinger detected the same attacks 96% of the time. We find that our system only introduced six milliseconds of delay or less for 96% of network activity.
3

Magnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

Role based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patient’s treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patient’s medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employee’s work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.

4

Giannakopoulos, Theophilos John. "Multi-Decision Policy and Policy Combinator Specifications." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/166.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Margrave is a specification language and analysis tool for access control policies with semantics based in order-sorted logic. The clear logical roots of Margrave's semantics makes policies specified in the Margrave language both machine analyzable and relatively easy for users to reason about. However, the decision conflict resolution declaration and policy set features of Margrave do not have semantics that are as cleanly rooted in order-sorted logic as Margrave policies and queries are. Additionally, the current semantics of decision conflict resolution declarations and of policy sets do not permit users to take full advantage of the multi-decision capabilities of Margrave policies. The purposes of this thesis are (i) to provide a unified extension to the semantics for policies and policy combination, (ii) to cleanly support decision conflict resolution mechanisms in a general way within those semantics and (iii) to provide insight into the properties of policy combination and decision conflict resolution for multi-decision policies in general. These goals are achieved via the realization that policy combinators may be treated as policies operating within environments extended with the results of the policies to be combined, allowing policy combinators to be defined as if they were policies. The ability to treat policy combinators as policies means that users' current understanding of policies can be easily extended to policy combinators. Additionally, the tools that Margrave has for supporting policies can be leveraged as the Margrave language and analysis tool grow to provide fuller support for policy combination and rule conflict resolution declarations.
5

Metin, Mehmet Ozer. "Creating Application Security Layer Based On Resource Access Decision Service." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Different solutions have been used for each security aspects (access control, application security) to secure enterprise web applications. However combining "
enterprise-level"
and "
application-level"
security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring together access controlling with application-level security. Removing discrimination between enterprise-level and application-level security policies improves manageability, reusability and scalability of whole system. Resource Access Decision (RAD) specification has been implemented and used as authentication mechanism for this layer. RAD service not only provides encapsulating domain specific factors to give access decisions but also can form a solid base to apply positive and negative security model to secure enterprise web applications. Proposed solution has been used in a real life system and test results have been presented.
6

Pacheco, Páramo Diego Felipe. "Performance analysis of access control and resource management methods in heterogeneous networks." Doctoral thesis, Editorial Universitat Politècnica de València, 2014. http://hdl.handle.net/10251/34782.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
El escenario actual de las redes móviles se caracteriza por la creciente demanda de los usuarios por los servicios de datos, circunstancia que se ha visto potenciada por la popularidad de los teléfonos inteligentes y el auge de aplicaciones que necesitan de una conexión permanente a internet, como aquellas que hacen uso de recursos "en la nube" o los servicios de streaming para vídeo. El consumo de datos crece exponencialmente, tanto para los países desarrollados como en los países en desarrollo, y esto ha llevado a los operadores a plantearse soluciones que permitan proveer dichas condiciones de acceso. Las redes heterogéneas se caracterizan por utilizar diferentes tecnologías de una manera coherente y organizada para proveer a los usuarios con la calidad de servicio requerida en sus comunicaciones, de tal manera que la comunicación sea para estos "transparente". Dicha heterogeneidad se puede dar a nivel de acceso, con la coexistencia de tecnologías como 802.11, WiMAX y redes móviles en sus diferentes generaciones, o incluso a nivel de capas dentro de las redes móviles con la coexistencia de macro, micro, pico y femto celdas. Haciendo un uso organizado de estos múltiples recursos, es posible optimizar las prestaciones de la red y proveer a los usuarios con una mejor calidad de servicio. Pero la posibilidad de mejorar las prestaciones de la red no se da sólo por el uso simultáneo de estas tecnologías de acceso. Para mejorar la eficiencia en el uso del espectro electromagnético, un recurso limitado y subutilizado según diferentes estudios, se propuso la tecnología de cognitive radio. Por medio de esta tecnología es posible que un usuario sea capaz de medir el instante en el que una parte del espectro electromagnético no esta siendo utilizado para enviar información, siempre evitando interferir en las comunicaciones de aquellos usuarios que usan dicho espectro regularmente. En el presente trabajo se proveen diferentes soluciones dentro del contexto de las redes heterogéneas que buscan optimizar el uso de los recursos disponibles en la red para proveer a los usuarios con la calidad de servicio esperada, ya sea por medio del control de acceso o la gestión de recursos. Por un lado se estudia el efecto que la reserva de canales para realizar handoff espectral tiene sobre las prestaciones para los usuarios secundarios en un sistema de cognitive radio. Por otro lado se estudian políticas de acceso para una red en la que dos tecnologías de acceso están disponibles: TDMA y WCDMA, y los usuarios tienen acceso a los servicios de voz y datos. Por otro lado
Performance requirements on mobile networks are tighter than ever as a result of the adoption of mobile devices such as smartphones or tablets, and the QoS levels that mobile applications demand for their correct operation. The data traffic volume carried in mobile networks for 2012 is the same as the total internet traffic in 2000, and this exponential growth tendency will continue in years to come. In order to fulfill users¿ expectations, it is imperative for mobile networks to make the best use of the available resources. Heterogeneous networks (Hetnets) have the ability to integrate several technologies in a coherent and efficient manner in order to enhance users¿ experience. The first challenge of heterogeneous networks is to integrate several radio access technologies, which exist as a result of simultaneous technology developments and a paced replacement of legacy technology. A joint management of several RAT¿s enhances network¿s efficiency, and this influences user¿s experience. Another challenge of heterogeneous networks is the improvement of current macrocells through an efficient use of the electromagnetic spectrum. Some approaches aim to optimize the antennas or use higher-order modulation techniques, but a more disruptive approach is the use of dynamic spectrum techniques through a technology known as cognitive radio. Finally, heterogeneous networks should be able to integrate several layers. In addition to the well studied micro and pico cells, a new generation of cheaper and easily configurable small cell networks have been proposed. However, its success is attached to its ability to adapt to the current context of mobile networks.
Pacheco Páramo, DF. (2013). Performance analysis of access control and resource management methods in heterogeneous networks [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/34782
Alfresco
7

