779,050 research outputs found
ConXsense - Automated Context Classification for Context-Aware Access Control
We present ConXsense, the first framework for context-aware access control on
mobile devices based on context classification. Previous context-aware access
control systems often require users to laboriously specify detailed policies or
they rely on pre-defined policies not adequately reflecting the true
preferences of users. We present the design and implementation of a
context-aware framework that uses a probabilistic approach to overcome these
deficiencies. The framework utilizes context sensing and machine learning to
automatically classify contexts according to their security and privacy-related
properties. We apply the framework to two important smartphone-related use
cases: protection against device misuse using a dynamic device lock and
protection against sensory malware. We ground our analysis on a sociological
survey examining the perceptions and concerns of users related to contextual
smartphone security and analyze the effectiveness of our approach with
real-world context data. We also demonstrate the integration of our framework
with the FlaskDroid architecture for fine-grained access control enforcement on
the Android platform.Comment: Recipient of the Best Paper Awar
The automated multi-stage substructuring system for NASTRAN
The substructuring capability developed for eventual installation in Level 16 is now operational in a test version of NASTRAN. Its features are summarized. These include the user-oriented, Case Control type control language, the automated multi-stage matrix processing, the independent direct access data storage facilities, and the static and normal modes solution capabilities. A complete problem analysis sequence is presented with card-by-card description of the user input
An automated model-based test oracle for access control systems
In the context of XACML-based access control systems, an intensive testing
activity is among the most adopted means to assure that sensible information or
resources are correctly accessed. Unfortunately, it requires a huge effort for
manual inspection of results: thus automated verdict derivation is a key aspect
for improving the cost-effectiveness of testing. To this purpose, we introduce
XACMET, a novel approach for automated model-based oracle definition. XACMET
defines a typed graph, called the XAC-Graph, that models the XACML policy
evaluation. The expected verdict of a specific request execution can thus be
automatically derived by executing the corresponding path in such graph. Our
validation of the XACMET prototype implementation confirms the effectiveness of
the proposed approach.Comment: 7 page
Development of preliminary design concept for multifunction display and control system for Orbiter crew station. Task 3: Concept analysis
The access schema developed to access both individual switch functions as well as automated or semiautomated procedures for the orbital maneuvering system and electrical power and distribution and control system discussed and the operation of the system is described. Feasibility tests and analyses used to define display parameters and to select applicable hardware choices for use in such a system are presented and the results are discussed
Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9
Access control policies are used to restrict access to sensitive records for
authorized users only. One approach for specifying policies is using role based
access control (RBAC) where authorization is given to roles instead of users.
Users are assigned to roles such that each user can access all the records that
are allowed to his/her role. RBAC has a great interest because of its
flexibility. One issue in RBAC is dealing with constraints. Usually, policies
should satisfy pre-defined constraints as for example separation of duty (SOD)
which states that users are not allowed to play two conflicting roles.
Verifying the satisfiability of constraints based on policies is time consuming
and may lead to errors. Therefore, an automated verification is essential. In
this paper, we propose a theory for specifying policies and constraints in
first order logic. Furthermore, we present a comprehensive list of constraints.
We identity constraints based on the relation between users and roles, between
roles and permission on records, between users and permission on records, and
between users, roles, and permission on records. Then, we use a general purpose
theorem prover tool called Prover9 for proving the satisfaction of constraints.Comment: 10 pages in International Journal of Security, Privacy and Trust
Management (IJSPTM) Vol 4, No 1, February 201
Automated knowledge generation
The general objectives of the NASA/UCF Automated Knowledge Generation Project were the development of an intelligent software system that could access CAD design data bases, interpret them, and generate a diagnostic knowledge base in the form of a system model. The initial area of concentration is in the diagnosis of the process control system using the Knowledge-based Autonomous Test Engineer (KATE) diagnostic system. A secondary objective was the study of general problems of automated knowledge generation. A prototype was developed, based on object-oriented language (Flavors)
A Python based automated tracking routine for myosin II filaments
The study of motor protein dynamics within cytoskeletal networks is of high interest to physicists and biologists to understand how the dynamics and properties of individual motors lead to cooperative effects and control of overall network behaviour. Here, we report a method to detect and track muscular myosin II filaments within an actin network tethered to supported lipid bilayers. Based on the characteristic shape of myosin II filaments, this automated tracking routine allowed us to follow the position and orientation of myosin II filaments over time, and to reliably classify their dynamics into segments of diffusive and processive motion based on the analysis of displacements and angular changes between time steps. This automated, high throughput method will allow scientists to efficiently analyse motor dynamics in different conditions, and will grant access to more detailed information than provided by common tracking methods, without any need for time consuming manual tracking or generation of kymographs
- …
