期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Detecting conflict of heterogeneous access control policies
1
作者 Mingjie Yu Fenghua Li +2 位作者 Nenghai Yu Xiao Wang Yunchuan Guo 《Digital Communications and Networks》 SCIE CSCD 2022年第5期664-679,共16页
Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,con... Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,considering background knowledge,we propose a conflict detection mechanism to search and locate conflicts of heterogeneous policies.First,we propose a general access control model to describe authorization mechanisms of cloud service and a translation scheme designed to translate a cloud service policy to an Extensible Access Control Markup Language(XACML)policy.Then the scheme based on Multi-terminal Multi-data-type Interval Decision Diagram(MTMIDD)and Extended MTMIDD(X-MTMIDD)is designed to represent XACML policy and search the conflict among heterogeneous policies.To reduce the rate of false positives,the description logic is used to represent XACML policy and eliminate false conflicts.Experimental results show the efficiency of our scheme. 展开更多
关键词 conflict detection Access control Decision diagram Policy translation Heterogeneous policy Ontology reasoner
下载PDF
Aware conflict detection of non-uniform memory access system and prevention for transactional memory 被引量:3
2
作者 王睿伯 卢凯 卢锡城 《Journal of Central South University》 SCIE EI CAS 2012年第8期2266-2271,共6页
Most transactional memory (TM) research focused on multi-core processors, and others investigated at the clusters, leaving the area of non-uniform memory access (NUMA) system unexplored. The existing TM implementation... Most transactional memory (TM) research focused on multi-core processors, and others investigated at the clusters, leaving the area of non-uniform memory access (NUMA) system unexplored. The existing TM implementations made significant performance degradation on NUMA system because they ignored the slower remote memory access. To solve this problem, a latency-based conflict detection and a forecasting-based conflict prevention method were proposed. Using these techniques, the NUMA aware TM system was presented. By reducing the remote memory access and the abort rate of transaction, the experiment results show that the NUMA aware strategies present good practical TM performance on NUMA system. 展开更多
关键词 transactional memory non-uniform memory access (NUMA) conflict detection conflict prevention
下载PDF
Modeling and Global Conflict Analysis of Firewall Policy 被引量:2
3
作者 LIANG Xiaoyan XIA Chunhe +2 位作者 JIAO Jian HU Junshun LI Xiaojian 《China Communications》 SCIE CSCD 2014年第5期124-135,共12页
The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict dete... The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict detection.We research the global conflict detection algorithm in this paper.We presented a semantic model that captures more complete classifications of the policy using knowledge concept in rough set.Based on this model,we presented the global conflict formal model,and represent it with OBDD(Ordered Binary Decision Diagram).Then we developed GFPCDA(Global Firewall Policy Conflict Detection Algorithm) algorithm to detect global conflict.In experiment,we evaluated the usability of our semantic model by eliminating the false positives and false negatives caused by incomplete policy semantic model,of a classical algorithm.We compared this algorithm with GFPCDA algorithm.The results show that GFPCDA detects conflicts more precisely and independently,and has better performance. 展开更多
关键词 firewall policy semantic model conflict analysis conflict detection
下载PDF
Conflict Resolution Based on Collaborative Design of Grid Services
4
作者 LUO Zuomin ZHANG Jing ZHOU Hongfang CHEN Xinhua 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期490-494,共5页
To the issues of low efficiency of conflict resolution method in collaborative design, we proposed a method, which is conflict resolution about collaborative design based on grid services.It uses the grid services fro... To the issues of low efficiency of conflict resolution method in collaborative design, we proposed a method, which is conflict resolution about collaborative design based on grid services.It uses the grid services from the current design points, uses the method of retrospective thinking to find the conflict point by detecting, and then uses the corresponding method to resolve the conflict point according to the conflict characteristic, after that carried on the conflict detection again. If there is still the conflict, resolve the conflict point again, until the conflict no longer exists. This method combines various traditional resolution methods, makes full use of the grid idle high-performance large-scale sharing resources. With this method the collaborative design conflict resolution cost reduced and the conflict resolution efficiency was raised. And then the problem which is not handled completely was then solved, so that the conflict resolution Quality was guaranteed. 展开更多
关键词 grid services collaborative design conflict resolution conflict characteristic conflict detection
