A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Conflict Detection and Resolution in IoT Systems: A Survey
2022
IoT
We also highlight the significance of detecting/resolving conflicts proactively, i.e., dynamically but with a look-ahead into the future based on the context. ...
The collective operational behavior of multiple IoT subsystems can be characterized via (1) a set of operational rules and required safety properties and (2) a collection of IoT-based services or applications ...
Conflicts of Interest: The authors declare no conflicts of interest. ...
doi:10.3390/iot3010012
fatcat:2xobygknerbxbfal27vmghsbyy
Providing Ontology-Based Access Control for Cloud Data by Exploiting Subsumption Property among Domains of Access Control
2019
International Journal of Intelligent Engineering and Systems
Access control models in the current literature such as Discretionary Access control (DAC), Mandatory Access Control model (MAC), Role-Based Access Model (RBAC) or Attribute Access Control Model (ABAC) ...
The experimental results show that the number of rules to be stored in Policy Base is reduced and reasoning time is also considerably reduced because of applying subsumption property and hence access decision ...
Ciphertext-Policy Attribute-Based Encryption algorithm (CP-ABE), ontology-based attributes mapping, algebra-based policies integration, solutions for identification, access authorization and identity federation ...
doi:10.22266/ijies2019.0630.27
fatcat:3nznfxa3fbatjerasozewbadq4
VISCR: Intuitive Conflict-free Automation for Securing the Dynamic Consumer IoT Infrastructures
[article]
2019
arXiv
pre-print
In this paper, we introduce VISCR, a Vendor-Independent policy Specification and Conflict Resolution engine that enables conflict-free policy specification and enforcement in IoT environments. ...
, OpenHAB, IFTTT-based templates, and MUD-based profiles into a vendor-independent graph-based specification. ...
Examples of graphbased access control policies are shown in Figure 7b . ...
arXiv:1907.13288v1
fatcat:7idm4hiehfavniohlv5ymrzw3u
From Conventional to State-of-the-Art IoT Access Control Models
2020
Electronics
Access control refers to a process which can restrict user's access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. ...
We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics9101693
fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa
Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques
2011
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
In this overview article we discuss defining properties of insiders and insider threats. ...
Much of the interest in the US seems arguably derives from highly public and damaging national security incidents; Robert Hanssen (arrested in 2001) was an FBI insider who stole and sold secrets to the ...
Access Control Access control is a way of preventing insider attacks. ...
doi:10.22667/jowua.2011.03.31.004
dblp:journals/jowua/HunkerP11
fatcat:5iwopvcufndzrltdbub5a32lye
Challenges in Engineering Self-Adaptive Authorisation Infrastructures
[chapter]
2019
Engineering Adaptive Software Systems
The ultimate goal of self-adaptive authorisation is to reduce human intervention, make authorisation infrastructures more responsive to malicious behaviour, and manage access control in a more cost effective ...
In this paper, we scope and define the emerging area of self-adaptive authorisation by describing some of its developments, trends and challenges. ...
., dynamic access control) may select, from a pre-existing set of access control rules, a rule applicable for that time of day, using environmental attributes and the subject's access rights. ...
doi:10.1007/978-981-13-2185-6_3
fatcat:ex6tvfwbubhv7lqeg4kuyencmq
Social-Emotional Learning Program to Reduce Bullying, Fighting, and Victimization Among Middle School Students With Disabilities
2015
Remedial and special education
Efficacy of Bully Prevention Efforts Despite the number of school-based bully prevention programs in use, bullying prevention programs in the United States are producing modest effects (Ttofi & Farrington ...
between disability identification and placement of services exists. ...
doi:10.1177/0741932514564564
fatcat:bgjzizfh2vh47bojwrxzxbgin4
Beach management in Florida: Assessing stakeholder perceptions on governance
2014
Ocean and Coastal Management
control of coastal construction. ...
Stakeholders expressed complex opinions including a mixture of both satisfaction and dissatisfaction with management of beaches in the state. ...
