Добірка наукової літератури з теми "UCON MODEL"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "UCON MODEL".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "UCON MODEL"
Wu, Hai Ying. "Usage Control Model Based on Regular Grammar." Advanced Materials Research 433-440 (January 2012): 4590–96. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.4590.
Повний текст джерелаJiang, Ze Tao, and Jia Fei He. "Research on an UCON Extension Model Applicable to Industrial Control." Applied Mechanics and Materials 20-23 (January 2010): 470–76. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.470.
Повний текст джерелаGan, Sheng Ke, and Feng Bin Wang. "An Extended UCON Model Supporting Distributed Multidomain Applications." Advanced Materials Research 433-440 (January 2012): 5616–19. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5616.
Повний текст джерелаPark, Jaehong, and Ravi Sandhu. "The UCON ABC usage control model." ACM Transactions on Information and System Security 7, no. 1 (February 2004): 128–74. http://dx.doi.org/10.1145/984334.984339.
Повний текст джерелаXu, Xiao Lin. "Research on Task-Based Usage Control Core Models in Workflow for Manufacturing Environment." Advanced Materials Research 886 (January 2014): 378–81. http://dx.doi.org/10.4028/www.scientific.net/amr.886.378.
Повний текст джерелаTang, Jia. "Research on Design of Network Platform Based on UCON Access Control Model." Applied Mechanics and Materials 543-547 (March 2014): 4589–92. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4589.
Повний текст джерелаChang, He, Yang Lu, and Yantao Sun. "Simultaneous Prediction, Determination, and Extraction of Four Polycyclic Aromatic Hydrocarbons in the Environment Using a UCON–NaH2PO4 Aqueous Two-Phase Extraction System Combined with High-Performance Liquid Chromatography-Ultraviolet Detection." Molecules 27, no. 19 (September 30, 2022): 6465. http://dx.doi.org/10.3390/molecules27196465.
Повний текст джерелаDai, Chang Ying, Wen Tao Gong, and Jing Liu. "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML." Advanced Materials Research 143-144 (October 2010): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1275.
Повний текст джерелаLiu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.
Повний текст джерелаJASIM AL-FARTTOOSI, DAWOOD SALMAN. "Formal model and Policy specification for software defined networks." Journal of Kufa for Mathematics and Computer 3, no. 2 (December 30, 2016): 55–62. http://dx.doi.org/10.31642/jokmc/2018/030207.
Повний текст джерелаДисертації з теми "UCON MODEL"
Camy, Alexandre Rosa. "Aplicação do modelo UCON abc em sistemas de comércio eletrônico B2B." Florianópolis, SC, 2005. http://repositorio.ufsc.br/handle/123456789/102447.
Повний текст джерелаMade available in DSpace on 2013-07-16T00:58:32Z (GMT). No. of bitstreams: 1 220823.pdf: 1700842 bytes, checksum: 339544c3cbf00d6d06566d73e3518766 (MD5)
Recentemente foi proposto um modelo de controle de acesso, denominado UCONABC, que além de unir alguns dos principais conceitos de controle de acesso ainda propõe novos conceitos como: obrigações, condições, continuidade e mutabilidade. Apesar de abrangente, o UCONABC possui limitações e existem ainda muitas melhorias a serem pesquisadas, como por exemplo, a definição de uma forma adequada da aplicação deste modelo em Sistemas de Comércio Eletrônico (CE) Business-to-Business (B2B). Publicações científicas nesta área afirmam que são necessárias pesquisas na especificação, validação e execução de políticas de controle de acesso para sistemas B2B. Esta dissertação possui como principal contribuição científica a proposta de uma forma de aplicação do UCONABC em sistemas de CE B2B que interajam entre si. Além disso, é proposto o Agrupamento Implícito Parcial, uma técnica que facilita o gerenciamento de permissões neste tipo de sistema. A aplicabilidade da proposta desta dissertação é apresentada através de uma descrição detalhada da implementação de um sistema de CE B2B onde o controle de acesso segue as especificações desta proposta. Por fim, é apresentado um estudo de caso em que é possível visualizar, através de um exemplo do mundo real, a aplicação da proposta desta dissertação neste tipo de sistema.