Abdallah, AbouSheaisha Abdallah Sabry. "Cross-layer Control for Adaptive Video Streaming over Wireless Access Networks." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/78844.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Over the last decade, the wide deployment of wireless access technologies (e.g. WiFi, 3G, and LTE) and the remarkable growth in the volume of streaming video content have significantly altered the telecommunications field. These developments introduce new challenges to the research community including the need to develop new solutions (e.g. traffic models and transport protocols) to address changing traffic patterns and the characteristics of wireless links and the need for new evaluation methods that generate higher fidelity results under more realistic scenarios. Unfortunately, for the last two decades, simulation studies have been the main tool for researchers in wireless networks. In spite of the advantages of simulation studies, overall they have had a negative influence on the credibility of published results. In partial response to this simulation crisis, the research community has adopted testing and evaluation using implementation-based experiments. Implementation-based experiments include field experiments, prototypes, emulations, and testbeds. An example of an implementation-based experiment is the MANIAC Challenge, a wireless networking competition that we designed and hosted, which included creation and operation of ad hoc networks using commodity hardware. However, the lack of software tools to facilitate these sorts of experiments has created new challenges. Currently, researchers must practice kernel programming in order to implement networking experiments, and there is an urgent need to lower the barriers of entry to wireless network experimentation. With respect to the growth in video traffic over wireless networks, the main challenge is a mismatch between the design concepts of current internet protocols (e.g. the Transport Control Protocol (TCP)) and the reality of modern wireless networks and streaming video techniques. Internet protocols were designed to be deployed over wired networks and often perform poorly over wireless links; video encoding is highly loss tolerant and delay-constrained and yet, for reasons of expedience is carried using protocols that emphasize reliable delivery at the cost of potentially high delay. This dissertation addresses the lack of software tools to support implementation-based networking experiments and the need to improve the performance of video streaming over wireless access networks. We propose a new software tool that allows researchers to implement experiments without a need to become kernel programmers. The new tool, called the Flexible Internetwork Stack (FINS) Framework, is available under an open source license. With our tool, researchers can implement new network layers, protocols, and algorithms, and redesign the interconnections between the protocols. It offers logging and monitoring capabilities as well as dynamic reconfigurability of the modules' attributes and interconnections during runtime. We present details regarding the architecture, design, and implementation of the FINS Framework and provide an assessment of the framework including both qualitative and quantitative comparison with significant previous tools. We also address the problem of HTTP-based adaptive video streaming (HAVS) over WiFi access networks. We focus on the negative influence of wireless last-hop connections on network utilization and the end-user quality of experience (QoE). We use a cross-layer approach to design three controllers. The first and second controllers adopt a heuristic cross-layer design, while the third controller formulates the HAVS problem as a Markov decision process (MDP). By solving the model using reinforcement learning, we achieved 20% performance improvement (after enough training) with respect to the performance of the best heuristic controller under unstable channel conditions. Our simulation results are backed by a system prototype using the FINS Framework. Although it may seem predictable to achieve more gain in performance and in QoE by using cross-layer design, this dissertation not only presents a new technique that improves performance, but also suggests that it is time to move cross-layer and machine-learning-based approaches from the research field to actual deployment. It is time to move cognitive network techniques from the simulation environment to real world implementations.
Ph. D.
8