下载PDF
The Application of Constraint Satisfaction Technique in Conflict Detection and Resolution
5
作者 谢洪潮 CHEN +2 位作者 Darong Kong Xianmei 《High Technology Letters》 EI CAS 2002年第3期88-91,共4页
The conflict detection and resolution in collaborative design is a key issue to maintain multi disciplinary design consistency. This paper proposes a new method for conflict detection and resolution based on constrain... The conflict detection and resolution in collaborative design is a key issue to maintain multi disciplinary design consistency. This paper proposes a new method for conflict detection and resolution based on constraint satisfaction technique. The representation of design constraint, the interval arithmetic of the constraint satisfaction problem CSP and the conflict resolution strategy based on constraint relaxation and adjustment are introduced. A constraint satisfaction based conflict detection and resolution tool CSCDR is then developed. It can help collaborative designers to detect and resolve the conflicts in time in the early stage of the design process so that the unnecessary design iteration and repeated negotiation are avoided and the design efficiency is then much improved. A design case illustrates the effectiveness of CSCDR. 展开更多
关键词 design constraint constraint satisfaction conflict detection conflict resolution
下载PDF
Conflict detection in collaborative architectural pipe routing design based on constraint network
6
作者 苏孝钐 Tian Ling 《High Technology Letters》 EI CAS 2013年第2期117-124,共8页
This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and con... This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and conflict solution sequence.Considering pipe routing as an assembling process,a conflict detection approach for pipe routing in collaborative architectural design is proposed based on an aforementioned model.Constraint network is used to describe the relationship among pipe routing design parameters and constraints;design conflicts are detected by matching designers' input and constraint network;and detected design conflicts are reordered according to the number of pipe parameters in conflicts.In order to support the collaborative requirement of pipe routing design,a prototype system using browser/server architecture is developed.An illustrative example of water pipe routing in a room is used to show the effectiveness and efficiency of the approach. 展开更多
关键词 conflict detection constraint network piping routing collaborative design archi-tectural pipe routing
下载PDF
Research on engineering-oriented constraints conflict detection in collaborative design of wire harness technology
7
作者 LIU Xiaoping HE Honglin XU Benzhu 《Computer Aided Drafting,Design and Manufacturing》 2012年第2期13-19,共7页
Engineering-oriented constraint of harness technology has much information and project information presents progressive changes along with the design. Therefore, how to handle conflict resolution quickly is a problem ... Engineering-oriented constraint of harness technology has much information and project information presents progressive changes along with the design. Therefore, how to handle conflict resolution quickly is a problem to be solved. Process model of con- flict detection is put forward according to characteristics of harness technology design engineering-oriented constraint, and then two problems of how to conduct conflict positioning and judgment of constraint rules are introduced in this paper. Afterwards in this pa- per, constraint information directed acyclic graph is established by classified project constraint information to solve the conflict posi- tioning problem; solution of constraint satisfaction problem is applied to realize judgment problem of constraint rules. Finally, exam- ple is used to analyze the method in this paper to further verify the correctness and effectiveness of this method. 展开更多
关键词 harness technology collaborative design conflict detection engineering-oriented constraint
下载PDF
A multi-aircraft conflict detection and resolution method for 4-dimensional trajectory-based operation 被引量:10
8
作者 Siqi HAO Shaowu CHENG Yaping ZHANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2018年第7期1579-1593,共15页
Conflict Detection and Resolution(CD&R) is the key to ensure aviation safety based on Trajectory Prediction(TP). Uncertainties that affect aircraft motions cause difficulty in an accurate prediction of the trajec... Conflict Detection and Resolution(CD&R) is the key to ensure aviation safety based on Trajectory Prediction(TP). Uncertainties that affect aircraft motions cause difficulty in an accurate prediction of the trajectory, especially in the context of four-dimensional(4D) Trajectory-Based Operation(4DTBO), which brings the uncertainty of pilot intent. This study draws on the idea of time geography, and turns the research focus of CD&R from TP to an analysis of the aircraft reachable space constrained by 4D waypoint constraints. The concepts of space–time reachability of aircraft and space–time potential conflict space are proposed. A novel pre-CD&R scheme for multiple aircraft is established. A key advantage of the scheme is that the uncertainty of pilot intent is accounted for via a Space-Time Prism(STP) for aircraft. Conflict detection is performed by verifying whether the STPs of aircraft intersect or not, and conflict resolution is performed by planning a conflict-free space–time trajectory avoiding intersection. Numerical examples are presented to validate the efficiency of the proposed scheme. 展开更多
