scholarly journals Specifying and verifying usage control models and policies in TLA$$^+$$

Author(s):  
Christos Grompanopoulos ◽  
Antonios Gouglidis ◽  
Anastasia Mavridou
Keyword(s):  
2018 ◽  
Vol 272 ◽  
pp. 52-64 ◽  
Author(s):  
Antonios Gouglidis ◽  
Christos Grompanopoulos ◽  
Anastasia Mavridou

2014 ◽  
Vol 886 ◽  
pp. 605-608
Author(s):  
Fei Liu

During the applications development of pervasive computing, access control is new demands advanced by pervasive computing. Usage Control models are used to solve access control. This paper uses these models to solve problem of access control in Pervasive Computing environment and provides a model of Usage Control in Pervasive Computing (UCONpc), context information and delegation rights satisfy the features of access control in pervasive computing system.


2012 ◽  
Vol 433-440 ◽  
pp. 4590-4596
Author(s):  
Hai Ying Wu

Traditional access control models through search Access Control List(ACL) to authorize [1-3]. Traditional access control models fail to satisfy the modern information system, thus Usage Control( UCON ) models were produced and fundamentally enhanced the traditional access control. The UCON models are considered as the next generation access control models. This paper is organized as follow. Section 1 introduces the Usage Control models. Section 2 introduces Regular Grammar ( RG ). Section 3 gives the RG of the 16 core ABC UCON models. Section 4 gives the RG of on-line antivirus procedure. Finally, section 5 summarizes this paper.


2012 ◽  
Vol 48 ◽  
Author(s):  
KESHNEE PADAYACHEE ◽  
J.H.P. Eloff

This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to discourage individuals from intentionally violating information security policies or procedures. In this context, an adaptation of usage control is assessed as a proactive means of deterrence control to protect information that cannot be adequately or reasonably protected by access control. These deterrents are evaluated using the design science methodology. Parallel prototypes were developed with the aim of producing multiple alternatives, thereby shifting the focus from purely usability testing to model testing.


Author(s):  
O. I. Admakin ◽  
I. A. Solop ◽  
A. D. Oksentyuk

Relevance. The narrowing of the maxilla is one of the most common pathologies in orthodontics. Recent studies show that the narrowing is always asymmetric which is connected to the rotation of the maxilla. To choose the treatment correctly one need a calculation that reveals the asymmetry, which is impossible with using standard indexes.Purpose – to compare efficiency of indexes of Pont and Korkhause with the Kernott's method in patients with narrowing of the maxilla.Materials and methods. The study involved 35 children aged from 8 to 12 years old undergoing dental treatment in the University Children's Clinical Hospital of the First Moscow State Medical University with no comorbidities. For every patient a gypsum model was prepared and after that to carry out the biometrical calculation. In this study two indexes were used: Pont's index and Korkhause's; using this standard analysis the narrowing of the maxilla was revealed. After using Pont's Index and Korkhaus analysis all the models were calculated by the method of Kernott with Kernott's dynamic pentagon.Results. As a result of the analysis of the control diagnostic models a narrowing of the maxilla in 69% of cases (n = 24) was revealed in all cases, the deviation of the size of the dentition was asymmetric. Thus, 65% of the surveyed models showed a narrowing on the right. This narrowing was of a different severity and averaged 15 control models.Conclusions. This shows that for the biometrics of diagnostic models it is necessary to use methods that allow to estimate the width of the dentition rows on the left and on the right separately. To correct the asymmetric narrowing of the dentition, it is preferable to use non-classical expanding devices that act equally on the left and right sides separetly.


2020 ◽  
Vol 9 (12) ◽  
pp. 10397-10417
Author(s):  
A. Kabulov ◽  
I. Normatov ◽  
A. Karimov ◽  
E. Navruzov

Sign in / Sign up

Export Citation Format

Share Document