1 |
A Role-based intranet : Overcoming information overload?Lundberg, Anders, Kuu, Teresa January 2007 (has links)
No description available.
|
2 |
PRACTICAL APPROACHES TO COMPLEX ROLE ASSIGNMENT PROBLEMS IN ROLE-BASED COLLABORATIONFeng, Luming 09 October 2013 (has links)
Group role assignment (GRA) is an important task in Role-Based Collaboration (RBC). The complexity of group role assignment becomes very high as the constraints are introduced. According to recent studies, considerable efforts have been put towards research on complex group role assignment problems. Some of these problems are clearly defined and initial solutions are proposed. However some of these solutions were unable to guarantee an optimal result, or the time complexity is very high. In fact, many real world collaboration problems concern many types of constraints. Therefore, to make them practical, the accuracy and efficiency of the algorithms should be improved.
Role is the center of a role-based collaboration mechanism. Role plays a very essential part in the whole process of a collaboration system, without the roles, there would be no collaboration. One important function of the role is that it defines the features or requirements of a position which can be used to filter or access the candidates. The definition of roles greatly influences the evaluation results of candidates, which in turn influence the RBC algorithms significantly. Based on previous research, the role-based evaluation is associated with multiple attribute decision making (MADM). Role-based evaluation methods can be adopted from MADM methods. Selecting an appropriate method for a specific problem is difficult and domain oriented. Therefore, a dynamic evaluation model which can be expanded by domain experts and adapted to many cases is required. At present, there is limited research related to this requirement.
This thesis first focuses on two complex role-based collaboration problems. The first being group role assignment problems with constraints of conflicting agents, and the
iv
second an agent training problem for a sustainable group. Practical solutions to these problems are proposed and resolved by IBM ILOG CPLEX. Simulations are conducted to demonstrate the performance of these solutions. From which I compare the solutions’ performances with the initial solutions, and indicate the improvement of these proposed solutions. Secondly, this thesis clarifies the difficulties of connecting evaluation methods with real world requirements. In order to overcome these difficulties, I introduce an additional parameter, propose a dynamic evaluation model, and provide four synthesis methods to facilitate the requirements of a co-operation project which is funded by NSERC (Natural Sciences and Engineering Research Council of Canada).
The contributions of this thesis includes: clarifying the complexity of two complex role-based collaboration problem; proposing a better solution and verifying its efficiency and practicability; discussing the difficulties of connecting evaluation methods with real world problems; introducing an additional parameter to improve the accuracy of evaluation to some problems; proposing a role-based evaluation model to meet the requirements of adaptive and expandable.
|
3 |
A Flexible Role-Based Delegation Model and Its Application in Healthcare InformationSystemLiu, Zidong 27 November 2013 (has links)
No description available.
|
4 |
Process Selection for Hole Operations Using a Rule Based ApproachWadatkar, Ajit January 2004 (has links)
No description available.
|
5 |
Securing Multiprocessor Systems-on-ChipBiswas, Arnab Kumar 16 August 2016 (has links) (PDF)
MHRD PhD scholarship / With Multiprocessor Systems-on-Chips (MPSoCs) pervading our lives, security issues are emerging as a serious problem and attacks against these systems are becoming more critical and sophisticated. We have designed and implemented different hardware based solutions to ensure security of an MPSoC. Security assisting modules can be implemented at different abstraction
levels of an MPSoC design. We propose solutions both at circuit level and system level of abstractions. At the VLSI circuit level abstraction, we consider the problem of presence of noise voltage in input signal coming from outside world. This noise voltage disturbs the normal circuit operation inside a chip causing false logic reception. If the disturbance is caused
intentionally the security of a chip may be compromised causing glitch/transient attack. We propose an input receiver with hysteresis characteristic that can work at voltage levels between 0.9V and 5V. The circuit can protect the MPSoC from glitch/transient attack. At the system level, we propose solutions targeting Network-on-Chip (NoC) as the on-chip communication medium. We survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC enabled MPSoC. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple Trusted Execution Environments (TEEs). Software attacks, the most common type of attacks, mainly exploit vulnerabilities like buffer overflow. This is possible if proper access control to memory is absent in the system. We propose four hardware based mechanisms to implement Role Based Access Control (RBAC) model in NoC based MPSoC.