关键词 Air traffic control Collision avoidance conflict detection conflict resolution Time geography Trajectory planning
原文传递
A Conflict Detection Scheme for Concurrency Control of R-tree 被引量:1
9
作者 XIAYing PENGDa-qin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第1期49-54,共6页
Despite extensive research on R-trees, most of the proposed schemes have notbeen integrated into existing DBMS owing to the lack of protocols of concurrency control. R-linktree is an acceptable data structure to deal ... Despite extensive research on R-trees, most of the proposed schemes have notbeen integrated into existing DBMS owing to the lack of protocols of concurrency control. R-linktree is an acceptable data structure to deal with this issue, but problems like phantom still exist.In this paper, we focus on a conflict detection scheme based on R-link tree for completeconcurrency control. An in-memory operation control list is designed to suspend conflictingoperations . The main features of this approach are (1) it can be implemented easily and does notneed any extra information ; (2) No deadlocks are involved in locking scheme ; (3) Non-conflictingoperations are not restricted ; and (4) Phantom problems in R-link tree are avoided throughbeforehand predication . The experiment results show that this scheme is correct and gains bettersystem performance. 展开更多
关键词 concurrency control R-link tree phantom problem conflict detection
原文传递
Conflict detection and resolution for authorization policies in workflow systems 被引量:1
10
作者 Chen-hua MA Guo-dong LU Jiong QIU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第8期1082-1092,共11页
The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective co... The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective conflict detection and resolution methods to maintain the consistency of authorization polices in WFMSs.To address these concerns,we propose the definition of authorization policies in which context constraints are considered and the complicated requirements in WFMSs can be satisfied.Based on the definition,we put forward static and dynamic conflict detection methods for authorization policies.By defining two new concepts,the precedence establishment rule and the conflict resolution policy,we provide a flexible approach to resolving conflicts. 展开更多
关键词 Workflow management system (WFMS) Authorization policy conflict detection and resolution
原文传递
Improved Flight Conflict Detection Algorithm Based on Gauss-Hermite Particle Filter 被引量:1
11
作者 MA Lan GAO Yongsheng +1 位作者 YIN Tianyi ZHAI Wenpeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第3期269-276,共8页
In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algor... In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algorithm improves the traditional flight conflict detection method in two aspects:(i) New observation data are integrated into system state transition probability, and Gauss-Hermite Filter(GHF) is used for generating the importance density function.(ii) GHPF is used for flight trajectory prediction and flight conflict probability calculation. The experimental results show that the accuracy of conflict detection and tracing with GHPF is better than that with standard particle filter. The detected conflict probability is more precise with GHPF, and GHPF is suitable for early free flight conflict detection. 展开更多
关键词 free flight conflict detection Gauss-Hermite particle filter importance probability density function observation data
原文传递
Conflict Analysis and Detection Based on Model Checking for Spatial Access Control Policy
12
作者 Aijuan Zhang Cheng Ji +1 位作者 Yu Bao Xin Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期478-488,共11页
In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To ana... In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We designed a model-checking algorithm to detect potential conflicts by establishing formalized matrices of the policy set. Lastly, we conducted experiments to verify the performance of the algorithm using various spatial data sets and rule sets. The results show that the algorithm can detect all the formalized conflicts. Moreover, the algorithm's efficiency is more influenced by the spatial object granularity than the size of the rule set. 展开更多
关键词 spatial object MULTI-GRANULARITY conflict detection MODEL-CHECKING
原文传递
Evaluation of conflict-resolution policies on controller taskload
13
作者 Adan Ernesto VELA William SINGHOSE +2 位作者 Karen FEIGH John-Paul CLARKE Eric FERON 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第5期315-330,共16页
