Explore chapters and articles related to this topic
Data Security and Privacy
Published in Bhavani Thuraisngham, Murat Kantarcioglu, Latifur Khan, Secure Data Science, 2022
Bhavani Thuraisngham, Murat Kantarcioglu, Latifur Khan
Due to the fact that roles are not uniform across organizations, it was felt that role-based access control was not sufficient for web-based systems. Around the same time, web services and service-oriented architectures and cloud-based systems gained popularity and are now widely used. Therefore, an access control model based on claims was developed for such an environment. This model is attribute-based access control. Here, a user makes certain claims about him or her. These claims are then verified by the organization that wants to give the user access to the resources. If the user's claims are valid, then the policies are checked as to whether such a user has access to the resources. Attribute-based access control has become extremely popular in the last decade [NIST].
Data collection, processing, and database management
Published in Zongzhi Li, Transportation Asset Management, 2018
Entity–relationship data model: An entity-relationship (E–R) model is one of the most popular object-based models studied in database literature. The E–R model is easy to understand and also powerful enough to model complex scenarios. An E–R model uses three components to describe data: entities, relationships between entities, and attributes of entities or relationships. An entity is an object that exists uniquely. It could be an event or a location. Entities in an organization cannot stay isolated. The relationship is defined to describe the association among entities. The normal relationships included in an E–R model are those of (i) belonging to; (ii) set and subset relationships; (iii) parent–child relationships; and (iv) component parts of an object. An attribute is a property of an entity type that is of interest for some purpose. An entity is thoroughly described through adding a set of attributes to be associated with it.
Computer Networks
Published in Vivek Kale, Agile Network Businesses, 2017
In order to create and display Web pages, some type of markup language is necessary. While there are many types of markup languages, we will briefly introduce three common types here: Hypertext Markup Language (HTML), dynamic Hypertext Markup Language (dynamic HTML), and Extensible Markup Language (XML). HTML, D-HTML, and XML are members of a family of markup languages called Standard Generalized Markup Language (SGML). Despite the name, SGML itself is not a markup language but a description of how to create a markup language. To put it another way, SGML is a metalanguage. HTML is a set of codes inserted into a document that is intended for display on a Web browser. The codes, or markup symbols, instruct the browser how to display a Web page’s text, images, and other elements. The individual markup codes are often referred to as tags and are surrounded by brackets (< >). Most HTML tags consist of an opening tag, followed by one or more attributes, and a closing tag. Closing tags are preceded by a forward slash (/). Attributes are parameters that specify various qualities that an HTML tag can take on. For example, a common attribute is HREF, which specifies the URL of a file in an anchor tag (<A>).
Applying digital twins for inventory and cash management in supply chains under physical and financial disruptions
Published in International Journal of Production Research, 2023
Inductive learning is a supervised learning technique that discovers decision rules from data. The decision rules are generally in the form of if–then-else statements that build a decision tree. This allows users to easily comprehend the decision-making process. The inductive learning algorithm extracts the decision rules by examining a training dataset with m examples that are represented as an attribute-value table. The attributes refer to the features or inputs of the problem and the value refers to the output of the problem that is going to be predicted. Inductive learning techniques split the training dataset into n sub-tables. One table for each possible output value. Thereafter, combinations of the attributes are derived and for each combination of the attributes, the number of occurrences of the combination in the rows of the sub-tables is counted. Then, the combinations of the attributes are sorted based on the number of occurrences in descending order and the decision rules are extracted accordingly.
A customer satisfaction centric food delivery system based on blockchain and smart contract
Published in Journal of Information and Telecommunication, 2022
A. A. Talha Talukder, Md. Anisul Islam Mahmud, Arbiya Sultana, Tahmid Hasan Pranto, AKM Bahalul Haque, Rashedur M. Rahman
In most cases, smart contracts are used to exert business logic to be checked before producing a block on the Blockchain (Yewale, 2018). When constructing a smart contract, it is common to utilize terms such as attributes, functions, modifiers, and events. Within a system, attributes represent storage variables in which values can be stored and modified. A function represents a chain of commands or processes. When a function is invoked, it performs the task indicated in the function’s body. Events and modifiers are the next two in line where events enable the blockchain transaction log to store virtually anything. After occurring an event, it creates data. The data then goes directly to transaction logs to preserve the historical data to be retrieved later. This event triggering enables the structure to be auditable. Modifiers allow the modification behaviour of the functions in smart contracts. It has a range of applications, including limiting who can unlock functions after a specified time, perform a specific function, and so on (Pranto et al., 2021). Once the agreement’s requirements are satisfied, smart contracts are immediately executed. This eliminates the need for a third party such as certain apps (Foodpanda, HungryNaki, UberEats), banks etc. The smart contract uses its agreement to control the system like a business, and the Blockchain gives a safe platform for storing and preserving data.
Flexible, decentralised access control for smart buildings with smart contracts
Published in Cyber-Physical Systems, 2022
Leepakshi Bindra, Kalvin Eng, Omid Ardakanian, Eleni Stroulia
Attribute-based access control grants access rights to users through the use of policies that combine together (with logical operators) different user, resource, object, and environment attributes [10]. In our work, we adopt this paradigm to develop a cost function that represents the sensitivity of building spaces based on their function and equipment they contain. A room with many control points, occupied by an employee in a position of authority in the organisation, is more sensitive (and is, therefore, associated with a higher cost) than the building’s reception for example. In principle, this cost function enables access-control policies to be defined based on sensitivity ranges. It also enables one to reason about the relative sensitivity of spaces and rationalise the access-granting process.