Добірка наукової літератури з теми "UCON MODEL"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "UCON MODEL".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "UCON MODEL"

1

Wu, Hai Ying. "Usage Control Model Based on Regular Grammar." Advanced Materials Research 433-440 (January 2012): 4590–96. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.4590.

Повний текст джерела
Анотація:
Traditional access control models through search Access Control List(ACL) to authorize [1-3]. Traditional access control models fail to satisfy the modern information system, thus Usage Control( UCON ) models were produced and fundamentally enhanced the traditional access control. The UCON models are considered as the next generation access control models. This paper is organized as follow. Section 1 introduces the Usage Control models. Section 2 introduces Regular Grammar ( RG ). Section 3 gives the RG of the 16 core ABC UCON models. Section 4 gives the RG of on-line antivirus procedure. Finally, section 5 summarizes this paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jiang, Ze Tao, and Jia Fei He. "Research on an UCON Extension Model Applicable to Industrial Control." Applied Mechanics and Materials 20-23 (January 2010): 470–76. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.470.

Повний текст джерела
Анотація:
Although UCON makes a unified framework for research on modern access control, it is not applicable enough due to fact that it only gives out a conceptual model. In this paper, analysis and extension have been made on UCON, role and task factors are introduced to it and combined with the conception of domain, an UCON extension model—UCONTR model, which is applicable to industrial control, is proposed. Its formalized description is given in the next step. Finally, the application of UCONTR on distributed control system for heat treatment is introduced in detail.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gan, Sheng Ke, and Feng Bin Wang. "An Extended UCON Model Supporting Distributed Multidomain Applications." Advanced Materials Research 433-440 (January 2012): 5616–19. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5616.

Повний текст джерела
Анотація:
This paper presents security rules summarized from the analysis of an distributed multidomain application. The paper proposes extensions to the core UCON model to address typical problems and requirements in the distributed multidomain environment such as: dynamic attributes, delegation authorization mechanism. The paper gives the definition of the important part of the extended UCON model such as: the basic sets, the system assertions and the actions.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Park, Jaehong, and Ravi Sandhu. "The UCON ABC usage control model." ACM Transactions on Information and System Security 7, no. 1 (February 2004): 128–74. http://dx.doi.org/10.1145/984334.984339.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Xu, Xiao Lin. "Research on Task-Based Usage Control Core Models in Workflow for Manufacturing Environment." Advanced Materials Research 886 (January 2014): 378–81. http://dx.doi.org/10.4028/www.scientific.net/amr.886.378.

Повний текст джерела
Анотація:
With widespread application of Workflow (WF) management system, problem in access control becomes more and more important. At present, the TBAC Model and TRBAC Model cannot satisfy the requirements of access control in Modern information systems. Therefore, the task in WF is the center which combine UCON model with WF, and establish the Task-Based Usage Control (TUCON) Model in which the access control of WF use the UCON Model.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Tang, Jia. "Research on Design of Network Platform Based on UCON Access Control Model." Applied Mechanics and Materials 543-547 (March 2014): 4589–92. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4589.

Повний текст джерела
Анотація:
Network teaching as a new teaching methods, taking full advantage of computer, networking and multimedia technologies, making teaching behaviors across time and space constraints, has a great deal of flexibility and interactivity. However, access control is very important in network teaching platform, and it decides the security of such platform. In this paper, we analyze the UCON access control model in detail, propose a UCON based access control model, and design a network teaching platform with the proposed access control model.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Chang, He, Yang Lu, and Yantao Sun. "Simultaneous Prediction, Determination, and Extraction of Four Polycyclic Aromatic Hydrocarbons in the Environment Using a UCON–NaH2PO4 Aqueous Two-Phase Extraction System Combined with High-Performance Liquid Chromatography-Ultraviolet Detection." Molecules 27, no. 19 (September 30, 2022): 6465. http://dx.doi.org/10.3390/molecules27196465.