Cowley, Stephen. "OH&S in small business : influencing the decision makers : the application of a social marketing model to increase the uptake of OHS risk control." University of Ballarat, 2006. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14590.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Losses resulting from traumatic injuries and occupational disease are prevalent in the small business sector of Australian industry. Although the true size of the problem is unclear, it is estimated that the losses amount to more than $8 billion annually. The hazard control measures to counter these losses are largely known and are available to small businesses but they are not widely adopted. Regulators and other bodies have employed a range of intervention strategies to influence decision-makers in small businesses but most have focussed on the dissemination of printed materials or broadbased advertising campaigns with limited success......... The research concludes that the listening processes at the heart of social marketing add to the methods already used in the OHS discipline by forcing the marketer to listen to the subjective assessment of risk as perceived by targets as well as to question the evidence base that supports the legitimacy and efficacy of the proposed intervention. The TTM was found to be a useful means of categorising small business decision-maker behaviour and assessing the readiness for change of individuals and therefore the messages that are needed to unfreeze behaviour. The TTM also provides a tool for evaluation of the impact of an intervention.As a result of this research it is suggested that opinion leaders, who are employed within a social marketing model to diffuse information, multiply the effort of those wishing to increase the adoption of an innovation. Thus engagement of opinion leaders by an OHS authority for the communication of risk control messages may be more cost-effective than attempting to visit every workplace within an industry group. Thus, although social marketing is not in the general repertoire of OHS interventions, it appears to be extremely useful as a framework for interventions and, when used in concert with a stages of change model, provides natural lead indicators for evaluating the impact of OHS interventions. Application of social marketing to people who have the responsibility for the health and safety of others was unique.
Doctor of Philosphy
9

Ngo, Minh Hanh. "Cross-layer adaptive transmission scheduling in wireless networks." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/432.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A new promising approach for wireless network optimization is from a cross-layer perspective. This thesis focuses on exploiting channel state information (CSI) from the physical layer for optimal transmission scheduling at the medium access control (MAC) layer. The first part of the thesis considers exploiting CSI via a distributed channel-aware MAC protocol. The MAC protocol is analysed using a centralized design approach and a non-cooperative game theoretic approach. Structural results are obtained and provably convergent stochastic approximation algorithms that can estimate the optimal transmission policies are proposed. Especially, in the game theoretic MAC formulation, it is proved that the best response transmission policies are threshold in the channel state and there exists a Nash equilibrium at which every user deploys a threshold transmission policy. This threshold result leads to a particularly efficient stochastic-approximation-based adaptive learning algorithm and a simple distributed implementation of the MAC protocol. Simulations show that the channel-aware MAC protocols result in system throughputs that increase with the number of users. The thesis also considers opportunistic transmission scheduling from the perspective of a single user using Markov Decision Process (MDP) approaches. Both channel state in-formation and channel memory are exploited for opportunistic transmission. First, a finite horizon MDP transmission scheduling problem is considered. The finite horizon formulation is suitable for short-term delay constraints. It is proved for the finite horizon opportunistic transmission scheduling problem that the optimal transmission policy is threshold in the buffer occupancy state and the transmission time. This two-dimensional threshold structure substantially reduces the computational complexity required to compute and implement the optimal policy. Second, the opportunistic transmission scheduling problem is formulated as an infinite horizon average cost MDP with a constraint on the average waiting cost. An advantage of the infinite horizon formulation is that the optimal policy is stationary. Using the Lagrange dynamic programming theory and the super modularity method, it is proved that the stationary optimal transmission scheduling policy is a randomized mixture of two policies that are threshold in the buffer occupancy state. A stochastic approximation algorithm and a Q-learning based algorithm that can adaptively estimate the optimal transmission scheduling policies are then proposed.
10

