期刊文献+
共找到3,314篇文章
< 1 2 166 >
每页显示 20 50 100
Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents
1
作者 Fangfang Shan Zhenyu Wang +1 位作者 Mengyao Liu Menghan Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第9期3881-3902,共22页
In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This me... In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This method is aimed at organizations such as companies and schools that are transitioning from traditional access control models to the ABAC model.The manual retrieval and analysis involved in this transition are inefficient,prone to errors,and costly.Most organizations have high-level specifications defined for security policies that include a set of access control policies,which often exist in the form of natural language documents.Utilizing this rich source of information,our method effectively identifies and extracts the necessary attributes and rules for access control from natural language documents,thereby constructing and optimizing access control policies.This work transforms the problem of policy automation generation into two tasks:extraction of access control statements andmining of access control attributes.First,the Chat General Language Model(ChatGLM)isemployed to extract access control-related statements from a wide range of natural language documents by constructing unique prompts and leveraging the model’s In-Context Learning to contextualize the statements.Then,the Iterated Dilated-Convolutions-Conditional Random Field(ID-CNN-CRF)model is used to annotate access control attributes within these extracted statements,including subject attributes,object attributes,and action attributes,thus reassembling new access control policies.Experimental results show that our method,compared to baseline methods,achieved the highest F1 score of 0.961,confirming the model’s effectiveness and accuracy. 展开更多
关键词 Access control policy generation natural language deep learning
下载PDF
Policy Iteration for Optimal Control of Discrete-Time Time-Varying Nonlinear Systems 被引量:1
2
作者 Guangyu Zhu Xiaolu Li +2 位作者 Ranran Sun Yiyuan Yang Peng Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第3期781-791,共11页
Aimed at infinite horizon optimal control problems of discrete time-varying nonlinear systems,in this paper,a new iterative adaptive dynamic programming algorithm,which is the discrete-time time-varying policy iterati... Aimed at infinite horizon optimal control problems of discrete time-varying nonlinear systems,in this paper,a new iterative adaptive dynamic programming algorithm,which is the discrete-time time-varying policy iteration(DTTV)algorithm,is developed.The iterative control law is designed to update the iterative value function which approximates the index function of optimal performance.The admissibility of the iterative control law is analyzed.The results show that the iterative value function is non-increasingly convergent to the Bellman-equation optimal solution.To implement the algorithm,neural networks are employed and a new implementation structure is established,which avoids solving the generalized Bellman equation in each iteration.Finally,the optimal control laws for torsional pendulum and inverted pendulum systems are obtained by using the DTTV policy iteration algorithm,where the mass and pendulum bar length are permitted to be time-varying parameters.The effectiveness of the developed method is illustrated by numerical results and comparisons. 展开更多
关键词 Adaptive critic designs adaptive dynamic programming approximate dynamic programming optimal control policy iteration TIME-VARYING
下载PDF
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
3
作者 Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris 《Computers, Materials & Continua》 SCIE EI 2024年第9期4663-4686,共24页
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy... Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management. 展开更多
关键词 BYOD security access control access control decision-enforcement deep learning neural network techniques TabularDNN MULTILAYER dynamic adaptable FLEXIBILITY bottlenecks performance policy conflict
下载PDF
Project⁃based Pollutant Emission Control of Diesel Construction Equipment
4
作者 XIE Yixin FAN Hongqin 《施工技术(中英文)》 CAS 2024年第17期85-93,共9页
This paper examines project⁃based policies and regulations implemented globally to control and mitigate emissions from diesel⁃powered construction equipment.This study systematically reviews and analyzes various manag... This paper examines project⁃based policies and regulations implemented globally to control and mitigate emissions from diesel⁃powered construction equipment.This study systematically reviews and analyzes various managerial,regulatory,and technical measures adopted across countries and regions,mostly of advanced economy.Key strategies of control include setting emission thresholds,idling restrictions,perform remote online monitoring,operational time limits,setting low emission zones,and enforced registration systems.The review highlights the rationale,implementation details,and experiences gained from these localized approaches,reduces localized emission sources,improve urban air quality and environmental management efficiency. 展开更多
