4,429 research outputs found

    On Malfunction, Mechanisms and Malware Classification

    Get PDF
    Malware has been around since the 1980s and is a large and expensive security concern today, constantly growing over the past years. As our social, professional and financial lives become more digitalised, they present larger and more profitable targets for malware. The problem of classifying and preventing malware is therefore urgent, and it is complicated by the existence of several specific approaches. In this paper, we use an existing malware taxonomy to formulate a general, language independent functional description of malware as transformers between states of the host system and described by a trust relation with its components. This description is then further generalised in terms of mechanisms, thereby contributing to a general understanding of malware. The aim is to use the latter in order to present an improved classification method for malware

    Керування доступом до ресурсів інтелектуального підприємства з використанням онтологічних моделей

    Get PDF
    This article discusses the problem of controlling access to resources of intelligent enterprise using ontology. The main purpose is to develop methods of knowledge representation, that are used in access control and methods of their use. In this paper we propose to represent knowledge in the form of ontological models. The task of access control is performed in the context of a larger system, of ontological business process modeling. The usage of ontological modeling methods allows, when compared to known access control methods RBAC and ABAC, to realize dynamic, well documented access rights granting and withdrawing in context of currently executed business processes. The results of research can be used for implementation of effective access control system in intelligent enterprise. Proposed access control method, which uses the ontological models of knowledge, allows to simplify access control process and improve overall system security.Предложено подход для управления доступом к ресурсам интеллектуального предприятия, который использует онтологические модели. По сравнению с известными методами RBAC и ABAC, предложенный метод создает возможность динамического, документированного присвоения и изъятия прав доступа к ресурсам в контексте бизнес-процессов, которые выполняются в системе.Запропоновано підхід до використання онтологічних моделей для керування доступом до ресурсів. Порівняно з відомим методами RBAC та ABAC запропонований метод створює можливість динамічного, документованого надання та вилучення прав доступу до ресурсів у контексті бізнес-процесів, які виконуються у системі

    Керування доступом до ресурсів інтелектуального підприємства з використанням онтологічних моделей

    Get PDF
    This article discusses the problem of controlling access to resources of intelligent enterprise using ontology. The main purpose is to develop methods of knowledge representation, that are used in access control and methods of their use. In this paper we propose to represent knowledge in the form of ontological models. The task of access control is performed in the context of a larger system, of ontological business process modeling. The usage of ontological modeling methods allows, when compared to known access control methods RBAC and ABAC, to realize dynamic, well documented access rights granting and withdrawing in context of currently executed business processes. The results of research can be used for implementation of effective access control system in intelligent enterprise. Proposed access control method, which uses the ontological models of knowledge, allows to simplify access control process and improve overall system security.Предложено подход для управления доступом к ресурсам интеллектуального предприятия, который использует онтологические модели. По сравнению с известными методами RBAC и ABAC, предложенный метод создает возможность динамического, документированного присвоения и изъятия прав доступа к ресурсам в контексте бизнес-процессов, которые выполняются в системе.Запропоновано підхід до використання онтологічних моделей для керування доступом до ресурсів. Порівняно з відомим методами RBAC та ABAC запропонований метод створює можливість динамічного, документованого надання та вилучення прав доступу до ресурсів у контексті бізнес-процесів, які виконуються у системі

    Faculty Research in Progress, 2018-2019

    Get PDF
    The production of scholarly research continues to be one of the primary missions of the ILR School. During a typical academic year, ILR faculty members published or had accepted for publication over 25 books, edited volumes, and monographs, 170 articles and chapters in edited volumes, numerous book reviews. In addition, a large number of manuscripts were submitted for publication, presented at professional association meetings, or circulated in working paper form. Our faculty\u27s research continues to find its way into the very best industrial relations, social science and statistics journal

    CAN MARKETING SUPPORT THE IMPLEMENTATION OF EFFECTIVE EGOVERNMENT? ANALYSIS OF THE SINGLE POINT OF ACCESS PORTAL FOR ROMANIAN ELECTRONIC PUBLIC SERVICES

    Get PDF
    The advances in technology hold great potential for helping Romanian government respond to its challenges namely, better service delivery, better procurement, efficient working and better communication with citizens and businesses. While the European Commission develops the main strategies on eGovernment, every member state has the freedom to identify its own necessities and decide according to specific social, administrative and economic context. Designing, cost setting, choosing the best supply channels or communicating with involved actors, are all marketing instruments which, if used accordingly, can ensure modern and efficient public services. This paper presents an analysis of the degree of development of public services available at the "www.e-guvernare.ro" portal, the single point of access for specific Romanian electronic public services.electronic government, public services, marketing instrument, development, internet

    An authorization model for XML databases

    Full text link
    Université de Pau et des Pays de l’Adou
    corecore