Friend, Daniel. "Cognitive Networks: Foundations to Applications." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/26449.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Fueled by the rapid advancement in digital and wireless technologies, the ever-increasing capabilities of wireless devices have placed upon us a tremendous challenge - how to put all of this capability to effective use. Individually, wireless devices have outpaced the ability of users to optimally configure them. Collectively, the complexity is far more daunting. Research in cognitive networks seeks to provide a solution to the diffculty of effectively using the expanding capabilities of wireless networks by embedding greater degrees of intelligence within the network itself. In this dissertation, we address some fundamental questions related to cognitive networks, such as "What is a cognitive network?" and "What methods may be used to design a cognitive network?" We relate cognitive networks to a common artificial intelligence (AI) framework, the multi-agent system (MAS). We also discuss the key elements of learning and reasoning, with the ability to learn being the primary differentiator for a cognitive network. Having discussed some of the fundamentals, we proceed to further illustrate the cognitive networking principle by applying it to two problems: multichannel topology control for dynamic spectrum access (DSA) and routing in a mobile ad hoc network (MANET). The multichannel topology control problem involves confguring secondary network parameters to minimize the probability that the secondary network will cause an outage to a primary user in the future. This requires the secondary network to estimate an outage potential map, essentially a spatial map of predicted primary user density, which must be learned using prior observations of spectral occupancy made by secondary nodes. Due to the complexity of the objective function, we provide a suboptimal heuristic and compare its performance against heuristics targeting power-based and interference-based topology control objectives. We also develop a genetic algorithm to provide reference solutions since obtaining optimal solutions is impractical. We show how our approach to this problem qualifies as a cognitive network. In presenting our second application, we address the role of network state observations in cognitive networking. Essentially, we need a way to quantify how much information is needed regarding the state of the network to achieve a desired level of performance. This question is applicable to networking in general, but becomes increasingly important in the cognitive network context because of the potential volume of information that may be desired for decision-making. In this case, the application is routing in MANETs. Current MANET routing protocols are largely adapted from routing algorithms developed for wired networks. Although optimal routing in wired networks is grounded in dynamic programming, the critical assumption, static link costs and states, that enables the use of dynamic programming for wired networks need not apply to MANETs. We present a link-level model of a MANET, which models the network as a stochastically varying graph that possesses the Markov property. We present the Markov decision process as the appropriate framework for computing optimal routing policies for such networks. We then proceed to analyze the relationship between optimal policy and link state information as a function of minimum distance from the forwarding node. The applications that we focus on are quite different, both in their models as well as their objectives. This difference is intentional and signficant because it disassociates the technology, i.e. cognitive networks, from the application of the technology. As a consequence, the versatility of the cognitive networks concept is demonstrated. Simultaneously, we are able to address two open problems and provide useful results, as well as new perspective, on both multichannel topology control and MANET routing. This material is posted here with permission from the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Virginia Tech library's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this material, you agree to all provisions of the copyright laws protecting it.
Ph. D.

Книги з теми "Access control decisions":

1

Mollmann, Marianne. Decisions denied: Women's access to contraceptives and abortion in Argentina. [New York: Human Rights Watch, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kumar, Niraj. Bharat's treatise on Right to Information Act, 2005: Containing a detailed commentary on the statutory provisions, practices world over, state rules, international conventions & declarations, Supreme Court, high courts, CIC and international decisions, it also provides sample questions and specimen forms. New Delhi: Bharat Law House, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Office, General Accounting. Information requests: Department of Justice's response to requests for court tax decisions : fact sheet for the chairman, Subcommittee on Government Information, Justice, and Agriculture, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Right to repair: Industry decisions and legislative options : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, November 10, 2005. Washington: U.S. G.P.O., 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Halpin, Stanley M. The Army Command and Control Evaluation System (ACCES). Alexandria, Va: U.S. Army Research Institute for the Behavioral and Social Sciences, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Gallardo, Perla Gómez. El IFAI y la calidad jurídica de sus decisiones. México, D.F: Libertad de Información-México, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Fineberg, Richard A. The 1985 TAPS settlement: A case study in the effects of confidentiality on information available to decision makers in oil and gas revenue disputes, supplemental report. [Alaska: The Legislature, 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

European Court of Human Rights. Affaire Gaskin: 1. Décision du 23 février 1989 (dessaisissement) : 2. Arrêt du 7 juillet 1989 = : Gaskin case : 1. Decision of 23 February 1989 (relinquishment of jurisdiction) : 2. Judgment of 7 July 1989. Strasbourg: Registry of the Court, Council of Europe, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Potts, John T. Non-heart-beating organ transplantation: Medical and ethical issues in procurement. Washington, D.C: National Academy Press, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sundstrom, Beth L., and Cara Delay. Birth Control. Oxford University Press, 2020. http://dx.doi.org/10.1093/wentk/9780190069674.001.0001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Birth control offers women the opportunity to prevent pregnancy, plan and space their births, or have no births at all. And yet, in the United States, half of all pregnancies remain unintended, and access to birth control is beset by inequities in education, access, and coverage. Research indicates that women are familiar with the range of contraceptive methods available today. But the persistently high rates of unintended pregnancy, combined with common dissatisfaction and discontinuation, suggest that women’s contraceptive needs continue to be unmet. Birth Control: What Everyone Needs to Know will offer more than a user’s guide to available means of contraception: it will examine how supported family-planning infrastructure impacts society as a whole. Through reviews of policy, scientific literature, and supplemental interviews with women, it will uncover women’s concerns and apprehensions about contraception, as well as the ways birth control empowers women and increases access to educational and professional opportunities. It will provide an overview the history of birth control, the risks and benefits of contraception, the role of menstruation, and the future of birth control. The goal of this book is to provide accurate, unbiased scientific information about contraception in the context of women’s lived experiences and the realities of how individuals make decisions about birth control.

Частини книг з теми "Access control decisions":

1

Aura, Tuomas. "Fast access control decisions from delegation certificate databases." In Information Security and Privacy, 284–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053741.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Villar, Feliciano, Rodrigo Serrat, Annette Bilfeldt, and Joe Larragy. "Older People in Long-Term Care Institutions: A Case of Multidimensional Social Exclusion." In International Perspectives on Aging, 297–309. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-51406-8_23.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractLiving in a long-term care (LTC) institution provides older people experiencing health and social problems with a comprehensive range of support services that address their quality of life. Despite access to such services, challenges arise in relation to their participation in key activities both within and outside the institution. This chapter examines such challenges, reviewing and describing ways to prevent exclusion along various domains, specifically social relationships, civic participation and socio-cultural life. Firstly, we discuss ways in which bio-medical models of care and the quality control systems, which are dominant in LTC services, standardise care, tending to put decisions exclusively in hands of staff, taking away residents’ autonomy, and ultimately curtailing rights and citizenship status. Secondly, we examine how LTC services might prevent such exclusion and promote older people’s participation in at least four respects: (1) prompting and supporting residents’ ability to take decisions on their own care, (2) favouring the maintenance and creation of social relationships, (3) enabling residents’ participation in the activities and management of the institution, and (4) guaranteeing residents’ rights and full access to citizenship. We discuss the impact and limitations of recent initiatives put into practice in these areas of practice.
3

Pretzsch, Sebastian, Holger Drees, and Lutz Rittershaus. "Mobility Data Space." In Designing Data Spaces, 343–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractTo successfully support decision-making or even automatically make decisions of their own, intelligent transport and mobility systems require large amounts of data. Although multitudes of mobility data are already being collected today, the comprehensive processing and exploitation of this data have often been impossible due to technical, legal, or economic reasons. With Mobility Data Space, an open data space is now being created which offers access to real-time traffic data and sensitive mobility data beyond their secure exchange and which links existing data platforms to each other. In the future, it will thus be possible to provide comprehensive mobility data on a national level.Based on a decentralized system architecture developed by the International Data Spaces Association e. V., the Mobility Data Space offers an ecosystem in which data providers can specify and control the conditions under which their data can be used by third parties. This approach creates data sovereignty as well as trust, and data users can be sure about data origin and quality. By integrating data from the public and private sector via regional and national platforms, the Mobility Data Space will become a digital distribution channel for data-driven business models, providing entirely new options of data acquisition, linking, and exploitation.Whether data provider, user, developer, or end user—the Mobility Data Space takes all acting parties into consideration and offers: Data sovereignty and security along the value chain Standardized access to data from both public and private sources Space for the emergence of new business models, distribution channels and services, as well as a larger selection of innovative mobility services and applications
4

Garg, Sakshi, Deepti Mehrotra, and Shalini Bhartiya. "Dynamic Access Control Solution for Cross-Tenancy in a Cloud Environment." In Studies in Systems, Decision and Control, 111–29. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4996-4_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ardagna, Claudio Agostino, Sabrina De Capitani di Vimercati, Eros Pedrini, and Pierangela Samarati. "Privacy-Aware Access Control System: Evaluation and Decision." In Digital Privacy, 377–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Enache, Rodica Gabriela, Mariana Floricica Călin, and Enache Tușa. "Necessities and Expectations in Regard to Dobrudja’s Rural Youth Access to Higher Education." In Studies in Systems, Decision and Control, 135–53. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30659-5_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kimbahune, Vinod V., Parikshit N. Mahalle, Shafi K. Pathan, and Shaik Naser. "Distributed Access Control Scheme for Machine-to-Machine Communication in IoT Using Trust Factor." In Studies in Systems, Decision and Control, 131–44. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4996-4_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Kayes, A. S. M., Wenny Rahayu, Tharam Dillon, Syed Mahbub, Eric Pardede, and Elizabeth Chang. "Dynamic Transitions of States for Context-Sensitive Access Control Decision." In Web Information Systems Engineering – WISE 2018, 127–42. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02922-7_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ardagna, Claudio A., Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, and Pierangela Samarati. "The Architecture of a Privacy-Aware Access Control Decision Component." In Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, 1–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11741060_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