Повний текст джерела
Анотація:
In this paper, a new aqueous two-phase extraction system(ATPES) consisting of UCON (poly(ethylene glycol-ran-propylene glycol) monobutyl ether)–NaH2PO4 was established, and four trace polycyclic aromatic hydrocarbons (PAHs: fluorene, anthracene, pyrene and phenanthrene) in water and soil were analyzed by high-performance liquid chromatography (HPLC)–ultraviolet detection. In the multi-factor experiment, the central composite design (CCD) was used to determine the optimum technological conditions. The final optimal conditions were as follows: the concentration of UCON was 0.45 g·mL−1, the concentration of NaH2PO4 was 3.5 mol·L−1, and the temperature was 30 °C. The recovery of the four targets was 98.91–99.84% with a relative standard deviation of 0.3–2.1%. Then UCON recycling and cyclic tests were designed in the experiment, and the results showed that the recovery of PAHs gradually increased in the three extractions because of the remaining PAHs in the salt phase of last extraction. The recovery of PAHs in the UCON recycling test was less than that in the extraction test due to the wastage of UCON. In addition, a two-phase aqueous extraction model was established based on the random forest (RF) model. The results obtained were compared with the experimental data, and the root mean square error (RMSE) was 0.0371–0.0514 and the correlation coefficient R2 was 96.20–98.53%, proving that the model is robust and reliable.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Dai, Chang Ying, Wen Tao Gong, and Jing Liu. "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML." Advanced Materials Research 143-144 (October 2010): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1275.

Повний текст джерела
Анотація:
With the rapid development of information technology, more and more requesters need accessing the services in different access domains, which make the access process in cross-domain become more difficultly. The traditional access control models couldn’t solve the access process for their design limitations and diversity access policies. Usage control model (UCON) was proposed to strengthen the expression of access control model, but UCON is only a conceptual model. How to use the UCON in access process? It is worthwhile to further study. Extensible access control markup language (XACML) is an open standard XML-based language, which can be used to describe the security policy. In order to solve the access process in different access domains, based on XACML, access process of data-flow in cross-domain usage control model is proposed in the paper. Access process of data-flow cross different domains in XACML is introduced to solve the cross-domain problem. Finally, a small example is given to verify the effectiveness of access process.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Liu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.

Повний текст джерела
Анотація:
With the continuous progress of computer technology, static identity authentication technology has encountered challenges in practical applications; in addition, it has deficiencies in continuity and mutability. For these reasons, we propose a risk-based dynamic identity authentication method based on the Usage Control (UCON) model. When authenticating a user, we consider their access rights based on the degree of risk, except in case of password authentication. We propose a risk assessment method, and blockchain technology is used in the scheme to provide a reliable process for risk assessment and authorization. Our scheme represents an improvement in traditional identity authentication, resulting in higher continuity and mutability. We also prove that the scheme has high security and scalability.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

JASIM AL-FARTTOOSI, DAWOOD SALMAN. "Formal model and Policy specification for software defined networks." Journal of Kufa for Mathematics and Computer 3, no. 2 (December 30, 2016): 55–62. http://dx.doi.org/10.31642/jokmc/2018/030207.

Повний текст джерела
Анотація:
Software-defined networking SDN is gaining a sharp increase in adoption by very well-known companies Like Google and Microsoft. Currently, the two stands out reliability and security are the most issues that hampering the SDN rapid growth. This paper aims to contribute to this growing area of research by exploring the SDN security issues. Novel approach will be proposed by utilizing the well-known access control approach called theusage control UCON model and also the Flog policy language of software defined networks SDNs. This work will be produced as a formal modelling via high-level abstract language like Flog
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "UCON MODEL"

1

Camy, Alexandre Rosa. "Aplicação do modelo UCON abc em sistemas de comércio eletrônico B2B." Florianópolis, SC, 2005. http://repositorio.ufsc.br/handle/123456789/102447.

Повний текст джерела
Анотація:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduaçõa em Ciência da Computação.
Made available in DSpace on 2013-07-16T00:58:32Z (GMT). No. of bitstreams: 1 220823.pdf: 1700842 bytes, checksum: 339544c3cbf00d6d06566d73e3518766 (MD5)
Recentemente foi proposto um modelo de controle de acesso, denominado UCONABC, que além de unir alguns dos principais conceitos de controle de acesso ainda propõe novos conceitos como: obrigações, condições, continuidade e mutabilidade. Apesar de abrangente, o UCONABC possui limitações e existem ainda muitas melhorias a serem pesquisadas, como por exemplo, a definição de uma forma adequada da aplicação deste modelo em Sistemas de Comércio Eletrônico (CE) Business-to-Business (B2B). Publicações científicas nesta área afirmam que são necessárias pesquisas na especificação, validação e execução de políticas de controle de acesso para sistemas B2B. Esta dissertação possui como principal contribuição científica a proposta de uma forma de aplicação do UCONABC em sistemas de CE B2B que interajam entre si. Além disso, é proposto o Agrupamento Implícito Parcial, uma técnica que facilita o gerenciamento de permissões neste tipo de sistema. A aplicabilidade da proposta desta dissertação é apresentada através de uma descrição detalhada da implementação de um sistema de CE B2B onde o controle de acesso segue as especificações desta proposta. Por fim, é apresentado um estudo de caso em que é possível visualizar, através de um exemplo do mundo real, a aplicação da proposta desta dissertação neste tipo de sistema.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Teigão, Rafael Coninck. "Controle de uso de recursos em sistemas operacionais utilizando o modelo UCON ABC / Rafael Coninck Teigão ; orientador, Carlos Maziero." reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2007. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=1417.

