نتایج جستجو برای: role
تعداد نتایج: 1251012 فیلتر نتایج به سال:
Binding of Duty (BOD) constraints define that the same subject (or role) who performed a certain task t1 must also perform a corresponding bound task t2. In this paper, we describe algorithms for checking the satisfiability of binding constraints in a business process context. In particular, these algorithms check the configuration of a process-related RBAC model to find satisfiability conflict...
Attribute-based Access Control (ABAC) was recently proposed as a general model which is able to capture the main existing access control models. This paper discusses the problems of configuring ABAC and engineering access policies. We question how to design attributes, how to assign attributes to subjects, objects, actions, and how to formulate access policies which bind subjects to objects and...
The United Kingdom National Health Service strategy is to have a full electronic health records service available nationally by 2008. Secure, scalable, access control infrastructure will be critical to the success of such an initiative. To this end, a prototype for such a service, built over the OASIS role-based access control architecture is presented. How the implementation achieves scalabili...
Administrative role-based access control (ARBAC) is the first comprehensive administrative model proposed for role-based access control (RBAC). ARBAC has several features for designing highly expressive policies, but current work has not highlighted the utility of these expressive policies. In this report, we present a case study of designing an ARBAC policy for a bank comprising 18 branches. U...
This paper presents a system for Semantic Role Labeling (SRL) for the CoNLL 2004 shared task (Carreras and Màrquez, 2004). The task is divided into two sub-tasks, recognition and labeling. These are performed independently with different feature representations. Both modules are based on the principle of memory-based learning. For the first module, we use the IOB2 format to determine whether a ...
We present a semantic parsing system to decompose a sentence into semantic-expressions/concepts for ESWC’14 semantic analysis challenge. The proposed system has a pipeline architecture, and is based on syntactic parsing and semantic role labeling of the candidate sentence. For the former task, we use Stanford English parser; and for the later task, we use an in-house developed semantic role lab...
En las diferentes instituciones del sector salud del Perú, los médicos reciben y asisten diariamente a personas con traumatismos ocasionados por agresiones intradomiciliarias. Por otra parte, las autoridades policiales, fiscal o judicial solicitan a los médicos una descripción detallada de las lesiones con la respectiva identificación de los agentes causantes (objetos contundentes, arma blanca,...
Privacy concerns keep users from sharing required information in a collaborative environment. There is a need of privacy preserving methods that can enhance flow of information among collaborating users in dynamic teams without compromising their privacy. We describe a user-defined rolebased sharing control model and architecture that uses hybrid roles and hybrid sharing control policy for the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید