13 research outputs found

    Aorist in French and its semantic equivalents in Serbian

    No full text
    Predmet istraživanja ove doktorske disertacije jeste semantička kontrastivna analiza aorista i njegovih značenjskih ekvivalenata u srpskom jeziku. Njen cilj je da se opišu, analiziraju i kontrastiraju semantike aorista u francuskom i srpskom jeziku, ali i da se analizom korpusa utvrde svi glagolski oblici u srpskom jeziku koji sadrže semantičku prirodu francuskog aorista, zbog čega se i javljaju kao njegovi prevodni ekvivalenti. Pritom, zadatak je bio rasvetliti sisteme glagolskih vremena ova dva jezika u svetlu Teorije optimaliteta, budući da su njihova analiza i opis od presudne važnosti za razjašnjenje izbora prevodnog ekvivalenta. Zapravo, glavna razlika sistema glagolskih vremena u srpskom i francuskom jeziku jeste različito izražavanje vidske informacije, jer je u francuskom kategorija aspekta enkodirana putem opozicije glagolskih vremena aorist/imperfekat, dok je u srpskom (i drugim slovenskim jezicima), ona morfološki izražena pomoću opozicije svršenih i nesvršenih glagola. U radu smo koristili metodu kontrastivne analize primera iz korpusa sačinjenog od šest francuskih romana i njihovih srpskih prevodnih verzija, kao i dva srpska romana i njihovih francuskih prevoda. Na osnovu analize korpusa, utvrđeno je prisustvo perfektivnog perfekta, aorista, pripovedačkog prezenta, ali i imperfektivnog perfekta u srpskim prevodima izabranih francuskih romana. Posebno su značajni slučajevi upotrebe francuskog aorista interne fokalizacije, kao i srpskog inkoativnog aorista pri čemu je od posebne važnosti bilo ispitati kako se inkoativnost izražava u srpskom jeziku, a kako u francuskom jeziku, i da li postoji odstupanje u značenjskoj nijansi.The subject of research of this doctoral dissertation is the semantics contrastive linguistics analysis of aorist and its semantic equivalents in the Serbian language. The goal is to describe, analyze and contrast the semantics of aorists in French and Serbian, but also interpreting the corpus to find all verb forms in Serbian that contain the semantic feature of the French aorist, thus, the reason why they occur as its translation equivalents. In doing so, the task was to depict the systems of verb tenses of these two languages taking into account the Optimality Theory since their analysis and description are crucial for clarifying the choice of the translation equivalents. The main distinction between the system of verb tenses in Serbian and French is the different expression of verbal aspect since, in French, the category of form is encoded through the opposition of verb tenses aorist/imperfect whereas in Serbian, (as well as other Slavic languages) it is morphologically expressed by the opposition perfective and imperfective verbs. In the thesis, we used the method of analysis of examples from a corpus composed of six French novels and their versions translated in Serbian, as well as two Serbian novels with their French translations. The presence of the perfective perfect, aorist, narrative present, but also the imperfective perfect in Serbian translations of selected French novels were found by analyzing the corpus. The instances of the use of the French aorist of internal focalization, along with the Serbian inchoative aorist, are particularly significant, whereby the research on how is inchoation expressed in both Serbian and French was especially important, as well as to inspect whether there are any discrepancies in meaning

    Constraint Branching in Workflow Satisfiability Problem

    Get PDF

    From Conventional to State-of-the-Art IoT Access Control Models

    Get PDF
    open access articleThe advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the sam

    Towards assessing information privacy in microblogging online social networks. The IPAM framework

    Get PDF
    Les xarxes socials en línia incorporen diferents formes de comunicació interactiva com serveis de microblogs, compartició de fitxers multimèdia o xarxes de contactes professionals. En els últims anys han augmentat els escàndols públics en relació amb pràctiques qüestionables de la indústria de les xarxes socials pel que fa a la privacitat. Així, doncs, cal una avaluació efectiva i eficient del nivell de privacitat en les xarxes socials en línia. El focus de la present tesi és la construcció d'un esquema (IPAM) per a identificar i avaluar el nivell de privacitat proporcionat per les xarxes socials en línia, en particular per als serveis de microblogs. L'objectiu d'IPAM és ajudar els usuaris a identificar els riscos relacionats amb les seves dades. L'esquema també permet comparar el nivell de protecció de la privacitat entre diferents sistemes analitzats, de manera que pugui ser també utilitzat per proveïdors de servei i desenvolupadors per a provar i avaluar els seus sistemes i si les tècniques de privacitat usades són eficaces i suficients.Las redes sociales en línea incorporan diferentes formas de comunicación interactiva como servicios de microblogueo, compartición de ficheros multimedia o redes de contactos profesionales. En los últimos años han aumentado los escándalos públicos relacionados con prácticas cuestionables de la industria de las redes sociales en relación con la privacidad. Así pues, es necesaria una evaluación efectiva y eficiente del nivel de privacidad en las redes sociales en línea. El foco de la presente tesis es la construcción de un esquema (IPAM) para identificar y evaluar el nivel de privacidad proporcionado por las redes sociales en línea, en particular para los servicios de microblogueo. El objetivo de IPAM es ayudar a los usuarios a identificar los riesgos relacionados con sus datos. El esquema también permite comparar el nivel de protección de la privacidad entre diferentes sistemas analizados, de modo que pueda ser también utilizado por proveedores de servicio y desarrolladores para probar y evaluar sus sistemas y si las técnicas de privacidad usadas son eficaces y suficientes.Online social networks (OSNs) incorporate different forms of interactive communication, including microblogging services, multimedia sharing and business networking, among others. In recent years there has been an increase in the number of privacy-related public scandals involving questionable data handling practices in OSNs. This situation calls for an effective and efficient evaluation of the privacy level provided by such services. In this thesis, we take initial steps towards developing an information privacy assessment framework (IPAM framework) to compute privacy scores for online social networks in general, and microblogging OSNs in particular. The aim of the proposed framework is to help users identify personal data-related risks and how their privacy is protected when using one OSN or another. The IPAM framework also allows for a comparison between different systems' privacy protection level. This gives system providers, not only an idea of how they are positioned in the market vis-à-vis their competitors, but also recommendations on how to enhance their services

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Get PDF
    The study of canonically complete attribute-based access control (ABAC) languages is relatively new. A canonically complete language is useful as it is functionally complete and provides a "normal form" for policies. However, previous work on canonically complete ABAC languages requires that the set of authorization decisions is totally ordered, which does not accurately reflect the intuition behind the use of the allow, deny and not-applicable decisions in access control. A number of recent ABAC languages use a fourth value and the set of authorization decisions is partially ordered. In this paper, we show how canonical completeness in multi-valued logics can be extended to the case where the set of truth values forms a lattice. This enables us to investigate the canonical completeness of logics having a partially ordered set of truth values, such as Belnap logic, and show that ABAC languages based on Belnap logic, such as PBel, are not canonically complete. We then construct a canonically complete four-valued logic using connections between the generators of the symmetric group (defined over the set of decisions) and unary operators in a canonically suitable logic. Finally, we propose a new authorization language PTaCL4\text{PTaCL}_{\sf 4}^{\leqslant}, an extension of PTaCL, which incorporates a lattice-ordered decision set and is canonically complete. We then discuss how the advantages of PTaCL4\text{PTaCL}_{\sf 4}^{\leqslant} can be leveraged within the framework of XACML

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Get PDF
    corecore