Spelling suggestions: "subject:"ehe attributed"" "subject:"ehe attributes""
251 |
A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.Onwumere, Faith Nnenna January 2023 (has links)
Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. Devices within the IoT environment are embedded with processors, sensors and communication hardware that helps these devices collate data, analyze data (when needed), and transfer data amongst themselves. Even with the existence of IoT in making things easier for users and with the introduction of newer variants of IoT, several security and privacy challenges are introduced. In the rapidly evolving landscape of the Internet of Things (IoT), ensuring secure data sharing has become a critical concern. Attribute-based encryption (ABE) has emerged as a promising cryptographic technique for addressing security challenges in IoT environments. Attribute-Based Encryption (ABE) is a cryptographic method that provides public key encryption and access control based on attributes allocated. ABE can be used to encrypt data transmitted between IoT devices and the cloud. In situations where several devices have to interact with each other (e.g., smart home interacting with the user’s hospital IoT system), an intranet of things is formed, and these data is stored in the cloud. ABE can serve as a secure means of transmitting this data since these devices already possess unique attributes that can grant users access control. In this thesis, we aim to present a systematic review of the Attribute-Based Encryption techniques specifically designed for secure data sharing in IoT environments. The objective of this review is to analyze and synthesize existing research, identify trends, and highlight key findings in the field. Therefore, the document survey is chosen as the research strategy. PRISMA framework is followed in searching the eligible literature in 5 databases (Springer, ACM Digital library, Google Scholar, IEEE, Research Gate, Research Square, and Science Direct), with a final set of 30 articles retrieved from ACM Digital Library, IEEE, and Science Direct, all included for analysis. The results show insights on the several ABE approaches used in implementing a secure data sharing framework with access control (which involves enforcing policies that help data owners determine who can and cannot access their data), data privacy (which involves measures taken to ensure that confidentiality, integrity, and availability of any shared data), and data security (which involves practices that help protect any form of shared data from unauthorized access, tamper, or disclosure) in IoT devices.
|
252 |
Cross Product Generalizability of Shopping Site JudgmentsGiven, Steven G. 11 January 2012 (has links)
No description available.
|
253 |
Access Control for Cross Organizational CollaborationZhu, Jian 11 May 2012 (has links)
No description available.
|
254 |
Evaluation of Changes between the Material and Resource Category of LEED v4.0 and v3.0 as it Pertains to New Construction and Major RenovationsPai, Vibha January 2017 (has links)
No description available.
|
255 |
Efficient Algorithms for Data Mining with Federated DatabasesYoung, Barrington R. St. A. 03 July 2007 (has links)
No description available.
|
256 |
A Hearing-Based, Frequency Domain Sound Quality Model for Combined Aerodynamic and Power Transmission Response With Application To Rotorcraft Interior NoiseSONDKAR, PRAVIN BANDU 22 April 2008 (has links)
No description available.
|
257 |
A General Form of Attribute ExplorationBorchmann, Daniel 20 June 2022 (has links)
We present a general form of attribute exploration, a knowledge completion algorithm from formal concept analysis. The aim of this generalization is to extend the applicability of attribute exploration by a general description. Additionally, this may also allow for viewing different existing variants of attribute exploration as instances of a general form, as for example exploration on partial contexts.
|
258 |
<b>Social Identities and Environmental Decision Making</b>Nathanael Johnson (8797193) 05 June 2024 (has links)
<p dir="ltr">Appealing to individuals’ social identity is a powerful form of social influence, capable of changing the way people process information, the information they think about, and how they evaluate other people. This form of social influence can function through perceptions of normal behavior within a social group, in which members of a group interpret ambiguous information through the lens of what is considered to be normal in their ingroup. The Social Identity Decision Process hypothesis, based on Social Identity Theory and Probabilistic Persuasion Theory, suggests that group norms associated with a decider's social identity can alter the perceived importance of attributes or cues in a decision environment and the strategies that are used to make choices in situations in which the group identity is salient. Taking the U.S. political landscape as a context and examining Republican and Democrat social identities, norms from these political groups were expected to impact the attributes and strategies partisans use when choosing whether to have solar panels on a house. Two studies are reported that examined these effects through multi-attribute decision making, in which predefined decision process models assessed participant behavior to analyze which attributes best describe participants’ decision making.</p>
|
259 |
Towards the Development of a Decision Support System for Emergency Vehicle Preemption and Transit Signal Priority Investment PlanningSoo, Houng Y. 06 May 2004 (has links)
Advances in microprocessor and communications technologies are making it possible to deploy advanced traffic signal controllers capable of integrating emergency vehicle preemption and transit priority operations. However, investment planning for such an integrated system is not a trivial task. Investment planning for such a system requires a holistic approach that considers institutional, technical and financial issues from a systems perspective. Two distinct service providers, fire and rescue providers and transit operators, with separate operational functions, objectives, resources and constituents are involved. Performance parameters for the integrated system are not well defined and performance data are often imprecise in nature.
Transportation planners and managers interested in deploying integrated emergency vehicle preemption and traffic priority systems do not have an evaluation approach or a common set of performance metrics to make an informed decision. There is a need for a simple structured analytical approach and tools to assess the impacts of an integrated emergency vehicle preemption and transit priority system as part of investment decision making processes. This need could be met with the assistance of a decision support system (DSS) developed to provide planners and managers a simple and intuitive analytical approach to assist in making investment decisions regarding emergency vehicle preemption and transit signal priority.
