control model
Recently Published Documents


TOTAL DOCUMENTS

4228
(FIVE YEARS 806)

H-INDEX

66
(FIVE YEARS 7)

2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Vol 2022 ◽  
pp. 1-16
Author(s):  
Abayneh Kebede Fantaye ◽  
Zerihun Kinfe Birhanu

In this study, a deterministic mathematical model that explains the transmission dynamics of corruption is proposed and analyzed by considering social influence on honest individuals. Positivity and boundedness of solution of the model are proved and basic reproduction number R 0 is computed using the next-generation matrix method. The analysis shows that corruption-free equilibrium is locally and globally asymptotically stable whenever R 0 < 1 . Also, the endemic equilibrium point is locally and globally asymptotically stable whenever R 0 > 1 . Then, the model was extended to optimal control, and some numerical simulations with and without optimal control are also performed to verify the theoretical analysis using MATLAB. Numerical simulation of optimal control model shows that the prevention and punishment strategy is the most effective strategy to reduce the dynamic transmission of corruption.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


BMC Biology ◽  
2022 ◽  
Vol 20 (1) ◽  
Author(s):  
Jonas Håkansson ◽  
Weili Jiang ◽  
Qian Xue ◽  
Xudong Zheng ◽  
Ming Ding ◽  
...  

Abstract Background Rodent ultrasonic vocalizations (USVs) are crucial to their social communication and a widely used translational tool for linking gene mutations to behavior. To maximize the causal interpretation of experimental treatments, we need to understand how neural control affects USV production. However, both the aerodynamics of USV production and its neural control remain poorly understood. Results Here, we test three intralaryngeal whistle mechanisms—the wall and alar edge impingement, and shallow cavity tone—by combining in vitro larynx physiology and individual-based 3D airway reconstructions with fluid dynamics simulations. Our results show that in the mouse and rat larynx, USVs are produced by a glottal jet impinging on the thyroid inner wall. Furthermore, we implemented an empirically based motor control model that predicts motor gesture trajectories of USV call types. Conclusions Our results identify wall impingement as the aerodynamic mechanism of USV production in rats and mice. Furthermore, our empirically based motor control model shows that both neural and anatomical components contribute to USV production, which suggests that changes in strain specific USVs or USV changes in disease models can result from both altered motor programs and laryngeal geometry. Our work provides a quantitative neuromechanical framework to evaluate the contributions of brain and body in shaping USVs and a first step in linking descending motor control to USV production.


2022 ◽  
Vol 5 (2) ◽  
pp. 58-65
Author(s):  
Hardawan Kakashekh ◽  
Araz Ahmad ◽  
Sujita Kar ◽  
Omar Feizi ◽  
S. M. Yasir Arafat

The coronavirus pandemic has reached almost every country in the world. The pandemic and its response have had several short-term as well as long term impacts on human health, society, economy, and environment. For instance, the severe lockdowns imposed in certain countries have caused a widespread economic and humanitarian crisis. Therefore, it is crucial to draw important lessons from this pandemic to amplify our future preparedness and response capacities to similar situations. In this paper, the response strategies utilized by Iraq and Iran is analyzed with comparison of the impacts and outcomes of each strategy used for controlling the spread of the COVID-19 virus. The results show that travel ban, restrictive containment, and supports from the international community in controlling the spread of the virus had a more positive impact in Iraq compared to Iran.


Sign in / Sign up

Export Citation Format

Share Document