Повний текст джерела
Анотація:
Dissertação (mestrado) - Pontifícia Universidade Católica do Paraná, Curitiba, 2007
Bibliografia: p. 69-73
Esta dissertação discorre sobre as necessidades modernas de controle de utilização de recursos em sistemas operacionais multi-usuários, e apresenta uma proposta de projeto para a implementação do modelo de controle de uso UCONABC em um sistema operacional
This work addresses the modern needs of resource utilization control in multi-user operating systems, and presents a project proposal for implementing the UCONABC usage control model in a real operating system, by using a grammar specifically created for
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Akram, Raja. "A user centric security model for tamper-resistant devices." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/aca52f8c-6233-4f73-a9da-025d25ab1295/1/.

Повний текст джерела
Анотація:
In this thesis, we propose a ubiquitous and interoperable device based on the smart card architecture to meet the challenges of privacy, trust, and security for traditional and emerging technologies like personal computers, smart phones and tablets. Such a device is referred as User Centric Tamper-Resistant Device (UCTD). To support the smart card architecture for the UCTD initiative, we propose the delegation of smart card ownership from a stringent centralised authority (i.e. the card issuer) to users. This delegation mandated the review of existing smart card mechanisms and their adequate modifications/improvements. Since the inception of smart card technology, the most prevalent ownership model in the smart card industry has been the Issuer Centric Smart Card Ownership Model (ICOM). The ICOM has no doubt played a pivotal role in the proliferation of the technology into various segments of modern life. However, it has been a barrier to the convergence of different services on a smart card. In addition, it might be considered as a hurdle to the adaption of smart card technology into a general-purpose security device. To avoid these issues, we propose citizen ownership of smart cards, referred as the User Centric Smart Card Ownership Model (UCOM). Contrary to the ICOM, it gives the power of decision to install or delete an application on a smart card to its user. The ownership of corresponding applications remains with their respective application providers along with the choice to lease their application to a card or not. In addition, based on the UCOM framework, we also proposed the Coopetitive Architecture for Smart Cards (CASC) that merges the centralised control of card issuers with the provision of application choice to the card user. In the core of the thesis, we analyse the suitability of the existing smart card architectures for the UCOM. This leads to the proposal of three major contributions spanning the smart card architecture, the application management framework, and the execution environment. Furthermore, we propose protocols for the application installation mechanism and the application sharing mechanism (i.e. smart card firewall). In addition to this, we propose a framework for backing-up, migrating, and restoring the smart card contents. Finally, we provide the test implementation results of the proposed protocols along with their performance measures. The protocols are then compared in terms of features and performance with existing smart cards and internet protocols. In order to provide a more detailed analysis of proposed protocols and for the sake of completeness, we performed mechanical formal analysis using the CasperFDR.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

JOSHI, NIDHI. "AUGMENTATION IN UCON MODEL." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15219.

Повний текст джерела
Анотація:
In this dissertation, we have presented a new architecture of UCON access control model for e-healthcare domain. This enhanced UCON model can scale effectively as per user demand, perform isolation of sensitive data from non-sensitive data and data transmission between different modules is via secure model and thus helps in achieving high availability, performance, scalability, resilience and security. Features of Cloud computing have also been explored and used to achieve some of the features listed above. Existing implementation of UCON for e-healthcare domain do not cater for all of these requirements, for an e-healthcare system it is imperative to have an access control model which fulfills all of these. New architecture comprises of a client application, user platform on local network and policy server on cloud platform. Sensitive and Non-sensitive data has been segregated to maintain data isolation. Sensitive data is kept on local network of hospital and non-sensitive data on cloud. Multiple UCON policy servers are available on cloud to cope with component failures and to provide resilience. Data communication from user platform to cloud is through SSL to maintain data security. Feature of Sun XACML has been used in the implementation of policy server. All features of UCON model related to authorization, condition, obligation, continuity and attribute mutability has been incorporated in the proposed model.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lu, Po-Hung, and 呂柏鋐. "The Business Model of UCOM IT Training Center." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/7wyktv.