Teigão, Rafael Coninck. "Controle de uso de recursos em sistemas operacionais utilizando o modelo UCON ABC / Rafael Coninck Teigão ; orientador, Carlos Maziero." reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2007. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=1417.
Повний текст джерелаBibliografia: p. 69-73
Esta dissertação discorre sobre as necessidades modernas de controle de utilização de recursos em sistemas operacionais multi-usuários, e apresenta uma proposta de projeto para a implementação do modelo de controle de uso UCONABC em um sistema operacional
This work addresses the modern needs of resource utilization control in multi-user operating systems, and presents a project proposal for implementing the UCONABC usage control model in a real operating system, by using a grammar specifically created for
Akram, Raja. "A user centric security model for tamper-resistant devices." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/aca52f8c-6233-4f73-a9da-025d25ab1295/1/.
Повний текст джерелаJOSHI, NIDHI. "AUGMENTATION IN UCON MODEL." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15219.
Повний текст джерелаLu, Po-Hung, and 呂柏鋐. "The Business Model of UCOM IT Training Center." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/7wyktv.
Повний текст джерела國立臺灣科技大學
資訊管理系
102
The Professional Technical Certification and Training Industry has been flourished for years in tandem with the advancement in information technology and knowledge transfer. Professional training centers have provided high quality and to-the-point expertise advices for their customers. Apparently, professional training centers not only speeds up their customers’ knowledge but also help their customers to acquire the professional certifications. SYSTEX Information - UCOM Training Centre has enjoyed its great success in the field of information technology professional trainings and has grabbed over 50 percent of Taiwan’s IT training market. To discuss the SYSTEX Information - UCOM Training Centre’s great achievement, several theories have been employed such as resource-based view, modularity, proactive strategy, and the concept of organizational ambidexterity. The case suggests that the case company develops several unique resources such as company’s customer relations, brand resources and environmental resources; through the modularity of its core competences, the case company has enhanced its resource utilization. Also, the proactive management and organizational ambidexterity has enabled the firm to agile adapt to market needs.
WANG, SHIH-YA, and 王詩亞. "A Study on Latent Growth Model of UCAN Common Competency Self-Evaluation─A Case of M University." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3ktwdj.
Повний текст джерела銘傳大學
應用統計與資料科學學系碩士班
106
In recent years, influenced by the higher education policy universalization, teachers, curriculum and teaching, etc, all have significant changes, institutions of higher education is also increased dramatically, but along with the popularization of higher education, made higher education because of oversupply, and cause a college degree value, lead to college students after graduation, can't seem to put this to use, the unemployed college grads are still much higher than the rest of the education in socioeconomic status. The purpose of this study is to explore the intertemporal potential growth model of college students' self-evaluation during college and after graduation. The main research objects are school year 98-99 M University entrance of college students, investigating the University during the senior year, one year and three after graduation, used University Career and Competency Assessment Network (UCAN) to fill in the common function of scale. Using each student's data do panel study, And through statistical software IBM SPSS 20.0 and Amos 24.0 for panel study and Structural Equation Modeling (SEM), the common competency of self-assessment diversity analysis, and further explore the learning phase comparison of latent growth model. For reference, see the analysis given above, not only can understand the situation in the cultivation of college students learning during the common functions, this study can also master M university graduates in the workplace performance, help teachers to use the results of testing and appraising function counselling, as departments for planning and teaching reference direction of adjustment.
Книги з теми "UCON MODEL"
Díaz Bautista, Alejandro, and Mayrén Polanco Gaytán. Regional Economic Growth In Mexico: The 21st Century Economy. 2022nd ed. Universidad de Colima, 2022. http://dx.doi.org/10.53897/li.2022.0007.ucol.
Повний текст джерелаЧастини книг з теми "UCON MODEL"
Liu, Yanpei, Yuesheng Gu, and Junhui Fu. "A New UCON Model for Web Industrial Control." In Lecture Notes in Electrical Engineering, 1189–97. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2169-2_140.
Повний текст джерелаLili, Xie, and Zhai Zhigang. "Formal Specification of Concurrent Enforcement UCON Model with CTL Logic." In Lecture Notes in Computer Science, 627–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24265-7_54.
