Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Time Petri net is an effective approach to modeling workflow. But existing modeling methods do not consider dynamic adjustment method for time consistency. This paper proposes two adjustment algorithms, CTAA for time consistency and ICTTA for time inconsistency. CTAA can improve the workflow efficiency and ICTAA can make the Petri net capture the time consistency. We also propose a method to evaluate...
Microaggregation is an important technique to the k-anonymized datasets. However, most existing microaggregation algorithms to achieving k-anonymity have some defects on distance measurement for categorical and mixed data. In this paper, we introduce a categorical data semantic hierarchy to their distance measurement to improve clustering quality. The paper also investigates mixed distance for mixed...
RBAC (role-based access control) has been widely investigated and adopted for its simplicity and effectiveness. However, there still exist some defects in it, including: (1) traditional RBAC does not consider time and context factors. (2) traditional RBAC only defines a simple logical relationship among roles and permissions, which makes it incompetent to solve authorization problem for large-scale...
To improve adaptability and flexibility of heterogeneous database integration system, the paper proposed a heterogeneous database integration framework based on Web services composition which is implemented by Web services composition template. The paper also adopted granular computing to optimize Web services composition to improve efficiency and quality of heterogeneous integration systems. The...
K-anonymization implemented by microaggregation is a special clustering problem with minimum cardinality constraint, which has been proved to be an NP-hard combinatorial optimization problem. The existing heuristic microaggregation algorithms search the solutions in a limited solution space, so can only get local optimal solutions. The paper proposes an ICSMA (immune clonal selection microaggregation...
Individual privacy preservation has recently become an increasingly important issue when publishing microdata for mining purpose. K-anonymity is a popular model for protecting privacy, which requires that each record in the released dataset be indistinguishable with at least (k-1) other records with respect to quasi-identifier. MDAV, an efficient k-anonymization algorithm, has been extensively investigated...
General (alpha,k)-anonymity model is an effective approach to protecting individual privacy before microdata are released. But it has some defects on privacy preservation and data distortion when the distribution of sensitive values is not well-proportioned. To solve the problem, a complete (alpha,k)-anonymity model is proposed which can implement sensitive values' individuation preservation by setting...
V-MDAV algorithm is a high efficient multivariate microaggregation algorithm and the anonymity table generated by the algorithm has high data quality. But it does not consider the sensitive attribute diversity, so the anonymity table generated by the algorithm cannot resist homogeneity attack and background knowledge attack. To solve the problem, the paper proposes an improved V-MDAV algorithm, which...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.