Повний текст джерела
Анотація:
碩士
國立臺灣科技大學
資訊管理系
102
The Professional Technical Certification and Training Industry has been flourished for years in tandem with the advancement in information technology and knowledge transfer. Professional training centers have provided high quality and to-the-point expertise advices for their customers. Apparently, professional training centers not only speeds up their customers’ knowledge but also help their customers to acquire the professional certifications. SYSTEX Information - UCOM Training Centre has enjoyed its great success in the field of information technology professional trainings and has grabbed over 50 percent of Taiwan’s IT training market. To discuss the SYSTEX Information - UCOM Training Centre’s great achievement, several theories have been employed such as resource-based view, modularity, proactive strategy, and the concept of organizational ambidexterity. The case suggests that the case company develops several unique resources such as company’s customer relations, brand resources and environmental resources; through the modularity of its core competences, the case company has enhanced its resource utilization. Also, the proactive management and organizational ambidexterity has enabled the firm to agile adapt to market needs.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

WANG, SHIH-YA, and 王詩亞. "A Study on Latent Growth Model of UCAN Common Competency Self-Evaluation─A Case of M University." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3ktwdj.

Повний текст джерела
Анотація:
碩士
銘傳大學
應用統計與資料科學學系碩士班
106
In recent years, influenced by the higher education policy universalization, teachers, curriculum and teaching, etc, all have significant changes, institutions of higher education is also increased dramatically, but along with the popularization of higher education, made higher education because of oversupply, and cause a college degree value, lead to college students after graduation, can't seem to put this to use, the unemployed college grads are still much higher than the rest of the education in socioeconomic status. The purpose of this study is to explore the intertemporal potential growth model of college students' self-evaluation during college and after graduation. The main research objects are school year 98-99 M University entrance of college students, investigating the University during the senior year, one year and three after graduation, used University Career and Competency Assessment Network (UCAN) to fill in the common function of scale. Using each student's data do panel study, And through statistical software IBM SPSS 20.0 and Amos 24.0 for panel study and Structural Equation Modeling (SEM), the common competency of self-assessment diversity analysis, and further explore the learning phase comparison of latent growth model. For reference, see the analysis given above, not only can understand the situation in the cultivation of college students learning during the common functions, this study can also master M university graduates in the workplace performance, help teachers to use the results of testing and appraising function counselling, as departments for planning and teaching reference direction of adjustment.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "UCON MODEL"

1

Díaz Bautista, Alejandro, and Mayrén Polanco Gaytán. Regional Economic Growth In Mexico: The 21st Century Economy. 2022nd ed. Universidad de Colima, 2022. http://dx.doi.org/10.53897/li.2022.0007.ucol.

Повний текст джерела
Анотація:
Regional economics in Mexico is concerned with the spatial allocation of economic activity. It is centered along the analysis within regions and states or metropolitan areas of a country. Mexico as a country is now one of the fastest-growing economies in Latin America and a model of financial and commercial integration. But formidable development and economic growth challenges lie ahead for Mexico in the next quarter century, as it observed the deep contrasts between Mexico's rich and poor states, growing urban centers and destitute rural areas, and between Mexicans rich enough to be considered between the richest men in the world and owning companies that are able to compete with industrialized countries, and those Mexicans for whom the benefits of globalization have not yet materialized. In the coming years, Mexico faces many challenges in order to support economic growth. The economic reforms, including the financial sector reform, labor reform, energy and decentralization, promises to give the country a greater legitimacy, stronger sustainability and a higher rate of economic growth. The present book covers the effects of human capital and research and development on growth and regional convergence in Mexico. It also takes a closer look at institutions and economic growth in Mexico; and also covers trade, economic growth and convergence.
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "UCON MODEL"