关键词 EQUIPMENT diesel emissions control policy analysis
下载PDF
Attribute-based access control policy specification language 被引量:6
5
作者 叶春晓 钟将 冯永 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期260-263,共4页
This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extens... This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extension of XACML.A-XACML is used as a simple,flexible way to express and enforce access control policies,especially attribute-based access control policy,in a variety of environments.The language and schema support include data types,functions,and combining logic which allow simple and complex policies to be defined.Finally,a system architecture and application case of user-role assignment is given to show how attribute expressions and A-XACML work in access control policy description and enforcement.The case shows that attribute expression and A-XACML can describe and enforce the complex access control policy in a simple and flexible way. 展开更多
关键词 role-based access control policy XML XACML
下载PDF
基于主动网络的Policy-control研究
6
作者 王宣政 钱德沛 马素刚 《计算机工程》 CAS CSCD 北大核心 2007年第4期102-104,共3页
结合主动网络的机制和IntServ体系结构,提出了一种主动网络支持的基于代理-管理者的策略控制机制,可以简化中间节点策略控制复杂性,保证在一个管理域中的策略一致性,并且可以实现控制策略代理的动态部署、更新。在此基础上,提出了... 结合主动网络的机制和IntServ体系结构,提出了一种主动网络支持的基于代理-管理者的策略控制机制,可以简化中间节点策略控制复杂性,保证在一个管理域中的策略一致性,并且可以实现控制策略代理的动态部署、更新。在此基础上,提出了基于发送用户的策略控制方法。 展开更多
关键词 主动网络 策略控制 RSVP
下载PDF
"Hollow Village" Evolution and Policy Control from the Perspective of Rural Urbanization: A Case Study of Jiangsu Province 被引量:2
7
作者 Han SONG 《Asian Agricultural Research》 2016年第3期22-26,共5页
From the perspective of the process of urbanization,this paper puts forward the corresponding public policy control by analyzing the characteristics of " hollowing" at different stages of urbanization. Moreo... From the perspective of the process of urbanization,this paper puts forward the corresponding public policy control by analyzing the characteristics of " hollowing" at different stages of urbanization. Moreover,the paper focuses on the stage of China's current urbanization.Based on the survey of migrant workers,this paper evaluates China's current policies,and argues that the rural " hollowing" is an objective that accompanies urbanization. At different stages of the process of urbanization,the rural " hollowing" presents different characteristics. Local governments should make policy and plan based on the different stages of local urbanization and local conditions,because of the extent of regional differences in economic and social development. This paper aims to guide the rural " hollowing" to develop toward the right direction. 展开更多
关键词 URBANIZATION process RURAL HOLLOWING STAGE characteristics policy control
下载PDF
Survey of <i>C. difficile</i>-Specific Infection Control Policies in Local Long-Term Care Facilities 被引量:2
8
作者 Laurie Archbald-Pannone 《International Journal of Clinical Medicine》 2014年第7期414-419,共6页
Introduction: The incidence and severity of Clostridium difficile infection (CDI) has been increasing and long-term care facility (LTCF) residents are at high risk given their age, co-morbidities, and high antibiotic ... Introduction: The incidence and severity of Clostridium difficile infection (CDI) has been increasing and long-term care facility (LTCF) residents are at high risk given their age, co-morbidities, and high antibiotic exposure. Infection control policies are crucial for controlling CDI, but there are currently no regulatory guidelines in the United States. Therefore, we evaluated infection control policies in local LTCFs to define the CDI-specific policies and the administrative and staff understanding of CDI, so as to identify perceived barriers for compliance. Methods: IRB approval was sought and exemption granted, all 8 local LTCFs were asked to participate. Each facility was visited by study personnel who interviewed the administrative Infection Control Practitioner (ICP) and 3-4 Licensed Practical Nurses (LPNs) with distinct survey format. Infection control policies were then compared to the SHEA recommendations for CDI in LTCFs. Results: Of the eligible facilities, 75% (n = 6) participated. ICP (n = 6) and LPNs (n = 21) were interviewed. All facilities accept residents with active CDI and 2 had written CDI-specific infection control policies. All facilities had hand hygiene or glove use policies and 2 had policies for the use of sporicidal environmental cleaning. No facility restricted antibiotic use. Each facility has a policy to instruct their staff through in-services, either annually or upon new hire, but 33% (n = 7) LPNs reported no facility-based CDI training. While 80% (n = 17) of LPNs felt comfortable with the facility CDI policies, only 11 accurately restated it. ICPs felt the most relevant barrier to staff compliance was time constraints (n = 4, 67%), however, LPNs felt it was limited knowledge (n = 10, 48%) and poor communication (n = 2, 10%). Discussion and Conclusions: With the increasing incidence and severity of CDI in LCTF, few of the facilities surveyed had CDI-specific policies. Despite CDI-specific training, there is a perceived knowledge and communication gap for staff caring for residents with CDI. 展开更多