Повний текст джерелаHariri, Ali, Amjad Ibrahim, Bithin Alangot, Subhajit Bandopadhyay, Antonio La Marra, Alessandro Rosetti, Hussein Joumaa, and Theo Dimitrakos. "UCON+: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization." In Collaborative Approaches for Cyber Security in Cyber-Physical Systems, 209–26. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-16088-2_10.
Повний текст джерелаResatsch, Florian. "Designing an Ubiquitous Computing Application Development and Evaluation Process Model (UCAN)." In Ubiquitous Computing, 87–110. Wiesbaden: Gabler, 2010. http://dx.doi.org/10.1007/978-3-8349-8683-2_4.
Повний текст джерелаSariyar, Murat, and Jürgen Holm. "Embedding Risk-Based Anonymization into Data Access Control for Providing Individual-Level Health Data in a Secure Way." In Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti210953.
Повний текст джерела"It’s Not about You: The UConn Social Entrepreneur Corps Global Commonwealth Study Abroad Model." In The Handbook of Practice and Research in Study Abroad, 565–86. Routledge, 2010. http://dx.doi.org/10.4324/9780203876640-40.
Повний текст джерелаAbdrabo, Amal Adel. "Third-Spaces and the Creation of Socio-Spatial Identity." In Advances in Electronic Government, Digital Divide, and Regional Development, 144–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4948-3.ch008.
Повний текст джерелаТези доповідей конференцій з теми "UCON MODEL"
"Enforcement of CA-UCON Model." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615001.
Повний текст джерелаZetao Jiang, Shuo Hu, Shengke Gan, and Yuanzhong Shu. "Research on an UCON model supporting distributed management." In 2008 International Conference on Information and Automation (ICIA). IEEE, 2008. http://dx.doi.org/10.1109/icinfa.2008.4608244.
Повний текст джерелаJiao, Dongliang, Liu Lianzhong, Li Ting, and Ma Shilong. "Realization of UCON Model Based on Extended-XACML." In 2011 International Conference on Future Computer Sciences and Application (ICFCSA). IEEE, 2011. http://dx.doi.org/10.1109/icfcsa.2011.27.
Повний текст джерелаJiang, Zetao, Jiafei He, Shuo Hu, and Bina Zheng. "Research on an UCON Model Supporting Distributed Workflow." In 2009 3rd International Conference on Genetic and Evolutionary Computing (WGEC). IEEE, 2009. http://dx.doi.org/10.1109/wgec.2009.107.
Повний текст джерелаKumar, Manoj, Nidhi Joshi, and Deepak Kumar. "Augmentation in UCON Access Control Model for E-Healthcare Domain." In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2018. http://dx.doi.org/10.1109/iccons.2018.8663205.
Повний текст джерелаSun, Yuejiang, and Chunxia Qi. "Fine-grained AR-UCON Model Based on Time Constraints under Cloud Computing Environment." In 4th International Conference on Information Technology and Management Innovation. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/icitmi-15.2015.128.
Повний текст джерелаLohachab, Ankur, and Karambir. "Next Generation Computing: Enabling Multilevel Centralized Access Control using UCON and CapBAC Model for securing IoT Networks." In 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT). IEEE, 2018. http://dx.doi.org/10.1109/ic3iot.2018.8668191.
Повний текст джерелаBaer, Thomas A., David R. Noble, Rekha R. Rao, and Anne M. Grillet. "A Level Set Approach to 3D Mold Filling of Newtonian Fluids." In ASME/JSME 2003 4th Joint Fluids Summer Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/fedsm2003-45762.
Повний текст джерелаTeigão, Rafael Coninck, Carlos Maziero, and Altair Santin. "Implementação de políticas UCON em um núcleo de sistema operacional." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/sbseg.2007.20919.
Повний текст джерелаMessias, Lucas R. V., Cristiano R. Steffens, Paulo L. J. Drews-Jr, and Silvia S. C. Botelho. "UCAN: A Learning-based Model to Enhance Poorly Exposed Images." In Conference on Graphics, Patterns and Images. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sibgrapi.est.2020.13004.
Повний текст джерела