The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective co...The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective conflict detection and resolution methods to maintain the consistency of authorization polices in WFMSs.To address these concerns,we propose the definition of authorization policies in which context constraints are considered and the complicated requirements in WFMSs can be satisfied.Based on the definition,we put forward static and dynamic conflict detection methods for authorization policies.By defining two new concepts,the precedence establishment rule and the conflict resolution policy,we provide a flexible approach to resolving conflicts.展开更多
In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution com...In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution commands for the air traffic controller to verify and issue to aircraft.To understand the potential workload implications of introducing advisory conflict-detection and resolution tools,this paper examines a metric of controller taskload:how many resolution commands an air traffic controller issues under the guidance of an advisory system.Through a simulation study,the research presented here evaluates how the underlying protocol of a conflict-resolution tool affects the controller taskload(system demands)associated with the conflict-resolution process,and implicitly the controller workload(physical and psychological demands).Ultimately,evidence indicates that there is significant flexibility in the design of conflict-resolution algorithms supporting an advisory system.展开更多
A position-sensitive detector is designed for neutron detection. It uses a single continuous screen of a self-made lithium glass scintillator, rather than discrete crystal implementations, coupling with a multi-anode ...A position-sensitive detector is designed for neutron detection. It uses a single continuous screen of a self-made lithium glass scintillator, rather than discrete crystal implementations, coupling with a multi-anode PMT (MaPMT). The scintillator is fast and efficient; with a decay time of 34 ns and thermal neutron detection efficiency of around 95.8% for the 3 mm thick screen, and its light yield is around 5670 photons per neutron and 3768 photons per MeV γ rays deposition. The spatial resolution is around 1.6 mm (FWHM) with the energy resolution around 34.7% by using α (5.2 MeV) rays test.展开更多
Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an importan...Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an important issue to investigate safety management approaches of UAVs to ensure safe and efficient operation.In this paper,we present a comprehensive overview of safety management approaches in large,middle and small scales.In large-scale safety management,path-planning problem is a crucial issue to ensure safety and ordered operation of UAVs globally.In middle-scale safety management,it is an important issue to study the conflict detection and resolution methods.And in small-scale safety management,real-time collision avoidance is the last line of ensuring safety.Moreover,a UAV can be regarded as a terminal device connected through communication and information network.Therefore,the enabling technologies,such as sensing,command and control communication,and collaborative decision-making control technology,have been studied in the last.展开更多
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that mul...Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights.Existing approaches to access control cannot satisfy the requirements of collaborative access control.To address this concern,we propose an authorization model for collaborative access control.The central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a permission.The implementation architecture of the model is also provided.Furthermore,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.展开更多
基金supported by the National Natural Science Foundation of China (Nos.50705084 and 60473129)the Science and Technology Plan of Zhejiang Province,China (No.2007C13018)
文摘The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective conflict detection and resolution methods to maintain the consistency of authorization polices in WFMSs.To address these concerns,we propose the definition of authorization policies in which context constraints are considered and the complicated requirements in WFMSs can be satisfied.Based on the definition,we put forward static and dynamic conflict detection methods for authorization policies.By defining two new concepts,the precedence establishment rule and the conflict resolution policy,we provide a flexible approach to resolving conflicts.
基金funded by NASA(No.NNX08AY52A)FAA Award(No.07-C-NEGIT)+1 种基金Amendment(Nos.005,010,020)Air Force Contract(No.FA9550-08-1-0375)。
文摘In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution commands for the air traffic controller to verify and issue to aircraft.To understand the potential workload implications of introducing advisory conflict-detection and resolution tools,this paper examines a metric of controller taskload:how many resolution commands an air traffic controller issues under the guidance of an advisory system.Through a simulation study,the research presented here evaluates how the underlying protocol of a conflict-resolution tool affects the controller taskload(system demands)associated with the conflict-resolution process,and implicitly the controller workload(physical and psychological demands).Ultimately,evidence indicates that there is significant flexibility in the design of conflict-resolution algorithms supporting an advisory system.
基金Supported by the National Natural Science Foundation of China(10875140,10890092)
文摘A position-sensitive detector is designed for neutron detection. It uses a single continuous screen of a self-made lithium glass scintillator, rather than discrete crystal implementations, coupling with a multi-anode PMT (MaPMT). The scintillator is fast and efficient; with a decay time of 34 ns and thermal neutron detection efficiency of around 95.8% for the 3 mm thick screen, and its light yield is around 5670 photons per neutron and 3768 photons per MeV γ rays deposition. The spatial resolution is around 1.6 mm (FWHM) with the energy resolution around 34.7% by using α (5.2 MeV) rays test.
基金This work was supported by the National Key Laboratory of CNS/ATM,Bei-jing Key Laboratory for Network-based Cooperative Air Traffic Manage-ment and the State Key Program of National Natural Science of China(No.71731001)。
文摘Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an important issue to investigate safety management approaches of UAVs to ensure safe and efficient operation.In this paper,we present a comprehensive overview of safety management approaches in large,middle and small scales.In large-scale safety management,path-planning problem is a crucial issue to ensure safety and ordered operation of UAVs globally.In middle-scale safety management,it is an important issue to study the conflict detection and resolution methods.And in small-scale safety management,real-time collision avoidance is the last line of ensuring safety.Moreover,a UAV can be regarded as a terminal device connected through communication and information network.Therefore,the enabling technologies,such as sensing,command and control communication,and collaborative decision-making control technology,have been studied in the last.
基金Project (Nos. 2008C13073 and 2009C03015-1) supported by the Large Science and Technology Special Social Development Program of Zhejiang Province,China
文摘Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights.Existing approaches to access control cannot satisfy the requirements of collaborative access control.To address this concern,we propose an authorization model for collaborative access control.The central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a permission.The implementation architecture of the model is also provided.Furthermore,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.