关键词 CLOSTRIDIUM DIFFICILE INFECTION INFECTION control POLICIES Long-Term Care Facilities
下载PDF
STUDY ON THE OPTIMIZATION OF TRANSPORT CONTROL POLICY IN COMMUNICATION NETWORK 被引量:1
9
作者 Fan Shuyan Han Weizhan Lu Ran 《Journal of Electronics(China)》 2010年第2期261-266,共6页
In communication networks with policy-based Transport Control on-Demand (TCoD) function,the transport control policies play a great impact on the network effectiveness. To evaluate and optimize the transport policies ... In communication networks with policy-based Transport Control on-Demand (TCoD) function,the transport control policies play a great impact on the network effectiveness. To evaluate and optimize the transport policies in communication network,a policy-based TCoD network model is given and a comprehensive evaluation index system of the network effectiveness is put forward from both network application and handling mechanism perspectives. A TCoD network prototype system based on Asynchronous Transfer Mode/Multi-Protocol Label Switching (ATM/MPLS) is introduced and some experiments are performed on it. The prototype system is evaluated and analyzed with the comprehensive evaluation index system. The results show that the index system can be used to judge whether the communication network can meet the application requirements or not,and can provide references for the optimization of the transport policies so as to improve the communication network effectiveness. 展开更多
关键词 Communication network Comprehensive evaluation index system Network Application Effectiveness (NAE) Transport control on-Demand (TCoD) policy optimization
下载PDF
Research on the effects of command-and-control and market-oriented policy tools on China's energy conservation and emissions reduction innovation 被引量:2
10
作者 Qin Ye Shaoqing Dai Gang Zeng 《Chinese Journal of Population,Resources and Environment》 2018年第1期1-11,共11页
The impact of environmental regulation on technology innovation is a hot spot in current research where a large number of empirical studies are based on Porter Hypothesis(PH). However, there are still controversies in... The impact of environmental regulation on technology innovation is a hot spot in current research where a large number of empirical studies are based on Porter Hypothesis(PH). However, there are still controversies in academia about the establishment of "weak" and "narrow" versions of PH. Based on the panel data of application for patent of energy conservation and emission reduction(ECER) technology of Chinese city scale during 2008-2014, comprehensive energy price, pollutant emission, etc., mixed regression model and systematic generalized method of moments method were adopted, respectively,to study the impact of market-oriented and command-and-control policy tool on China's ECER technology innovation. The results show that the environmental regulation hindered the technological innovation in the immediate phase; however, it turned out to be positive in the first-lag phase. Hence, the establishment of "weak" PH is time-bounded. The command-and-control policy tool played a more positive role in promoting technological innovation in the first-lag phase than market-oriented policy tool. Therefore, "narrow" PH is not tenable. The reason is that the main participants of China's ECER technology innovation are state-owned companies and public institutions. Regionally speaking, the impact which command-and-control policy tool has on technological innovation at sight was nonsignificant in the eastern, the central, and the western regions of China whilst market-oriented policy tool had a negative effect. And market-oriented policy tool in the central region had strongest negative effect, which would diminish in the eastern region and become weakest in the western region. This was related to regional energy consumption level and the market economic vitality. 展开更多
关键词 Environmental regulation command-and-control policy tools market-oriented policy tools emissions reduction INNOVATION
下载PDF
A policy and technical measures for controlling soil and water loss in the Loess Plateau of China
11
作者 Wu Qinxiao and Li YinchuNorthwestern Institute of Soil and Water Conservation Academia sinica,Shaanxi,China 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 1990年第2期79-86,共8页
Loess Plateau is the most serious region of soil and water loss in China and the world. The sediment carried into the Yellow River amounts to 1.6 billion tons every year. This paper reviews the factors and reasons for... Loess Plateau is the most serious region of soil and water loss in China and the world. The sediment carried into the Yellow River amounts to 1.6 billion tons every year. This paper reviews the factors and reasons for erosion in this area, and puts forward a comprehensive controlling policy on the basis of the principles of ecology and practise of Chinese scientists for 40 years. In conformity with the policy, a number of technical measures for controlling soil and water loss are suggested. 展开更多
关键词 Loess Plateau soil and water loss controlling policy technical measure.
