This review looks over the current construction and demolition waste management(C&DWM)situations by scrutinizing the definition,classification,components,compositions,generated sources and causes,impacts of genera...This review looks over the current construction and demolition waste management(C&DWM)situations by scrutinizing the definition,classification,components,compositions,generated sources and causes,impacts of generated construction and demolition wastes(C&DWs),waste management hierarchy(WMH),3R principles(Reduce,Reuse,and Recycle),Circular Economy(CE),frameworks,tools,and approaches of C&DWM.After reviewing the literature this study contributes to the literature by the following means:(a)suitable working definitions of C&DW and C&DWM are provided,(b)an expanded WMH for construction and demolition operations is presented,(c)frameworks of C&DWM are identified and listed as follows:frameworks based on WMH,including 3R principles and CE concept,frameworks focusing on the quantification,estimation,and prediction of generated C&DW,frameworks focusing on effective and sustainable C&DWM,frameworks focusing economic,social,and environmental performance assessment,frameworks based on multi-criteria analysis(MCA),frameworks based on post-disaster recovery period,and other miscellaneous frameworks,and(d)four categories of tools utilized in C&DWM are identified and explained,namely,approaches employed in C&DWM,information technology(IT)tools employed in C&DWM,multi-criteria decision analysis(MCDA)tools employed in C&DWM,and C&DWM technologies.Moreover,this study also found that CE,and green rating system(GRS)are widely used approaches,Building Information Modeling(BIM),Radio Frequency Identification(RFID),Geographic Information System,and Big Data are the extensively used IT tools,Analytical Hierarchy Process,FUZZY,TOPSIS(Technique for Order Preference by Similarity to the Ideal Solution),Weighted Summation,Elimination and Choice Expressing the Reality II,Elimination and Choice Expressing the Reality III,Evaluation of Mixed Data,and REGIME(REG)are the widely used MCA tools in C&DWM,and Prefabricated Construction and Modular Construction are broadly used C&DWM technologies.Furthermore,it has been observed that the application of the Analytic Networking Process(ANP)and hybridization of ANP,FUZZY,and TOPSIS tools do not catch considerable attention in the literature for conducting MCA,although it yields more precise outcomes.Additionally,most previous research has focused on the estimation of generated C&DW,but less attention has been given to forecasting the generated C&DW due to inadequate available C&DW data.This review article also assists C&DWM practitioners,academics,stakeholders,and contractors in choosing appropriate frameworks and tools for C&DWM while managing C&DW.展开更多
Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users ca...Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource.Read access control allows read access of a resource by the authorized users and disallows others.An important objective of a key management is to reduce the secret key storage with each authorized user.To this end,there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario:user-based and resource-based.In this work,we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization.Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature.A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources.The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results.展开更多
Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users ca...Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource.Read access control allows read access of a resource by the authorized users and disallows others.An important objective of a key management is to reduce the secret key storage with each authorized user.To this end,there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario:user-based and resource-based.In this work,we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization.Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature.A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources.The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results.展开更多
文摘This review looks over the current construction and demolition waste management(C&DWM)situations by scrutinizing the definition,classification,components,compositions,generated sources and causes,impacts of generated construction and demolition wastes(C&DWs),waste management hierarchy(WMH),3R principles(Reduce,Reuse,and Recycle),Circular Economy(CE),frameworks,tools,and approaches of C&DWM.After reviewing the literature this study contributes to the literature by the following means:(a)suitable working definitions of C&DW and C&DWM are provided,(b)an expanded WMH for construction and demolition operations is presented,(c)frameworks of C&DWM are identified and listed as follows:frameworks based on WMH,including 3R principles and CE concept,frameworks focusing on the quantification,estimation,and prediction of generated C&DW,frameworks focusing on effective and sustainable C&DWM,frameworks focusing economic,social,and environmental performance assessment,frameworks based on multi-criteria analysis(MCA),frameworks based on post-disaster recovery period,and other miscellaneous frameworks,and(d)four categories of tools utilized in C&DWM are identified and explained,namely,approaches employed in C&DWM,information technology(IT)tools employed in C&DWM,multi-criteria decision analysis(MCDA)tools employed in C&DWM,and C&DWM technologies.Moreover,this study also found that CE,and green rating system(GRS)are widely used approaches,Building Information Modeling(BIM),Radio Frequency Identification(RFID),Geographic Information System,and Big Data are the extensively used IT tools,Analytical Hierarchy Process,FUZZY,TOPSIS(Technique for Order Preference by Similarity to the Ideal Solution),Weighted Summation,Elimination and Choice Expressing the Reality II,Elimination and Choice Expressing the Reality III,Evaluation of Mixed Data,and REGIME(REG)are the widely used MCA tools in C&DWM,and Prefabricated Construction and Modular Construction are broadly used C&DWM technologies.Furthermore,it has been observed that the application of the Analytic Networking Process(ANP)and hybridization of ANP,FUZZY,and TOPSIS tools do not catch considerable attention in the literature for conducting MCA,although it yields more precise outcomes.Additionally,most previous research has focused on the estimation of generated C&DW,but less attention has been given to forecasting the generated C&DW due to inadequate available C&DW data.This review article also assists C&DWM practitioners,academics,stakeholders,and contractors in choosing appropriate frameworks and tools for C&DWM while managing C&DW.
文摘Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource.Read access control allows read access of a resource by the authorized users and disallows others.An important objective of a key management is to reduce the secret key storage with each authorized user.To this end,there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario:user-based and resource-based.In this work,we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization.Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature.A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources.The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results.
文摘Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource.Read access control allows read access of a resource by the authorized users and disallows others.An important objective of a key management is to reduce the secret key storage with each authorized user.To this end,there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario:user-based and resource-based.In this work,we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization.Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature.A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources.The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results.