|
6 |
Role based modelling in support of configurable manufacturing system designDing, Chenghua January 2010 (has links)
Business environments, in which any modern Manufacturing Enterprise (ME) operates, have grown significantly in complexity and are changing faster than ever before. It follows that designing a flexible manufacturing system to achieve a set of strategic objectives involves making a series of complex decisions over time. Therefore manufacturing industry needs improved knowledge about likely impacts of making different types of change in MEs and improved modelling approaches that are capable of providing a systematic way of modelling change impacts in complex business processes; prior to risky and costly change implementation projects. An ability to simulate the execution of process instances is also needed to control, animate and monitor simulated flows of multiple products through business processes; and thereby to assess impacts of dynamic distributions and assignments of multiple resource types during any given time period. Further more this kind of modelling capability needs to be integrated into a single modelling framework so as to improve its flexibility and change coordination. Such a modelling capability and framework should help MEs to achieve successfully business process re-engineering, continuous performance development and enterprise re-design. This thesis reports on the development of new modelling constructs and their innovative application when used together with multiple existing modelling approaches. This enables human and technical resource systems to be described, specified and modelled coherently and explicitly. In turn this has been shown to improve the design of flexible, configurable and re-usable manufacturing resource systems, capable of supporting decision making in agile manufacturing systems. A newly conceived and developed Role-Based Modelling Methodology (R-BMM) was proposed during this research study. Also the R-BMM was implemented and tested by using it together with three existing modelling approaches namely (1) extended Enterprise Modelling, (2) dynamic Causal Loop Diagramming and (3) Discrete Event Simulation Modelling (via software PlantSimulation ®). Thereby these three distinct modelling techniques were deployed in a new and coherent way. The new R-BMM approach to modelling manufacturing systems was designed to facilitate: (1) Graphical Representation (2) Explicit Specification and (3) Implementation Description of Resource systems. Essentially the approach enables a match between suitable human and technical resource systems and well defined models of processes and workflows. Enterprise Modelling is used to explicitly define functional and flexibility competencies that need to be possessed by suitable role holders. Causal Loop Diagramming is used to reason about dependencies between different role attributes. The approach was targeted at the design and application of simulation models that enable relative performance comparisons (such as work throughput, lead-time and process costs) to be made and to show how performance is affected by different role decompositions and resourcing policies. The different modelling techniques are deployed via a stepwise application of the R-BMM approach. Two main case studies were carried out to facilitate methodology testing and methodology development. The chosen case company possessed manufacturing characteristics required to facilitate testing and development; in terms of significant complexity and change with respect to its products and their needed processing structures and resource systems. The first case study was mainly designed to illustrate an application, and benefits arising from application, of the new modelling approach. This provided both qualitative and quantitative results analysis and evaluation. Then with a view to reflecting on modelling methodology testing and to address a wider scope manufacturing problem, the second case study was designed and applied at a different level of abstraction, to further test and verify the suitability and re-usability of the methodology. Through conceiving the new R-BMM approach, to create, analyse and assess the utility of sets of models, this research has proposed and tested enhancements to current means of realising reconfigurable and flexible production systems.