You, Mingshan, Jiao Yin, Hua Wang, Jinli Cao, and Yuan Miao. "A Minority Class Boosted Framework for Adaptive Access Control Decision-Making." In Web Information Systems Engineering – WISE 2021, 143–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90888-1_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Access control decisions":

1

Morisset, Charles, and Nicola Zannone. "Reduction of access control decisions." In the 19th ACM symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2613087.2613106.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lachmund, Sven, Thomas Walter, Laurent Gomez, Laurent Bussard, and Eddy Olk. "Context-Aware Access Control; Making Access Control Decisions Based on Context Information." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340450.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lachmund, Sven, Thomas Walter, Laurent Gomez, Laurent Bussard, and Eddy Olk. "Context-Aware Access Control Making Access Control Decisions Based on Context Information." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361782.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ni, Qun, Elisa Bertino, and Jorge Lobo. "D-algebra for composing access control policy decisions." In the 4th International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533097.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mateeva, Zhivka. "JUDICIAL CONTROL OF DECISIONS AND REFUSALS TO GRANT ACCESS TO PUBLIC INFORMATION." In 15 YEARS OF ADMINISTRATIVE JUSTICE IN BULGARIA - PROBLEMS AND PERSPECTIVES. University publishing house "Science and Economics", University of Economics - Varna, 2022. http://dx.doi.org/10.36997/ppdd2022.140.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The right to appeal against decisions and refusals to grant access to public information in court is the only effective means of protecting citizens provided for in the Access to Public Information Act (APIA). The purpose of this presentation is to analyze the right to judicial protection against decisions and refusals to grant access to public information by clarifying the court proceedings before the relevant administrative court, emphasizing its importance regarding the application of the legislation on access to information.
6

Gupta, Aditi, Markus Miettinen, and N. Asokan. "Using context-profiling to aid access control decisions in mobile devices." In 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 2011. http://dx.doi.org/10.1109/percomw.2011.5766891.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Al Lail, Mustafa. "Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions." In SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3450569.3464395.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Misra, Gaurav, Jose M. Such, and Hamed Balogun. "Non-sharing communities? An empirical study of community detection for access control decisions." In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2016. http://dx.doi.org/10.1109/asonam.2016.7752212.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Harbach, Marian, Sascha Fahl, Michael Brenner, Thomas Muders, and Matthew Smith. "Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions." In 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. http://dx.doi.org/10.1109/pst.2012.6297915.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Da Silva, Carlos Eduardo, Welkson De Medeiros, and Silvio Sampaio. "PEP4Django A Policy Enforcement Point for Python Web Applications." In IX Workshop de Gestão de Identidades Digitais. Sociedade Brasileira da Computação, 2019. http://dx.doi.org/10.5753/wgid.2019.14021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Traditionally, access control mechanisms have been hard-coded into application components. Such approach is error-prone, mixing business logic with access control concerns, and affecting the flexibility of security policies, as is the case with IFRN SUAP Django-based system. The externalization of access control rules allows their decoupling from business logic, through the use of authorization servers where access control policies are stored and queried for computing access decisions. In this context, this paper presents an approach that allows a Django Web application to delegate access control decisions to an external authorization server. The approach has been integrated into an enterprise level system, which has been used for experimentation. The results obtained indicate a negligible overhead, while allowing the modification of access control policies without interrupting the system.