1

Liu, Yanpei, Yuesheng Gu, and Junhui Fu. "A New UCON Model for Web Industrial Control." In Lecture Notes in Electrical Engineering, 1189–97. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2169-2_140.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lili, Xie, and Zhai Zhigang. "Formal Specification of Concurrent Enforcement UCON Model with CTL Logic." In Lecture Notes in Computer Science, 627–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24265-7_54.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hariri, Ali, Amjad Ibrahim, Bithin Alangot, Subhajit Bandopadhyay, Antonio La Marra, Alessandro Rosetti, Hussein Joumaa, and Theo Dimitrakos. "UCON+: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization." In Collaborative Approaches for Cyber Security in Cyber-Physical Systems, 209–26. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-16088-2_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Resatsch, Florian. "Designing an Ubiquitous Computing Application Development and Evaluation Process Model (UCAN)." In Ubiquitous Computing, 87–110. Wiesbaden: Gabler, 2010. http://dx.doi.org/10.1007/978-3-8349-8683-2_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sariyar, Murat, and Jürgen Holm. "Embedding Risk-Based Anonymization into Data Access Control for Providing Individual-Level Health Data in a Secure Way." In Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti210953.

Повний текст джерела
Анотація:
Especially in biomedical research, individual-level data must be protected due to the sensitivity of the data that is associated with patients. The broad goal of scientific data re-use is to allow many researchers to derive new hypotheses and insights from the data while preserving privacy. Data usage control (DUC) as an attribute-based access mechanism promises to overcome the limitations of traditional access control models achieving that goal. Park and Sandhu provided the usage control (UCON) model as an instance of DUC, which defines policies that evaluate certain attributes. Here, we present an UCON-based architecture, which is augmented with risk-based anonymization as provided by the R package sdcMicro and an extensible Access Control Markup Language (XACML) environment with a core policy decision point as implemented by authzforce.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

"It’s Not about You: The UConn Social Entrepreneur Corps Global Commonwealth Study Abroad Model." In The Handbook of Practice and Research in Study Abroad, 565–86. Routledge, 2010. http://dx.doi.org/10.4324/9780203876640-40.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Abdrabo, Amal Adel. "Third-Spaces and the Creation of Socio-Spatial Identity." In Advances in Electronic Government, Digital Divide, and Regional Development, 144–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4948-3.ch008.

Повний текст джерела
Анотація:
This chapter provides a polite critique of the conventional ways of thinking about space and the intertwined dialectics of the socio-spatial narratives. Conventionally, the United Nations Educational, Scientific, and Cultural Organization's (UNESCO) main document on the Creative Cities Network (UCCN) emphasizes two crucial pillars of sustainable development and urban regeneration which are creativity and culture. The first term deals with creative cities and urban areas, while the second addresses culture as the human product that takes either a tangible or an intangible form. Regarding the meaning of activities in contemporary human society, one of the aims of this chapter is to decode the cultural activities in the city of Basel in Switzerland. In other words, this chapter is about exploring some aspects of the cultural life and creativity in the ancient city of Basel from a sociological perspective. Theoretically, Basel's culture of festivals and carnivals could be seen as the fundamental quality that brings the people of the city together. For instance, the cultural features of Basel Fasnacht, Morgenstreich, and Basel Herbstmesse reveal highly important aspects of the tangible and intangible dimensions of the culture of Basel as an ancient, medieval European city dating back to the 4th century AD. Methodologically, this chapter aims to represent and produce anthropological knowledge using visual media of research through the methodology of the “Actor-Network Theory”. This method of research comprises three main steps: 1) collecting visual ethnography, 2) designing the Actantial model based on Aristotle's semiotic square, 3) creating visual storyboarding to finalize the Actantiality map through analyzing power dynamics among the human narratives, the historical and cultural narratives, the spatial-environmental narratives, and the official narratives of the state. The main findings of this chapter may confirm or rebut the author's two hypotheses, stating “the city's identity is a mutual manifestation of human-spatial interaction,” and “not all creative cities have to be modern ones; some ancient cities are indeed creative cities based on their cultural, historical and social uniqueness.”
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "UCON MODEL"

