Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Capability-based access control delegation model on the federated IoT network
Flexibility is an important property for general access control system and especially in the
Internet of Things (IoT), which can be achieved by access or authority delegation …
Internet of Things (IoT), which can be achieved by access or authority delegation …
Risk-aware role-based access control
L Chen, J Crampton - Security and Trust Management: 7th International …, 2012 - Springer
The increasing need to share information in dynamic environments has created a
requirement for risk-aware access control systems. The standard RBAC model is designed …
requirement for risk-aware access control systems. The standard RBAC model is designed …
A review of delegation and break-glass models for flexible access control management
Access control models provide important means for the systematic specification and
management of the permissions in a business information system. While there are may well …
management of the permissions in a business information system. While there are may well …
[PDF][PDF] A survey on workflow satisfiability, resiliency, and related problems
DR dos Santos, S Ranise - arxiv preprint arxiv:1706.07205, 2017 - researchgate.net
Workflows specify collections of tasks that must be executed under the responsibility or
supervision of human users. Workflow management systems and workflow-driven …
supervision of human users. Workflow management systems and workflow-driven …
Quantitative access control with partially-observable markov decision processes
F Martinelli, C Morisset - Proceedings of the second ACM conference on …, 2012 - dl.acm.org
This paper presents a novel access control framework reducing the access control problem
to a traditional decision problem, thus allowing a policy designer to reuse tools and …
to a traditional decision problem, thus allowing a policy designer to reuse tools and …
A logical approach to restricting access in online social networks
Nowadays in popular online social networks users can blacklist some of their friends in
order to disallow them to access resources that other non-blacklisted friends may access …
order to disallow them to access resources that other non-blacklisted friends may access …
When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience
J Holderer, R Accorsi, G Müller - Proceedings of the 30th Annual ACM …, 2015 - dl.acm.org
We survey the state of the art on workflow satisfiability and its practical consequences in
terms of runtime obstructions and resilience. The satisfiability problem is related to …
terms of runtime obstructions and resilience. The satisfiability problem is related to …
Delegation of access rights in a privacy preserving access control model
M Moniruzzaman, K Barker - 2011 Ninth Annual International …, 2011 - ieeexplore.ieee.org
Delegation is a process of sharing access rights by users of an access control model. It
facilitates the distribution of authorities in the model. It is also useful in collaborative …
facilitates the distribution of authorities in the model. It is also useful in collaborative …
Resiliency variance in workflows with choice
Computing a user-task assignment for a workflow coming with probabilistic user availability
provides a measure of completion rate or resiliency. To a workflow designer this indicates a …
provides a measure of completion rate or resiliency. To a workflow designer this indicates a …
A Workflow Criticality‐Based Approach to Bypass the Workflow Satisfiability Problem
M Boughrous, H El Bakkali - Security and Communication …, 2021 - Wiley Online Library
Workflow management systems are very important for any organization to manage and
model complex business processes. However, significant work is needed to keep a workflow …
model complex business processes. However, significant work is needed to keep a workflow …