This dissertation has two research goals: (1) to develop a decision support system framework to assess the impacts of advanced traffic signal control systems capable of integrating emergency vehicle preemption and transit signal priority operations for investment planning purposes; and (2) to develop selected analytical tools for incorporation into the decision support system framework. These analytical tools will employ fuzzy sets theory concepts, as well as cost and accident reduction factors. As part of this research, analytical tools to assess impacts on operating cost for transit and fire and rescue providers have been developed. In addition, an analytical tool was developed and employs fuzzy multi-attribute decision making methods to rank alternative transit priority strategies. These analytical tools are proposed for incorporation into the design of a decision support system in the future. / Ph. D.
|
260 |
Standards for exchanging digital geo-referenced informationCooper, Antony Kyle 12 March 2011 (has links)
The purpose of this dissertation is to assess digital geo-referenced information and standards for exchanging such information, especially the South African National Exchange Standard (NES). The process of setting up a standard is exacting. On the one hand, the process demands a thorough scrutiny and analysis of the objects to be standardised and of all related concepts. This is a prerequisite for ensuring that there is unanimity about their meaning and inter-relationships. On the other hand, the process requires that the standard itself be enunciated as succinctly, comprehensibly and precisely as possible. This dissertation addresses both these facets of the standards process in the context of standards for exchanging digital geo-referenced information. The dissertation begins with an analysis of geo-referenced information in general, including digital geo-referenced information. In chapters 2 and 3, the various aspects of such information are scrutinised and evaluated in more detail. The examination of concepts is backed up by a comprehensive Glossary of terms in the domain under discussion. Chapter 4 examines the nature of standards. It also proposes a novel way to approach a standard for the exchange of digital geo-referenced information: namely, that it can be viewed as a language and can accordingly be specified by a grammar. To illustrate the proposal, NES is fully specified, using the Extended Backus-Naur Form notation, in an Appendix. Apart from the advantages of being a succinct and precise formal specification, the approach also lends itself to deploying standard tools such as Lex and yacc for conformance testing and for developing interfaces to NES, as illustrated in a second appendix. As a final theme of the dissertation, an evaluation of such standards is provided. Other standards that have been proposed elsewhere for purposes similar to that of NES are surveyed in chapter 5. In chapter 6, features of NES are highlighted, including the fact that it takes a relational approach. Chapter 7 concludes the dissertation, summarising the work to date, and looking ahead to future work. AFRIKAANS : Die doel van hierdie verhandling is om versyferde geo-verwysde inligting en standaarde vir die uitruil van sulke inligting te ondersoek, met spesifieke verwysing na die Suid- Afrikaanse Nasionale Uitruilstandaard (NES). Die proses om ’n standaard op te stel is veeleisend. Aan die een kant vereis die proses ’n volledige bestudering en ontleding van die objekte wat gestandaardiseer gaan word, asook van al die verwante konsepte. Hierdie is ’n voorvereiste om te verseker dat daar oor hul betekenisse en onderlinge verwantskappe eenstemmigheid bestaan. Aan die ander kant vereis die proses dat die standaard so kernagtig, volledig en presies moontlik gestel moet word. Hierdie verhandeling spreek beide hierdie fasette van die standaardiseringsproses aan, en wel in die konteks van standaarde vir die uitruil van versyferde geo-verwysde inligting. Dié verhandling begin met ’n oorhoofse analise van geo-verwysde inligting, insluitend versyferde geo-verwysde inligting. In hoofstukke 2 en 3 word verskeie aspekte van dié inligting in meer detail ondersoek en geëvalueer. Hierdie ondersoek van konsepte word deur ’n omvattende woordelys van terme in die veld onder bespreking gesteun. Hoofstuk 4 ondersoek die aard van standaarde. Dit stel ook ’n nuwe manier voor om ’n standaard vir die uitruil van versyferde geo-verwysde inligting te benader, naamlik dat dit as ’n taal beskou kan word, en dat dit gevolglik deur middel van ’n grammatika gespesifiseer kan word. Om die voorstel te illustreer, word NES volledig in ’n aanhangsel deur middel van die Uitgebreide Backus-Naur Vorm notasie gespesifiseer. Afgesien van die voordeel van ’n kernagtige en presiese formele spesifikasie, ondersteun die benadering ook standaardgereedskap soos Lex en yacc wat vir konformeringstoetsing en vir NES koppelvlakke gebruik kan word, soos in ’n tweede aanhangsel illustreer word. As ’n finale tema van die verhandeling word ’n evaluasie van tersaaklike standaarde voorsien. Standaarde wat elders vir soortgelyke doeleindes aan dié van NES voorgestel is, word oorsigtelik in hoofstuk 5 beskou. In hoofstuk 6 word kenmerkende eienskappe van NES uitgelig, insluitend die feit dat dit op ’n relasionele benadering gebaseer is. Hoofstuk 7 sluit die verhandeling af met ’n opsomming van werk tot op datum en ’n blik op toekomstige werk. / Dissertation (MSc)--University of Pretoria, 1993. / Computer Science / unrestricted
|
Page generated in 0.0515 seconds