Usage Control Resource Dissemination Model Based on Fuzzy Logic
This paper analyzes the existing deficiencies and shortcomings of access control and digital resource dissemination, proposes a usage control resource dissemination model based on fuzzy logic, resolves the right control problem in the right dissemination of digital resources. In the model, because c...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 458 |
---|---|
container_issue | |
container_start_page | 454 |
container_title | |
container_volume | 3 |
creator | Fengying Wang Lei Zhao Caihong Li Zhen Cheng Qufei Zhang |
description | This paper analyzes the existing deficiencies and shortcomings of access control and digital resource dissemination, proposes a usage control resource dissemination model based on fuzzy logic, resolves the right control problem in the right dissemination of digital resources. In the model, because credibility authorization uses fuzzy integrated control, the right control to Payment-Based Type is better than certificate authorization, realizes resources dissemination control in the open network environment, and makes the authorization and revocation of rights convenient and flexible. According to the model and combined practical application, draws the flow chart based on fuzzy logic control. According to the 16 kinds of UCON ABC basic models and the specific application, a formal description for this practical system is provided. |
doi_str_mv | 10.1109/FSKD.2008.448 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4666287</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4666287</ieee_id><sourcerecordid>4666287</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-d09587e2b9e11f57868cf76df0861faad2d9537d90046f51cdddd9e686c4aaaa3</originalsourceid><addsrcrecordid>eNotjkFLwzAYhgMyUGePnrzkD7QmbfolOYl2VsWKoO48YvNlRLpGmu6w_foF9Lm8vDzw8hJyzVnBOdO37efrqigZU4UQ6oxkWiomQddVxWpYkMukpC4lAzgnWYw_LFFpoYW8IHfraLZImzDOUxjoB8awn3qkKx8j7vxoZh9G-hYsDvTBRLQ01XZ_PB5oF7a-vyILZ4aI2X8uybp9_Gqe8-796aW573LPZT3nlulaSSy_NXLuaqlA9U6CdUwBd8bY0qa_0mrGBLia9zahERT0wiSqJbn52_WIuPmd_M5Mh40AgFLJ6gRp-klx</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Usage Control Resource Dissemination Model Based on Fuzzy Logic</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Fengying Wang ; Lei Zhao ; Caihong Li ; Zhen Cheng ; Qufei Zhang</creator><creatorcontrib>Fengying Wang ; Lei Zhao ; Caihong Li ; Zhen Cheng ; Qufei Zhang</creatorcontrib><description>This paper analyzes the existing deficiencies and shortcomings of access control and digital resource dissemination, proposes a usage control resource dissemination model based on fuzzy logic, resolves the right control problem in the right dissemination of digital resources. In the model, because credibility authorization uses fuzzy integrated control, the right control to Payment-Based Type is better than certificate authorization, realizes resources dissemination control in the open network environment, and makes the authorization and revocation of rights convenient and flexible. According to the model and combined practical application, draws the flow chart based on fuzzy logic control. According to the 16 kinds of UCON ABC basic models and the specific application, a formal description for this practical system is provided.</description><identifier>ISBN: 9780769533056</identifier><identifier>ISBN: 0769533051</identifier><identifier>DOI: 10.1109/FSKD.2008.448</identifier><identifier>LCCN: 2007927066</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Authorization ; Centralized control ; Contracts ; credibility ; Environmental management ; Fuzzy control ; fuzzy integrated control ; Fuzzy logic ; Fuzzy systems ; Image databases ; Mirrors ; resource dissemination tree ; UCON ; UCONRDF</subject><ispartof>2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008, Vol.3, p.454-458</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4666287$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4666287$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Fengying Wang</creatorcontrib><creatorcontrib>Lei Zhao</creatorcontrib><creatorcontrib>Caihong Li</creatorcontrib><creatorcontrib>Zhen Cheng</creatorcontrib><creatorcontrib>Qufei Zhang</creatorcontrib><title>Usage Control Resource Dissemination Model Based on Fuzzy Logic</title><title>2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery</title><addtitle>FSKD</addtitle><description>This paper analyzes the existing deficiencies and shortcomings of access control and digital resource dissemination, proposes a usage control resource dissemination model based on fuzzy logic, resolves the right control problem in the right dissemination of digital resources. In the model, because credibility authorization uses fuzzy integrated control, the right control to Payment-Based Type is better than certificate authorization, realizes resources dissemination control in the open network environment, and makes the authorization and revocation of rights convenient and flexible. According to the model and combined practical application, draws the flow chart based on fuzzy logic control. According to the 16 kinds of UCON ABC basic models and the specific application, a formal description for this practical system is provided.