formal description
Recently Published Documents


TOTAL DOCUMENTS

742
(FIVE YEARS 118)

H-INDEX

25
(FIVE YEARS 2)

2022 ◽  
Vol 6 (POPL) ◽  
pp. 1-30
Author(s):  
Faustyna Krawiec ◽  
Simon Peyton Jones ◽  
Neel Krishnaswami ◽  
Tom Ellis ◽  
Richard A. Eisenberg ◽  
...  

In this paper, we give a simple and efficient implementation of reverse-mode automatic differentiation, which both extends easily to higher-order functions, and has run time and memory consumption linear in the run time of the original program. In addition to a formal description of the translation, we also describe an implementation of this algorithm, and prove its correctness by means of a logical relations argument.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Wiktor Rorot ◽  
Tomasz Korbak ◽  
Piotr Litwin ◽  
Marcin Miłkowski

Bruineberg and colleagues criticisms’ have been received but downplayed in the FEP literature. We strengthen their points, arguing that the Friston blanket discovery, even if tractable, requires a full formal description of the system of interest at the outset. Hence, blanket metaphysics is futile, and we postulate that researchers should turn back to heuristic uses of Pearl blankets.


2022 ◽  
Vol 355 ◽  
pp. 02015
Author(s):  
Xiao Li ◽  
Desheng Liu

Today, modern warfare has shifted from weapon-centric operations to network-centric system operations, which has led to a linear increase in the complexity of combat missions. When a commander faces a high-level mission, how to model the entire combat mission is a critical step, and it is also the basis for the generation of subsequent combat plans and combat command and control. Aiming at this problem, this paper proposes a task modeling method based on the OODA loop. This method first decomposes the mission task, and defines four meta tasks based on the OODA loop theory, and finally analyzes the meta tasks from the perspective of time and information. The mission relationship is defined, which can realize the modeling and formal description of the entire combat mission process, and provide support for the follow-up combat links.


2021 ◽  
Vol 1 (2) ◽  
pp. 23-25
Author(s):  
Oliver Jukić ◽  
Nenad Sikirica ◽  
Teodor Iliev ◽  
Darko Špoljar

A two-domain approach involving position and location has been introduced to provide a formal description needed for optimal organization of information processing for utilization in Location-Based Services development and operation. This paper proposes the transformation that connects the two domains (position and location), outlines its formal description, and validates the concept using the Context-Matching method as a paradigm.


Reactions ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 1-11
Author(s):  
Oleg Manaenkov ◽  
Yuriy Kosivtsov ◽  
Valentin Sapunov ◽  
Olga Kislitsa ◽  
Mikhail Sulman ◽  
...  

Despite numerous works devoted to the cellulose hydrogenolysis process, only some of them describe reaction kinetics. This is explained by the complexity of the process and the simultaneous behavior of different reactions. In this work, we present the results of the kinetic study of glucose hydrogenolysis into ethylene- and propylene glycols in the presence of Ru@Fe3O4/HPS catalyst as a part of the process of catalytic conversion of cellulose into glycols. The structure of the Ru-containing magnetically separable Ru@Fe3O4/HPS catalysts supported on the polymeric matrix of hypercrosslinked polystyrene was studied to propose the reaction scheme. As a result of this study, a formal description of the glucose hydrogenolysis process into glycols was performed. Based on the data obtained, the mathematical model of the glucose hydrogenolysis kinetics in the presence of Ru@Fe3O4/HPS was developed and the parameter estimation was carried out. The synthesized catalyst was found to be characterized by the enhanced magnetic properties and higher catalytic activity in comparison with previously developed catalytic systems (i.e., on the base of SiO2). The summarized selectivity towards the glycols formation was found to be ca. 42% at 100% of the cellulose conversion in the presence of Ru@Fe3O4/HPS.


Sign in / Sign up

Export Citation Format

Share Document