下载PDF
Visualization Framework for Inter-Domain Access Control Policy Integration
12
作者 潘理 柳宁 訾小超 《China Communications》 SCIE CSCD 2013年第3期67-75,共9页
The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- thoug... The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- though a number of policy integration and sec- urity analysis mechanisms have been devel- oped, few focus on enabling the average ad- ministrator by providing an intuitive cognitive sense about the integrated policies, which considerably undermines the usability factor. In this paper we propose a visualization flame- work for inter-domain access control policy integration, which integrates Role Based Ac- cess Control (RBAC) policies on the basis of role-mapping and then visualizes the inte- grated result. The role mapping algorithm in the framework considers the hybrid role hier- archy. It can not only satisfy the security con- straints of non-cyclic inheritance and separa- tion of duty but also make visualization easier. The framework uses role-permission trees and semantic substrates to visualize the integrated policies. Through the interactive policy query visualization, the average administrator can gain an intuitive understanding of the policy integration result. 展开更多
关键词 policy visualization policy integration role based access control role mapping
下载PDF
Detecting conflict of heterogeneous access control policies
13
作者 Mingjie Yu Fenghua Li +2 位作者 Nenghai Yu Xiao Wang Yunchuan Guo 《Digital Communications and Networks》 SCIE CSCD 2022年第5期664-679,共16页
Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,con... Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,considering background knowledge,we propose a conflict detection mechanism to search and locate conflicts of heterogeneous policies.First,we propose a general access control model to describe authorization mechanisms of cloud service and a translation scheme designed to translate a cloud service policy to an Extensible Access Control Markup Language(XACML)policy.Then the scheme based on Multi-terminal Multi-data-type Interval Decision Diagram(MTMIDD)and Extended MTMIDD(X-MTMIDD)is designed to represent XACML policy and search the conflict among heterogeneous policies.To reduce the rate of false positives,the description logic is used to represent XACML policy and eliminate false conflicts.Experimental results show the efficiency of our scheme. 展开更多
关键词 Conflict detection Access control Decision diagram policy translation Heterogeneous policy Ontology reasoner
下载PDF
COVID-19 and Unemployment: A Novel Bi-Level Optimal Control Model
14
作者 Ibrahim M.Hezam 《Computers, Materials & Continua》 SCIE EI 2021年第4期1153-1167,共15页
Since COVID-19 was declared as a pandemic in March 2020,the world’s major preoccupation has been to curb it while preserving the economy and reducing unemployment.This paper uses a novel Bi-Level Dynamic Optimal Cont... Since COVID-19 was declared as a pandemic in March 2020,the world’s major preoccupation has been to curb it while preserving the economy and reducing unemployment.This paper uses a novel Bi-Level Dynamic Optimal Control model(BLDOC)to coordinate control between COVID-19 and unemployment.The COVID-19 model is the upper level while the unemployment model is the lower level of the bi-level dynamic optimal control model.The BLDOC model’s main objectives are to minimize the number of individuals infected with COVID-19 and to minimize the unemployed individuals,and at the same time minimizing the cost of the containment strategies.We use the modified approximation Karush–Kuhn–Tucker(KKT)conditions with the Hamiltonian function to handle the bi-level dynamic optimal control model.We consider three control variables:The first control variable relates to government measures to curb the COVID-19 pandemic,i.e.,quarantine,social distancing,and personal protection;and the other two control variables relate to government interventions to reduce the unemployment rate,i.e.,employment,making individuals qualified,creating new jobs reviving the economy,reducing taxes.We investigate four different cases to verify the effect of control variables.Our results indicate that rather than focusing exclusively on only one problem,we need a balanced trade-off between controlling each. 展开更多
关键词 bi-level optimal control COVID-19 Hamiltonian function Karush-Kuhn-Tucker unemployment
下载PDF
Effects of policies and containment measures on control of COVID- 19 epidemic in Chongqing
15
作者 Xiao-Hua Liang Xian Tang +2 位作者 Ye-Tao Luo Min Zhang Ze-Pei Feng 《World Journal of Clinical Cases》 SCIE 2020年第14期2959-2976,共18页
