The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a novel multi-hierarchy and task-role based access control model named H-TRBAC. In the model, we create two multi-hierarchical sets, i.e., a role set and a task set. In the task hierarchy, a task may have some partial ordering relationships with other tasks. A task can not be scheduled until its entire ancestors are completed. It is the task??s duty to select necessary roles and...
Constructing a trust network can provide a strong foundation for realizing security in ubiquitous environments. This approach is inspired by social networks, which have two typical characteristics: small-world and scale-free properties. Small-world properties consist of high clustering and short average path length. It often means that we can easily find a short path between any two agents in such...
For the need of privilege among the people in pervasive computing environment, trust management became a hot study lecture. There are credential-based trust management and evidence-based trust management. They explain the basis of privilege in terms of a rational trust and an irrational trust respectively. But the existing trust management model didn't combine them well. So as to be more in accord...
Cooperation and sharing of resources are needed urgently between domains in pervasive computing environment, so building an effective cross-domain authorization model become a key issue. The IRBAC 2000 model accomplish flexibly interoperation by dynamic inter-domain role mapping, but how to manage the associations is not discussed, which may cause security problems. Algorithms to detect these security...
This paper analyzes the shortage of existing privilege management model, proposes a new cross-domain privilege management model, improves the efficiency and veracity. This paper describes a mock application scene validating for the model. The model predigests the agents' interaction with environment, improves the efficiency of privilege management in pervasive computing.
Cannonball dispersion evenness is the main parameter for the design and optimization of future air window. The key of solution of cannonball dispersion evenness is the computations of the biggest value and smallest value of a 2D continuous function, which has many maximum values and minimum values. Moreover, as it need to compute the biggest value and smallest value for many times in the design and...
In the research of antiaircraft system, how to make full use of the firepower units and cause maximum damage to enemy targets, is a key problem of firepower allocation. Based on the characteristics of the antiaircraft system, the description of firepower allocation for antiaircraft system is presented and the mathematical model is established. The calculational method of threaten estimation is given...
As the operating frequency increases to gigahertz and the rise time of a signal is less than or comparable to the time-of-flight delay of a wire, it is necessary to consider the transmission line behavior for delay computation. We present in this paper, an analytical formula for the delay computation under the transmission line model. Extensive simulations with SPICE show the high fidelity of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.