Meenakshi Jerath and Morgan Wilson contributed to the final edits of the manuscript. Lauren Dame, Haiyun Yu, and Bryce Beard assisted with literature searches. ...
doi:10.1016/j.ocecoaman.2014.04.033
fatcat:pgque2mc7zgijo3tr2jtwd5ibi
Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking
2020
Future Internet
With over 83% of hospitals in the UK moving towards EPRs, access to this healthcare data needs to be monitored proactively for malicious activity. ...
In this paper, an investigation methodology is presented towards the identification of anomalous behaviours within EPR datasets. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/fi12060100
fatcat:lh46gbt5izbjvogmd5csoe4mz4
Machine Learning in Action: Examples
[chapter]
2015
Efficient Learning Machines
The knowledge base system gathers a collection of facts and processes them through an inference engine that uses rules and logic to deduce new facts or inconsistencies. ...
These examples demonstrate an intelligent feedback control system based on the principles of machine learning. ...
The ability to log resource attributes and behavioral patterns to aid in establishing a • rational reasoning process for future optimizations and conflict resolutions. ...
doi:10.1007/978-1-4302-5990-9_11
fatcat:mdmgulxgljginjs7jdwjdxg7qe
The interrelatedness of error prevention and error management
2023
Frontiers in Psychology
We study errors in organizations to understand and ideally prevent them from reoccurring. In this study we examine mistakes made as an oil company adopted new technology to access untapped reserves. ...
This is surprising given the complexity of the business and the importance of safety. ...
This may require quick responses in uncertain and unpredictable circumstances that could lead to failure. A strong foundation in error prevention can better prepare organizations for the unexpected. ...
doi:10.3389/fpsyg.2023.1032472
fatcat:vhjbk3rvi5chrenju6igfyflk4
Information technology and e-risk of supply chain management
English
2015
African Journal of Business Management
English
We know that technology is always a double-edged sword which can be reciprocally used for prevention of e-risks in SCM. ...
This growth of Information Technology in SCM has changed the paper based environment to Virtual Supply Chain, which is also generating electronic risks (e-risks) in form of cybercrime or fraud. ...
., 2009) .Fraud can be prevented in ERP system as role based access control, segregation of duties, username and passwords, etc. ...
doi:10.5897/ajbm2013.7308
fatcat:qgqthj53rrgvhouxvuez5axhky
Proactive control of implicit bias: A theoretical model and implications for behavior change
2018
Journal of Personality and Social Psychology
Based on these findings and past research, we present a model of proactive and reactive control that offers a novel and generative perspective on self-regulation and prejudice reduction. ...
Together, these results provide initial evidence for proactive control in social cognition and demonstrate its effectiveness at reducing expressions of implicit racial bias. ...
Hence, whereas racial cues typically create conflict with target processing in race priming tasks, the engagement of proactive control should be associated with a reduction in prejudice-based conflict, ...
doi:10.1037/pspi0000128
pmid:30024242
fatcat:7hnulekkijflnm55bcrrssvuvq
SPECIFIC PROCEDURES TO INCREASE EFFICIENCY OF THE DECISION-MAKING PROCESS IN THE CONTEXT OF THE VARIABLE GEOMETRY CONFLICT
2022
Bulletin of "Carol I" National Defence University
The risks and threats specific to the permanent geometry change of an action/operation in the context of the current multidimensional operational environment conflict are extremely diversified and undergo ...
This situation implicitly requires that the command-and-control systems architecture must allow rapid adaptation to the requirements imposed by the frequent situation changes, in the conflict specific ...
I believe that proactivity is main vector in managing the situations and challenges generated by conflict with variable geometry. ...
doi:10.53477/2284-9378-22-57
fatcat:6rbpykljmfbvdaqqxob6tg3vke
Improving the Maintenance of Railway Switches through Proactive Approach
2020
Electronics
This paper presents some tangible results, where the MANTIS concepts were applied to the use-case of railway switches to introduce continuous monitoring and proactive maintenance of the railroad tracks ...
models per season; and the visualization of the gathered data. ...
The REST API allows remote access to a subset of data stored in MIMOSA and enforces access control.
Figure 15 . 15 Figure 15. Human-Machine Interface (HMI) prototype architecture. ...
doi:10.3390/electronics9081260
fatcat:c35azrouybcbphubzkbyms44ie
« Previous
Showing results 1 — 15 out of 11,587 results