Звіти організацій з теми "Access control decisions":

1

Dopfer, Jaqui. Öffentlichkeitsbeteiligung bei diskursiven Konfliktlösungsverfahren auf regionaler Ebene. Potentielle Ansätze zur Nutzung von Risikokommunikation im Rahmen von e-Government. Sonderforschungsgruppe Institutionenanalyse, 2003. http://dx.doi.org/10.46850/sofia.3933795605.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Whereas at the end of the 20th century there were still high expectations associated with the use of new media in terms of a democratisation of social discourse and new potential for citizens to participate in political decision-making, disillusionment is now spreading. Even today, the internet is often seen only as a technical tool for the transmission of information and communication, which serves as a structural supplement to "real" discourse and decision-making processes. In fact, however, the use of new media can open up additional, previously non-existent possibilities for well-founded and substantial citizen participation, especially at regional and supra-regional level. According to the results of this study, the informal, mediative procedures for conflict resolution in the context of high-risk planning decisions, which are now also increasingly used at the regional level, have two main problem areas. Firstly, in the conception and design chosen so far, they do not offer citizens direct access to the procedure. Citizens are given almost no opportunities to exert substantial influence on the content and procedure of the process, or on the solutions found in the process. So far, this has not been remedied by the use of new media. On the other hand, it is becoming apparent that the results negotiated in the procedure are not, or only inadequately, reflected in the subsequent sovereign decision. This means that not only valuable resources for identifying the problem situation and for integrative problem-solving remain unused, but it is also not possible to realise the effects anticipated with the participation procedures within the framework of context or reflexive self-management. With the aim of advancing the development of institutionally oriented approaches at the practice level, this study discusses potential solutions at the procedural level. This takes into account legal implications as well as the action logics, motives and intentions of the actors involved and aims to improve e-government structures. It becomes evident that opening up informal participation procedures for citizen participation at the regional level can only be realised through the (targeted) use of new media. However, this requires a fundamentally new approach not only in the participation procedures carried out but also, for example, in the conception of information or communication offerings. Opportunities for improving the use of the results obtained from the informal procedures in the (sovereign) decision-making process as well as the development of potentials in the sense of stronger self-control of social subsystems are identified in a stronger interlinking of informal and sovereign procedures. The prerequisite for this is not only the establishment of suitable structures, but above all the willingness of decision-makers to allow citizens to participate in decision-making, as well as the granting of participation opportunities and rights that go beyond those previously granted in sovereign procedures.
2

Wong, Xaria, and Iulia Andreea Toma. Gender and Protection Analysis: Juba, Rumbek and Pibor, South Sudan. Oxfam, May 2022. http://dx.doi.org/10.21201/2022.8946.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This research was conducted to analyse the distinct gender needs and protection concerns of women, girls, men and boys in order to inform the implementation by Oxfam and its partners of the Sida-funded project, ‘Building resilience through gender- and conflict-sensitive approaches to education, skills development, and sustainable livelihoods in South Sudan’. It explores the gendered power relations between women, girls, men and boys, with a focus on the differences in their roles and responsibilities, decision-making power and access to and control over resources. It draws attention to the limited decision-making power held by women and girls, their specific needs, and the rights denials they face pertaining to education and livelihoods in Juba, Rumbek and Pibor. It provides practical recommendations to meaningfully address gender inequalities during project implementation, but is also intended to be used by the broader humanitarian community working in South Sudan to better inform humanitarian design, programming and response.
3

Zambrano, Omar, Hugo Hernández, Ricardo Benzecry, and José Gregorio Gómez. Efectos locales de los booms petroleros sobre la acumulación de capital humano: el caso de “la apertura petrolera” de Venezuela en los años noventa. Banco Interamericano de Desarrollo, November 2022. http://dx.doi.org/10.18235/0004526.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
La presente investigación explora los impactos que tuvo la Apertura Petrolera, una política sectorial que otorgó acceso masivo a la participación del sector privado en la industria petrolera venezolana durante la década de 1990, sobre las decisiones de acumulación de capital humano a nivel municipal en Venezuela. Nuestra estrategia de estimación causal explota una base de datos construida para esta investigación co la localización espacial de las inversiones petroleras de los años 90s, datos censales para 1990 y 2001 y estimaciones de pequeña escala de las condiciones socioeconómicas locales antes y después de La Apertura, sobre un marco de estimación de efectos que utiliza diferencias-en-diferencias. Esta investigación encuentra un efecto positivo de la exposición a las inversiones producto del proceso de apertura sobre la acumulación de capital humano: las personas que habitan en los municipios beneficiarios acumularon más años de escolaridad formal y tienen una mayor probabilidad de cursar estudios superiores que las de los municipios de control. Adicionalmente, los resultados sugieren un efecto positivo (disminución) sobre la pobreza por ingresos. Estos hallazgos son robustos a diferentes especificaciones y se mantienen al realizar las estimaciones a nivel individual o por agregados municipales.
4