BACKGROUND Coronavirus disease 2019(COVID-19)is an emerging,rapidly evolving disease that spreads through the respiratory system and is highly contagious.In March 2020,the World Health Organization declared the COVID-... BACKGROUND Coronavirus disease 2019(COVID-19)is an emerging,rapidly evolving disease that spreads through the respiratory system and is highly contagious.In March 2020,the World Health Organization declared the COVID-19 outbreak a pandemic.In China,the pandemic was controlled after 2 mo through effective policies and containment measures.Describing the detailed policies and containment measures used to control the epidemic in Chongqing will provide a reference for the prevention and control of COVID-19 in other areas of the world.AIM To explore the effects of different policies and containment measures on the control of the COVID-19 epidemic in Chongqing.METHODS Epidemiological data on COVID-19 in Chongqing were prospectively collected from January 21 to March 15,2020.The policies and prevention measures implemented by the government during the epidemic period were also collected.Trend analysis was performed to explore the impact of the main policy measures on the effectiveness of the control of COVID-19 in Chongqing.As of March 15,the cumulative incidence of COVID-19 in Chongqing was 1.84/100000(576 cases)and the infection fatality rate was 1.04%(6/576).The spread of COVID-19 was controlled by effective policies that involved establishing a group for directing the COVID-19 epidemic control effort;strengthening guidance and supervision;ensuring the supply of daily necessities and medical supplies and equipment to residents;setting up designated hospitals;implementing legal measures;and enhancing health education.Medical techniques were implemented to improve the recovery rate and control the epidemic.Policies such as“the lockdown of Wuhan”,“initiating a first-level response to major public health emergencies”,and“implementing the closed management of residential communities”significantly curbed the spread of COVID-19.Optimizing the diagnosis process,shortening the diagnosis time,and constructing teams of clinical experts facilitated the provision of“one team of medical experts for each patient”treatment for severe patients,which significantly improved the recovery rate and reduced the infection fatality rate.CONCLUSION The prevention policies and containment measures implemented by the government and medical institutions are highly effective in controlling the spread of the epidemic and increasing the recovery rate of COVID-19 patients. 展开更多
关键词 Prevention policies Containment measures COVID-19 Epidemic trend control effectiveness Public health
下载PDF
Research on the Policies and Means Changes of Macro Regulation and Control of Chinese and Foreign Governments
16
作者 Chengrong Cai 《Journal of Finance Research》 2017年第1期5-8,共4页
In the process of economic development, government uses the "visible hand" to achieve macroeconomic regulation and control for "market failure", which has been common knowledge among people after W... In the process of economic development, government uses the "visible hand" to achieve macroeconomic regulation and control for "market failure", which has been common knowledge among people after World War II. Comparing policy and means adopted by Chinese and foreign governments in macro regulation and control, we can see that the choice is different in different historical periods and the change of emphasis in macro regulation and control policy and means has the convergence tendency. We can make the following conclusion from research of the change rules of macro regulation and control means in the market economic condition of Chinese and foreign governments: supply-side structural reform in China complies with the basic rules of development of market economy. 展开更多
关键词 MACROECONOMIC regulation and control policy MEANS LAWS of ECONOMICS
下载PDF
Analysis on the Effect of Beijing's Traffic Control Policies
17
作者 Xinxin LI Baohua MAO Xuesong FENG 《International Journal of Technology Management》 2013年第4期93-97,共5页