In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution com... In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution commands for the air traffic controller to verify and issue to aircraft.To understand the potential workload implications of introducing advisory conflict-detection and resolution tools,this paper examines a metric of controller taskload:how many resolution commands an air traffic controller issues under the guidance of an advisory system.Through a simulation study,the research presented here evaluates how the underlying protocol of a conflict-resolution tool affects the controller taskload(system demands)associated with the conflict-resolution process,and implicitly the controller workload(physical and psychological demands).Ultimately,evidence indicates that there is significant flexibility in the design of conflict-resolution algorithms supporting an advisory system. 展开更多
关键词 Air traffic control Air traffic management conflict detection and resolution Decision-support tools Simulation analysis
原文传递
Packet: a privacy-aware access control policy composition method for services composition in cloud environments 被引量:2
14
作者 Li LIN Jian HU Jianbiao ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第6期1142-1157,共16页
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p... Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service providers' access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection ef- ficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance. 展开更多
关键词 cloud service composition access control PRIVACY policy composition unified policy format conflict detection similarity analysis conflict resolution
原文传递
Survey of Safety Management Approaches to Unmanned Aerial Vehicles and Enabling Technologies 被引量:1
15
作者 Xuejun Zhang Yanshuang Du +2 位作者 Bo Gu Guoqiang Xu Yongxiang Xia 《Journal of Communications and Information Networks》 2018年第4期1-14,共14页
Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an importan... Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an important issue to investigate safety management approaches of UAVs to ensure safe and efficient operation.In this paper,we present a comprehensive overview of safety management approaches in large,middle and small scales.In large-scale safety management,path-planning problem is a crucial issue to ensure safety and ordered operation of UAVs globally.In middle-scale safety management,it is an important issue to study the conflict detection and resolution methods.And in small-scale safety management,real-time collision avoidance is the last line of ensuring safety.Moreover,a UAV can be regarded as a terminal device connected through communication and information network.Therefore,the enabling technologies,such as sensing,command and control communication,and collaborative decision-making control technology,have been studied in the last. 展开更多
关键词 UAV safety management PATH-PLANNING conflict detection and resolution collision avoidance enabling technologies
原文传递
Resources Snapshot Model for Concurrent Transactions in Multi-Core Processors
16
作者 赵雷 杨季文 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期106-118,共13页
Transaction parallelism in database systems is an attractive way of improving transaction performance. There exists two levels of transaction parallelism, inter-transaction level and intra-transaction level. With the ... Transaction parallelism in database systems is an attractive way of improving transaction performance. There exists two levels of transaction parallelism, inter-transaction level and intra-transaction level. With the advent of multi- core processors, new hopes of improving transaction parallelism appear on the scene. The greatest execution efficiency of concurrent transactions comes from the lowest dependencies of them. However, the dependencies of concurrent transactions stand in the way of exploiting parallelism. In this paper, we present Resource Snapshot Model (RSM) for resource modeling in both levels. We propose a non-restarting scheduling algorithm in the inter-transaction level and a processor assignment algorithm in the intra-transaction level in terms of multi-core processors. Through these algorithms, execution performance of transaction streams will be improved in a parallel system with multiple heterogeneous processors that have different number of cores. 展开更多
关键词 MULTI-CORE database transaction PARALLELISM CONCURRENCY conflict detection
原文传递
An authorization model for collaborative access control
17
作者 Chen-hua MA Guo-dong LU Jiong QIU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第9期699-717,共19页
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that mul... Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights.Existing approaches to access control cannot satisfy the requirements of collaborative access control.To address this concern,we propose an authorization model for collaborative access control.The central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a permission.The implementation architecture of the model is also provided.Furthermore,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies. 展开更多
关键词 Collaborative access control Collaborative permission conflict detection and resolution
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部