Bourrier, Mathilde, Michael Deml, and Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, November 2022. http://dx.doi.org/10.31265/usps.254.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The purpose of this report is to compare the risk communication strategies and public health mitigation measures implemented by Germany, Norway, Sweden, Switzerland, and the United Kingdom (UK) in 2020 in response to the COVID-19 pandemic based on publicly available documents. The report compares the country responses both in relation to one another and to the recommendations and guidance of the World Health Organization where available. The comparative report is an output of Work Package 1 from the research project PAN-FIGHT (Fighting pandemics with enhanced risk communication: Messages, compliance and vulnerability during the COVID-19 outbreak), which is financially supported by the Norwegian Research Council's extraordinary programme for corona research. PAN-FIGHT adopts a comparative approach which follows a “most different systems” variation as a logic of comparison guiding the research (Przeworski & Teune, 1970). The countries in this study include two EU member States (Sweden, Germany), one which was engaged in an exit process from the EU membership (the UK), and two non-European Union states, but both members of the European Free Trade Association (EFTA): Norway and Switzerland. Furthermore, Germany and Switzerland govern by the Continental European Federal administrative model, with a relatively weak central bureaucracy and strong subnational, decentralised institutions. Norway and Sweden adhere to the Scandinavian model—a unitary but fairly decentralised system with power bestowed to the local authorities. The United Kingdom applies the Anglo-Saxon model, characterized by New Public Management (NPM) and decentralised managerial practices (Einhorn & Logue, 2003; Kuhlmann & Wollmann, 2014; Petridou et al., 2019). In total, PAN-FIGHT is comprised of 5 Work Packages (WPs), which are research-, recommendation-, and practice-oriented. The WPs seek to respond to the following research questions and accomplish the following: WP1: What are the characteristics of governmental and public health authorities’ risk communication strategies in five European countries, both in comparison to each other and in relation to the official strategies proposed by WHO? WP2: To what extent and how does the general public’s understanding, induced by national risk communication, vary across five countries, in relation to factors such as social capital, age, gender, socio-economic status and household composition? WP3: Based on data generated in WP1 and WP2, what is the significance of being male or female in terms of individual susceptibility to risk communication and subsequent vulnerability during the COVID-19 outbreak? WP4: Based on insight and knowledge generated in WPs 1 and 2, what recommendations can we offer national and local governments and health institutions on enhancing their risk communication strategies to curb pandemic outbreaks? WP5: Enhance health risk communication strategies across five European countries based upon the knowledge and recommendations generated by WPs 1-4. Pre-pandemic preparedness characteristics All five countries had pandemic plans developed prior to 2020, which generally were specific to influenza pandemics but not to coronaviruses. All plans had been updated following the H1N1 pandemic (2009-2010). During the SARS (2003) and MERS (2012) outbreaks, both of which are coronaviruses, all five countries experienced few cases, with notably smaller impacts than the H1N1 epidemic (2009-2010). The UK had conducted several exercises (Exercise Cygnet in 2016, Exercise Cygnus in 2016, and Exercise Iris in 2018) to check their preparedness plans; the reports from these exercises concluded that there were gaps in preparedness for epidemic outbreaks. Germany also simulated an influenza pandemic exercise in 2007 called LÜKEX 07, to train cross-state and cross-department crisis management (Bundesanstalt Technisches Hilfswerk, 2007). In 2017 within the context of the G20, Germany ran a health emergency simulation exercise with WHO and World Bank representatives to prepare for potential future pandemics (Federal Ministry of Health et al., 2017). Prior to COVID-19, only the UK had expert groups, notably the Scientific Advisory Group for Emergencies (SAGE), that was tasked with providing advice during emergencies. It had been used in previous emergency events (not exclusively limited to health). In contrast, none of the other countries had a similar expert advisory group in place prior to the pandemic. COVID-19 waves in 2020 All five countries experienced two waves of infection in 2020. The first wave occurred during the first half of the year and peaked after March 2020. The second wave arrived during the final quarter. Norway consistently had the lowest number of SARS-CoV-2 infections per million. Germany’s counts were neither the lowest nor the highest. Sweden, Switzerland and the UK alternated in having the highest numbers per million throughout 2020. Implementation of measures to control the spread of infection In Germany, Switzerland and the UK, health policy is the responsibility of regional states, (Länders, cantons and nations, respectively). However, there was a strong initial centralized response in all five countries to mitigate the spread of infection. Later on, country responses varied in the degree to which they were centralized or decentralized. Risk communication In all countries, a large variety of communication channels were used (press briefings, websites, social media, interviews). Digital communication channels were used extensively. Artificial intelligence was used, for example chatbots and decision support systems. Dashboards were used to provide access to and communicate data.

До бібліографії