With the rapid development of economy and motorization, the traffic congestion and environmental problems have become more and more serious day by day in Beijing. Therefore, traffic control policies have been graduall... With the rapid development of economy and motorization, the traffic congestion and environmental problems have become more and more serious day by day in Beijing. Therefore, traffic control policies have been gradually adopted by Beijing municipal government since 2008, so as to ease traffic and environmental problems. In this paper, the background and current situation of Beijing to implement traffic control policies are introduced, and also this measure is analyzed and evaluated from traffic effect, environmental effect, motor vehicle development, urban road development, public transport development, and balance between supply and demand, etc. Finally, related conclusions are drawn up as follows: an induced traffic volume will be generated by traffic control policies, and the effect of the traffic control will be erased by the natural growth rate of motor vehicles in three years; public traffic service should be improved for better making traffic control policies; the traffic congestion and environmental problems are alleviated by traffic control policies in the short term, but can't be fundamentally solved in the long run; traffic control policies should cooperate with other traffic demand management policies for reducing demands, and traffic condition should be optimized in both time and space, so that the traffic congestion and environmental problems will be fundamentally solved. 展开更多
关键词 TRAFFIC BEIJING Traffic control Policies Effect Analysis Motor Vehicles Traffic Demands
下载PDF
THE OPTIMAL DEDUCTIBLE AND COVERAGE IN INSURANCE CONTRACTS AND EQUILIBRIUM RISK SHARING POLICIES
18
作者 蹇玲玲 《Acta Mathematica Scientia》 SCIE CSCD 2023年第3期1347-1364,共18页
In this paper, we consider the optimal risk sharing problem between two parties in the insurance business: the insurer and the insured. The risk is allocated between the insurer and the insured by setting a deductible... In this paper, we consider the optimal risk sharing problem between two parties in the insurance business: the insurer and the insured. The risk is allocated between the insurer and the insured by setting a deductible and coverage in the insurance contract. We obtain the optimal deductible and coverage by considering the expected product of the two parties' utilities of terminal wealth according to stochastic optimal control theory. An equilibrium policy is also derived for when there are both a deductible and coverage;this is done by modelling the problem as a stochastic game in a continuous-time framework. A numerical example is provided to illustrate the results of the paper. 展开更多
关键词 deductible and coverage equilibrium policy stochastic optimal control Hamilton-Jacobi-Bellman equation
下载PDF
Research on Multicloud Access Control Policy Integration Framework
19
作者 Peng Zhao Lifa Wu +1 位作者 Zheng Hong He Sun 《China Communications》 SCIE CSCD 2019年第9期222-234,共13页
Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud mashups.XACML is widely ... Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud mashups.XACML is widely used in distributed environment as a declaratively fine-grained,attribute-based access control policy language,but the policy integration of XACML lacks formal description and theory foundation.Multicloud Access Control Policy Integration Framework(MACPIF)is proposed in the paper,which consists of Attribute-based Policy Evaluation Model(ABPEM),Four-value Logic with Completeness(FLC)and Four-value Logic based Policy Integration Operators(FLPIOs).ABPEM evaluates access control policy and extends XACML decision to four-value.According to policy decision set and policy integration characteristics,we construct FLC and define FLPIOs including Intersection,Union,Difference,Implication and Equivalence.We prove that MACPIF can achieve policy monotonicity,functional completeness,canonical suitability and canonical completeness.Analysis results show that this framework can meet the requirements of policy integration in Multicloud. 展开更多
关键词 Multicloud ACCESS control policyintegration four-value LOGIC
下载PDF
An Improved Pairing-Free Ciphertext Policy Framework for IoT
20
作者 M.Amirthavalli S.Chithra R.Yugha 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期3079-3095,共17页
Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confident... Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices.The objective of this research work is to create a framework encompassing Ciphertext policy Attribute-based Encryption scheme using block encryption and BLAKE hashing technique.An improved Pairing-Free-Ciphertext policy Attribute-based encryption algorithm has been developed to overcome the aforementioned challenges.Further,a comparative study has been performed between the proposed scheme and the different encryption algorithms.It is found that the proposed scheme scores well over the already existing schemes.The scheme is evaluated in terms of execution time and communication overhead.The robustness of the proposed scheme is also analyzed from the perspective of several security goals. 展开更多
关键词 Internet of things access control cipher policy based-attribute based encryption(CP-ABE) access matrix performance analysis
下载PDF
上一页 1 2 166 下一页 到第
使用帮助 返回顶部