1

"Enforcement of CA-UCON Model." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zetao Jiang, Shuo Hu, Shengke Gan, and Yuanzhong Shu. "Research on an UCON model supporting distributed management." In 2008 International Conference on Information and Automation (ICIA). IEEE, 2008. http://dx.doi.org/10.1109/icinfa.2008.4608244.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Jiao, Dongliang, Liu Lianzhong, Li Ting, and Ma Shilong. "Realization of UCON Model Based on Extended-XACML." In 2011 International Conference on Future Computer Sciences and Application (ICFCSA). IEEE, 2011. http://dx.doi.org/10.1109/icfcsa.2011.27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Jiang, Zetao, Jiafei He, Shuo Hu, and Bina Zheng. "Research on an UCON Model Supporting Distributed Workflow." In 2009 3rd International Conference on Genetic and Evolutionary Computing (WGEC). IEEE, 2009. http://dx.doi.org/10.1109/wgec.2009.107.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kumar, Manoj, Nidhi Joshi, and Deepak Kumar. "Augmentation in UCON Access Control Model for E-Healthcare Domain." In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2018. http://dx.doi.org/10.1109/iccons.2018.8663205.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sun, Yuejiang, and Chunxia Qi. "Fine-grained AR-UCON Model Based on Time Constraints under Cloud Computing Environment." In 4th International Conference on Information Technology and Management Innovation. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/icitmi-15.2015.128.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lohachab, Ankur, and Karambir. "Next Generation Computing: Enabling Multilevel Centralized Access Control using UCON and CapBAC Model for securing IoT Networks." In 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT). IEEE, 2018. http://dx.doi.org/10.1109/ic3iot.2018.8668191.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Baer, Thomas A., David R. Noble, Rekha R. Rao, and Anne M. Grillet. "A Level Set Approach to 3D Mold Filling of Newtonian Fluids." In ASME/JSME 2003 4th Joint Fluids Summer Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/fedsm2003-45762.

Повний текст джерела
Анотація:
Filling operations, in which a viscous fluid displaces a gas in a complex geometry, occur with surprising frequency in many manufacturing processes. Difficulties in generating accurate models of these processes involve accurately capturing the interfacial boundary as it undergoes large motions and deformations, preventing dispersion and mass-loss during the computation, and robustly accounting for the effects of surface tension and wetting phenomena. This paper presents a numerical capturing algorithm using level set theory and finite element approximation. Important aspects of this work are addressing issues of mass-conservation and the presence of wetting effects. We have applied our methodology to a three-dimension model of a complicated filling problem. The simulated results are compared to experimental flow visualization data taken for filling of UCON oil in the identical geometry. Comparison of simulation and experiment indicates that the simulation conserved mass adequately and the simulated interface shape was in approximate agreement with experiment. Differences seen were largely attributed to inaccuracies in the wetting line model.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Teigão, Rafael Coninck, Carlos Maziero, and Altair Santin. "Implementação de políticas UCON em um núcleo de sistema operacional." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/sbseg.2007.20919.

Повний текст джерела
Анотація:
O controle de uso vai além do controle de acesso tradicional e trata os aspectos relacionados à mutabilidade dos atributos e validação contínua das restrições de uso. O modelo UCONABC estabelece um ferramental formal básico para tratar as novas necessidades de segurança e sistemas de controle de uso. Como esse modelo foi apenas descrito por uma especificação formal, este trabalho o implementa na forma de uma gramática LALR(1). A gramática proposta é então utilizada para representar cenários de controle de acesso e uso comuns, demonstrando sua expressividade e utilidade. Por fim, a gramática é implementada em um mecanismo de controle de uso de arquivos no núcleo de um sistema operacional aberto.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Messias, Lucas R. V., Cristiano R. Steffens, Paulo L. J. Drews-Jr, and Silvia S. C. Botelho. "UCAN: A Learning-based Model to Enhance Poorly Exposed Images." In Conference on Graphics, Patterns and Images. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sibgrapi.est.2020.13004.

Повний текст джерела
Анотація:
Image enhancement is a critical process in imagebased systems. In these systems, image quality is a crucial factor to achieve a good performance. Scenes with a dynamic range above the capability of the camera or poor lighting are challenging conditions, which usually result in low contrast images, and, with that, we can have the underexposure and/or overexposure problem. In this work, our aim is to restore illexposed images. For this purpose, we present UCAN, a small and fast learning-based model capable to restore and enhance poorly exposed images. The obtained results are evaluated using image quality indicators which show that the proposed network is able to improve images damaged by real and simulated exposure. Qualitative and quantitative results show that the proposed model outperforms the existing models for this objective.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії