A blockchain-based architecture for trust in collaborative scientific experimentation

R Coelho, R Braga, JMN David, V Stroele… - Journal of Grid …, 2022 - Springer
In scientific collaboration, data sharing, the exchange of ideas and results are essential to
knowledge construction and the development of science. Hence, we must guarantee …

A blockchain-based framework in support of privacy preferences enforcement for scientific workflows

F Daidone, B Carminati, E Ferrari - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Scientific workflows are today a vital tool for computational science, enabling the definition
and execution of complex applications in heterogeneous and often distributed …

Towards a seco for carbon credit control

LF Santos, J Gomes, R Braga… - 2023 IEEE/ACM 11th …, 2023 - ieeexplore.ieee.org
Global warming has been a topic of great concern in recent years. It is believed that it is
related to greenhouse gases. In Brazil, the land use change was responsible for the largest …

Implement security analysis of access control policy based on constraint by SMT

A Liu, X Du, N Wang, X Wang, X Wu… - 2022 IEEE 5th …, 2022 - ieeexplore.ieee.org
Access control is a widely used technology to protect information security. The
implementation of access control depends on the response generated by access control …

P-SaaS: knowledge service oriented manufacturing workflow model for knowledge collaboration and reuse

L He, P Jiang - 2020 IEEE 16th International Conference on …, 2020 - ieeexplore.ieee.org
Orders come and go, but for manufacturing enterprises product-related production problems
(PPs) are forever. To realize the aim of CTQS (ie, lower cost, faster time to market, higher …

Unified Implementation and Simplification for Task-Based Authorization Security in Workflows

W Zhong, J Zhao, H Hu - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
Authorization-related security requirements are of great significance in workflow
management systems. Existing studies are restricted in their scopes of research. There is no …

[PDF][PDF] Disaster recovery and risk management over private networks using data provenance: Cyber security perspective

K Pradeep Kumar, VJ Pillai… - Indian Journal of …, 2021 - researchgate.net
Objectives: To understand of data provenance applications towards cyber security for
disaster recovery. To design an attack scenario with appropriate use cases using unified …

工作流系统中的PRBAC 访问控制模型研究

熊天虹, 余阳, 娄定俊 - 应用科学学报, 2020 - jas.shu.edu.cn
工作流管理系统(workflow management systems, WFMS) 已被企业和政府广泛用于组织的业务
流程管理, 系统的任务分派一般采用基于角色的访问控制(role-based access control, RBAC) …

[PDF][PDF] Access Control Model of Industrial Control System Based on Multi-attribute Decision Making

RH Dong, TT Xu, QY Zhang - International Journal of Network …, 2021 - ijns.jalaxy.com.tw
For solving the problem that the access rights cannot be dynamically adjusted when the
environment and task status change in the industrial control system, and in the collaborative …

Catgame: A Tool For Problem Solving In Complex Dynamic Systems Using Game Theoretic Knowledge Distribution In Cultural Algorithms, And Its Application …

F Waris - 2020 - digitalcommons.wayne.edu
Cultural Algorithms (CA) are knowledge-intensive, population-based stochastic optimization
methods that are modeled after human cultures and are suited to solving problems in …