期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Conflict detection and resolution for authorization policies in workflow systems 被引量:1
1
作者 Chen-hua MA Guo-dong LU Jiong QIU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第8期1082-1092,共11页
The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective co... The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective conflict detection and resolution methods to maintain the consistency of authorization polices in WFMSs.To address these concerns,we propose the definition of authorization policies in which context constraints are considered and the complicated requirements in WFMSs can be satisfied.Based on the definition,we put forward static and dynamic conflict detection methods for authorization policies.By defining two new concepts,the precedence establishment rule and the conflict resolution policy,we provide a flexible approach to resolving conflicts. 展开更多
关键词 Workflow management system (WFMS) Authorization policy Conflict detection and resolution
原文传递
Evaluation of conflict-resolution policies on controller taskload
2
作者 Adan Ernesto VELA William SINGHOSE +2 位作者 Karen FEIGH John-Paul CLARKE Eric FERON 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第5期315-330,共16页
In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution com... In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution commands for the air traffic controller to verify and issue to aircraft.To understand the potential workload implications of introducing advisory conflict-detection and resolution tools,this paper examines a metric of controller taskload:how many resolution commands an air traffic controller issues under the guidance of an advisory system.Through a simulation study,the research presented here evaluates how the underlying protocol of a conflict-resolution tool affects the controller taskload(system demands)associated with the conflict-resolution process,and implicitly the controller workload(physical and psychological demands).Ultimately,evidence indicates that there is significant flexibility in the design of conflict-resolution algorithms supporting an advisory system. 展开更多
关键词 Air traffic control Air traffic management Conflict detection and resolution Decision-support tools Simulation analysis
原文传递
A position-sensitive detector with lithium glass and MaPMT
3
作者 付在伟 贾茹 +9 位作者 衡月昆 祁鸣 黄长浩 刘术林 钱森 李绍莉 陈晓辉 刘曙东 雷祥翠 黄国瑞 《Chinese Physics C》 SCIE CAS CSCD 2012年第11期1095-1100,共6页
A position-sensitive detector is designed for neutron detection. It uses a single continuous screen of a self-made lithium glass scintillator, rather than discrete crystal implementations, coupling with a multi-anode ... A position-sensitive detector is designed for neutron detection. It uses a single continuous screen of a self-made lithium glass scintillator, rather than discrete crystal implementations, coupling with a multi-anode PMT (MaPMT). The scintillator is fast and efficient; with a decay time of 34 ns and thermal neutron detection efficiency of around 95.8% for the 3 mm thick screen, and its light yield is around 5670 photons per neutron and 3768 photons per MeV γ rays deposition. The spatial resolution is around 1.6 mm (FWHM) with the energy resolution around 34.7% by using α (5.2 MeV) rays test. 展开更多
关键词 lithium glass detection efficiency light yield decay time MaPMT spatial resolution
原文传递
Survey of Safety Management Approaches to Unmanned Aerial Vehicles and Enabling Technologies 被引量:1
4
作者 Xuejun Zhang Yanshuang Du +2 位作者 Bo Gu Guoqiang Xu Yongxiang Xia 《Journal of Communications and Information Networks》 2018年第4期1-14,共14页
Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an importan... Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an important issue to investigate safety management approaches of UAVs to ensure safe and efficient operation.In this paper,we present a comprehensive overview of safety management approaches in large,middle and small scales.In large-scale safety management,path-planning problem is a crucial issue to ensure safety and ordered operation of UAVs globally.In middle-scale safety management,it is an important issue to study the conflict detection and resolution methods.And in small-scale safety management,real-time collision avoidance is the last line of ensuring safety.Moreover,a UAV can be regarded as a terminal device connected through communication and information network.Therefore,the enabling technologies,such as sensing,command and control communication,and collaborative decision-making control technology,have been studied in the last. 展开更多
关键词 UAV safety management PATH-PLANNING conflict detection and resolution collision avoidance enabling technologies
原文传递
An authorization model for collaborative access control
5
作者 Chen-hua MA Guo-dong LU Jiong QIU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第9期699-717,共19页
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that mul... Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights.Existing approaches to access control cannot satisfy the requirements of collaborative access control.To address this concern,we propose an authorization model for collaborative access control.The central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a permission.The implementation architecture of the model is also provided.Furthermore,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies. 展开更多
关键词 Collaborative access control Collaborative permission Conflict detection and resolution
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部