</description><subject>Access control</subject><subject>Authorization</subject><subject>Centralized control</subject><subject>Contracts</subject><subject>credibility</subject><subject>Environmental management</subject><subject>Fuzzy control</subject><subject>fuzzy integrated control</subject><subject>Fuzzy logic</subject><subject>Fuzzy systems</subject><subject>Image databases</subject><subject>Mirrors</subject><subject>resource dissemination tree</subject><subject>UCON</subject><subject>UCONRDF</subject><isbn>9780769533056</isbn><isbn>0769533051</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjkFLwzAYhgMyUGePnrzkD7QmbfolOYl2VsWKoO48YvNlRLpGmu6w_foF9Lm8vDzw8hJyzVnBOdO37efrqigZU4UQ6oxkWiomQddVxWpYkMukpC4lAzgnWYw_LFFpoYW8IHfraLZImzDOUxjoB8awn3qkKx8j7vxoZh9G-hYsDvTBRLQ01XZ_PB5oF7a-vyILZ4aI2X8uybp9_Gqe8-796aW573LPZT3nlulaSSy_NXLuaqlA9U6CdUwBd8bY0qa_0mrGBLia9zahERT0wiSqJbn52_WIuPmd_M5Mh40AgFLJ6gRp-klx</recordid><startdate>200810</startdate><enddate>200810</enddate><creator>Fengying Wang</creator><creator>Lei Zhao</creator><creator>Caihong Li</creator><creator>Zhen Cheng</creator><creator>Qufei Zhang</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200810</creationdate><title>Usage Control Resource Dissemination Model Based on Fuzzy Logic</title><author>Fengying Wang ; Lei Zhao ; Caihong Li ; Zhen Cheng ; Qufei Zhang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-d09587e2b9e11f57868cf76df0861faad2d9537d90046f51cdddd9e686c4aaaa3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Access control</topic><topic>Authorization</topic><topic>Centralized control</topic><topic>Contracts</topic><topic>credibility</topic><topic>Environmental management</topic><topic>Fuzzy control</topic><topic>fuzzy integrated control</topic><topic>Fuzzy logic</topic><topic>Fuzzy systems</topic><topic>Image databases</topic><topic>Mirrors</topic><topic>resource dissemination tree</topic><topic>UCON</topic><topic>UCONRDF</topic><toplevel>online_resources</toplevel><creatorcontrib>Fengying Wang</creatorcontrib><creatorcontrib>Lei Zhao</creatorcontrib><creatorcontrib>Caihong Li</creatorcontrib><creatorcontrib>Zhen Cheng</creatorcontrib><creatorcontrib>Qufei Zhang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Fengying Wang</au><au>Lei Zhao</au><au>Caihong Li</au><au>Zhen Cheng</au><au>Qufei Zhang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Usage Control Resource Dissemination Model Based on Fuzzy Logic</atitle><btitle>2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery</btitle><stitle>FSKD</stitle><date>2008-10</date><risdate>2008</risdate><volume>3</volume><spage>454</spage><epage>458</epage><pages>454-458</pages><isbn>9780769533056</isbn><isbn>0769533051</isbn><abstract>This paper analyzes the existing deficiencies and shortcomings of access control and digital resource dissemination, proposes a usage control resource dissemination model based on fuzzy logic, resolves the right control problem in the right dissemination of digital resources. In the model, because credibility authorization uses fuzzy integrated control, the right control to Payment-Based Type is better than certificate authorization, realizes resources dissemination control in the open network environment, and makes the authorization and revocation of rights convenient and flexible. According to the model and combined practical application, draws the flow chart based on fuzzy logic control. According to the 16 kinds of UCON ABC basic models and the specific application, a formal description for this practical system is provided.</abstract><pub>IEEE</pub><doi>10.1109/FSKD.2008.448</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769533056 |
ispartof | 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008, Vol.3, p.454-458 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4666287 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Authorization Centralized control Contracts credibility Environmental management Fuzzy control fuzzy integrated control Fuzzy logic Fuzzy systems Image databases Mirrors resource dissemination tree UCON UCONRDF |
title | Usage Control Resource Dissemination Model Based on Fuzzy Logic |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T22%3A59%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Usage%20Control%20Resource%20Dissemination%20Model%20Based%20on%20Fuzzy%20Logic&rft.btitle=2008%20Fifth%20International%20Conference%20on%20Fuzzy%20Systems%20and%20Knowledge%20Discovery&rft.au=Fengying%20Wang&rft.date=2008-10&rft.volume=3&rft.spage=454&rft.epage=458&rft.pages=454-458&rft.isbn=9780769533056&rft.isbn_list=0769533051&rft_id=info:doi/10.1109/FSKD.2008.448&rft_dat=%3Cieee_6IE%3E4666287%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4666287&rfr_iscdi=true |