|
7 |
Role based access control in a telecommunications operations and maintenance network / Rollbaserad behörighetskontroll i ett drift- och underhållssystem för telekommunikationGunnarsson, Peter January 2005 (has links)
<p>Ericsson develops and builds mobile telecommunication networks. These networks consists of a large number of equipment. Each telecommunication company has a staff of administrators appointed to manage respective networks. </p><p>In this thesis, we investigate the requirements for an access control model to manage the large number of permissions and equipment in telecommunication networks. Moreover, we show that the existing models do not satisfy the identified requirements. Therefore, we propose a novel RBAC model which is adapted for these conditions. </p><p>We also investigate some of the most common used commercial tools for administrating RBAC, and evaluate their effectiveness in coping with our new proposed model. However, we find the existing tools limited, and thereby design and partly implement a RBAC managing system which is better suited to the requirements posed by our new model.</p>
|
8 |
The Continuum Architecture: Towards Enabling Chaotic Ubiquitous ComputingDragoi, Octavian Andrei January 2005 (has links)
Interactions in the style of the ubiquitous computing paradigm are possible today, but only in handcrafted environments within one administrative and technological realm. This thesis describes an architecture (called Continuum), a design that realises the architecture, and a proof-of-concept implementation that brings ubiquitous computing to chaotic environments. Essentially, Continuum enables an ecology at the edge of the network, between users, competing service providers from overlapping administrative domains, competing internet service providers, content providers, and software developers that want to add value to the user experience. Continuum makes the ubiquitous computing functionality orthogonal to other application logic. Existing web applications are augmented for ubiquitous computing with functionality that is dynamically compiled and injected by a middleware proxy into the web pages requested by a web browser at the user?s mobile device. This enables adaptability to environment variability, manageability without user involvement, and expansibility without changes to the mobile. The middleware manipulates self-contained software units with precise functionality (called <i>frames</i>), which help the user interact with contextual services in conjunction with the data to which they are attached. The middleware and frame design explicitly incorporates the possibility of discrepancies between the assumptions of ubiquitous-computing software developers and field realities: multiple administrative domains, unavailable service, unavailable software, and missing contextual information. A framework for discovery and authorisation addresses the chaos inherent to the paradigm through the notion of <i>role assertions</i> acquired dynamically by the user. Each assertion represents service access credentials and contains bootstrapping points for service discovery on behalf of the holding user. A proof-of-concept prototype validates the design, and implements several frames that demonstrate general functionality, including driving discovery queries over multiple service discovery protocols and making equivalences between service types, across discovery protocols.
|
9 |
The Continuum Architecture: Towards Enabling Chaotic Ubiquitous ComputingDragoi, Octavian Andrei January 2005 (has links)
Interactions in the style of the ubiquitous computing paradigm are possible today, but only in handcrafted environments within one administrative and technological realm. This thesis describes an architecture (called Continuum), a design that realises the architecture, and a proof-of-concept implementation that brings ubiquitous computing to chaotic environments. Essentially, Continuum enables an ecology at the edge of the network, between users, competing service providers from overlapping administrative domains, competing internet service providers, content providers, and software developers that want to add value to the user experience. Continuum makes the ubiquitous computing functionality orthogonal to other application logic. Existing web applications are augmented for ubiquitous computing with functionality that is dynamically compiled and injected by a middleware proxy into the web pages requested by a web browser at the user?s mobile device. This enables adaptability to environment variability, manageability without user involvement, and expansibility without changes to the mobile. The middleware manipulates self-contained software units with precise functionality (called <i>frames</i>), which help the user interact with contextual services in conjunction with the data to which they are attached. The middleware and frame design explicitly incorporates the possibility of discrepancies between the assumptions of ubiquitous-computing software developers and field realities: multiple administrative domains, unavailable service, unavailable software, and missing contextual information. A framework for discovery and authorisation addresses the chaos inherent to the paradigm through the notion of <i>role assertions</i> acquired dynamically by the user. Each assertion represents service access credentials and contains bootstrapping points for service discovery on behalf of the holding user. A proof-of-concept prototype validates the design, and implements several frames that demonstrate general functionality, including driving discovery queries over multiple service discovery protocols and making equivalences between service types, across discovery protocols.
|
10 |
A Statistically Rigorous Evaluation of the Cascade Bloom Filter for Distributed Access Enforcement in Role-Based Access Control (RBAC) SystemsZitouni, Toufik January 2010 (has links)
We consider the distributed access enforcement problem for Role-Based
Access Control (RBAC) systems. Such enforcement has become important
with RBAC’s increasing adoption, and the proliferation of data that
needs to be protected. Our particular interest is in the evaluation of a
new data structure that has recently been proposed for enforcement: the
Cascade Bloom Filter. The Cascade Bloom Filter is an extension of the
Bloom filter, and provides for time- and space-efficient encodings of
sets. We compare the Cascade Bloom Filter to the Bloom Filter, and
another approach called Authorization Recycling that has been proposed
for distributed access enforcement in RBAC. One of the challenges we
address is the lack of a benchmark: we propose and justify a benchmark
for the assessment. Also, we adopt a statistically rigorous approach for
empirical assessment from recent work. We present our results for time-
and space-efficiency based on our benchmark. We demonstrate that, of the
three data structures that we consider, the Cascade Bloom Filter scales the
best with the number of RBAC sessions from the standpoints of time- and
space-efficiency.
|
Page generated in 0.0561 seconds