Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








11,587 Hits in 6.0 sec

Conflict Detection and Resolution in IoT Systems: A Survey

Pavana Pradeep, Krishna Kant
2022 IoT  
We also highlight the significance of detecting/resolving conflicts proactively, i.e., dynamically but with a look-ahead into the future based on the context.  ...  The collective operational behavior of multiple IoT subsystems can be characterized via (1) a set of operational rules and required safety properties and (2) a collection of IoT-based services or applications  ...  Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/iot3010012 fatcat:2xobygknerbxbfal27vmghsbyy

Providing Ontology-Based Access Control for Cloud Data by Exploiting Subsumption Property among Domains of Access Control

Auxilia Michael, Raja Kothandaraman, Kannan Kaliyan
2019 International Journal of Intelligent Engineering and Systems  
Access control models in the current literature such as Discretionary Access control (DAC), Mandatory Access Control model (MAC), Role-Based Access Model (RBAC) or Attribute Access Control Model (ABAC)  ...  The experimental results show that the number of rules to be stored in Policy Base is reduced and reasoning time is also considerably reduced because of applying subsumption property and hence access decision  ...  Ciphertext-Policy Attribute-Based Encryption algorithm (CP-ABE), ontology-based attributes mapping, algebra-based policies integration, solutions for identification, access authorization and identity federation  ... 
doi:10.22266/ijies2019.0630.27 fatcat:3nznfxa3fbatjerasozewbadq4

VISCR: Intuitive Conflict-free Automation for Securing the Dynamic Consumer IoT Infrastructures [article]

Vasudevan Nagendra, Arani Bhattacharya, Vinod Yegneswaran, Amir Rahmati, Samir R Das
2019 arXiv   pre-print
In this paper, we introduce VISCR, a Vendor-Independent policy Specification and Conflict Resolution engine that enables conflict-free policy specification and enforcement in IoT environments.  ...  , OpenHAB, IFTTT-based templates, and MUD-based profiles into a vendor-independent graph-based specification.  ...  Examples of graphbased access control policies are shown in Figure 7b .  ... 
arXiv:1907.13288v1 fatcat:7idm4hiehfavniohlv5ymrzw3u

From Conventional to State-of-the-Art IoT Access Control Models

Ahmad Kamran Malik, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammad A. Alqarni
2020 Electronics  
Access control refers to a process which can restrict user's access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others.  ...  We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics9101693 fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa

Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques

Jeffrey Hunker, Christian W. Probst
2011 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
In this overview article we discuss defining properties of insiders and insider threats.  ...  Much of the interest in the US seems arguably derives from highly public and damaging national security incidents; Robert Hanssen (arrested in 2001) was an FBI insider who stole and sold secrets to the  ...  Access Control Access control is a way of preventing insider attacks.  ... 
doi:10.22667/jowua.2011.03.31.004 dblp:journals/jowua/HunkerP11 fatcat:5iwopvcufndzrltdbub5a32lye

Challenges in Engineering Self-Adaptive Authorisation Infrastructures [chapter]

Lionel Montrieux, Rogério de Lemos, Chris Bailey
2019 Engineering Adaptive Software Systems  
The ultimate goal of self-adaptive authorisation is to reduce human intervention, make authorisation infrastructures more responsive to malicious behaviour, and manage access control in a more cost effective  ...  In this paper, we scope and define the emerging area of self-adaptive authorisation by describing some of its developments, trends and challenges.  ...  ., dynamic access control) may select, from a pre-existing set of access control rules, a rule applicable for that time of day, using environmental attributes and the subject's access rights.  ... 
doi:10.1007/978-981-13-2185-6_3 fatcat:ex6tvfwbubhv7lqeg4kuyencmq

Social-Emotional Learning Program to Reduce Bullying, Fighting, and Victimization Among Middle School Students With Disabilities

Dorothy L. Espelage, Chad A. Rose, Joshua R. Polanin
2015 Remedial and special education  
Efficacy of Bully Prevention Efforts Despite the number of school-based bully prevention programs in use, bullying prevention programs in the United States are producing modest effects (Ttofi & Farrington  ...  between disability identification and placement of services exists.  ... 
doi:10.1177/0741932514564564 fatcat:bgjzizfh2vh47bojwrxzxbgin4

Beach management in Florida: Assessing stakeholder perceptions on governance

Eduard Ariza, Kenyon C. Lindeman, Pallab Mozumder, Daniel O. Suman
2014 Ocean and Coastal Management  
control of coastal construction.  ...  Stakeholders expressed complex opinions including a mixture of both satisfaction and dissatisfaction with management of beaches in the state.  ...  Meenakshi Jerath and Morgan Wilson contributed to the final edits of the manuscript. Lauren Dame, Haiyun Yu, and Bryce Beard assisted with literature searches.  ... 
doi:10.1016/j.ocecoaman.2014.04.033 fatcat:pgque2mc7zgijo3tr2jtwd5ibi

Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking

William Hurst, Aaron Boddy, Madjid Merabti, Nathan Shone
2020 Future Internet  
With over 83% of hospitals in the UK moving towards EPRs, access to this healthcare data needs to be monitored proactively for malicious activity.  ...  In this paper, an investigation methodology is presented towards the identification of anomalous behaviours within EPR datasets.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi12060100 fatcat:lh46gbt5izbjvogmd5csoe4mz4

Machine Learning in Action: Examples [chapter]

Mariette Awad, Rahul Khanna
2015 Efficient Learning Machines  
The knowledge base system gathers a collection of facts and processes them through an inference engine that uses rules and logic to deduce new facts or inconsistencies.  ...  These examples demonstrate an intelligent feedback control system based on the principles of machine learning.  ...  The ability to log resource attributes and behavioral patterns to aid in establishing a • rational reasoning process for future optimizations and conflict resolutions.  ... 
doi:10.1007/978-1-4302-5990-9_11 fatcat:mdmgulxgljginjs7jdwjdxg7qe

The interrelatedness of error prevention and error management

Connie A. Van der Byl, Harrie Vredenburg
2023 Frontiers in Psychology  
We study errors in organizations to understand and ideally prevent them from reoccurring. In this study we examine mistakes made as an oil company adopted new technology to access untapped reserves.  ...  This is surprising given the complexity of the business and the importance of safety.  ...  This may require quick responses in uncertain and unpredictable circumstances that could lead to failure. A strong foundation in error prevention can better prepare organizations for the unexpected.  ... 
doi:10.3389/fpsyg.2023.1032472 fatcat:vhjbk3rvi5chrenju6igfyflk4

Information technology and e-risk of supply chain management
English

N Varma T, Khan D A
2015 African Journal of Business Management  
We know that technology is always a double-edged sword which can be reciprocally used for prevention of e-risks in SCM.  ...  This growth of Information Technology in SCM has changed the paper based environment to Virtual Supply Chain, which is also generating electronic risks (e-risks) in form of cybercrime or fraud.  ...  ., 2009) .Fraud can be prevented in ERP system as role based access control, segregation of duties, username and passwords, etc.  ... 
doi:10.5897/ajbm2013.7308 fatcat:qgqthj53rrgvhouxvuez5axhky

Proactive control of implicit bias: A theoretical model and implications for behavior change

David M. Amodio, Jillian K. Swencionis
2018 Journal of Personality and Social Psychology  
Based on these findings and past research, we present a model of proactive and reactive control that offers a novel and generative perspective on self-regulation and prejudice reduction.  ...  Together, these results provide initial evidence for proactive control in social cognition and demonstrate its effectiveness at reducing expressions of implicit racial bias.  ...  Hence, whereas racial cues typically create conflict with target processing in race priming tasks, the engagement of proactive control should be associated with a reduction in prejudice-based conflict,  ... 
doi:10.1037/pspi0000128 pmid:30024242 fatcat:7hnulekkijflnm55bcrrssvuvq

SPECIFIC PROCEDURES TO INCREASE EFFICIENCY OF THE DECISION-MAKING PROCESS IN THE CONTEXT OF THE VARIABLE GEOMETRY CONFLICT

Cezar POPA
2022 Bulletin of "Carol I" National Defence University  
The risks and threats specific to the permanent geometry change of an action/operation in the context of the current multidimensional operational environment conflict are extremely diversified and undergo  ...  This situation implicitly requires that the command-and-control systems architecture must allow rapid adaptation to the requirements imposed by the frequent situation changes, in the conflict specific  ...  I believe that proactivity is main vector in managing the situations and challenges generated by conflict with variable geometry.  ... 
doi:10.53477/2284-9378-22-57 fatcat:6rbpykljmfbvdaqqxob6tg3vke

Improving the Maintenance of Railway Switches through Proactive Approach

Gregor Papa, Špela Poklukar, Attila Frankó, Alberto Sillitti, Aleš Kancilija, Marjan Šterk, Csaba Hegedus, István Moldován, Pal Varga, Mario Riccardi, Salvatore Esposito
2020 Electronics  
This paper presents some tangible results, where the MANTIS concepts were applied to the use-case of railway switches to introduce continuous monitoring and proactive maintenance of the railroad tracks  ...  models per season; and the visualization of the gathered data.  ...  The REST API allows remote access to a subset of data stored in MIMOSA and enforces access control. Figure 15 . 15 Figure 15. Human-Machine Interface (HMI) prototype architecture.  ... 
doi:10.3390/electronics9081260 fatcat:c35azrouybcbphubzkbyms44ie
« Previous Showing results 1 — 15 out of 11,587 results