The applications of systems for spatiotemporal relations representation and reasoning range from natural language processing to computer vision and robotics. Our most recent research is concerned with a problem of specifying and modeling spatiotemporal and cause-effect relations between objects in a real physical environment. We propose a method based on defining environmental database as a network (graph) model which originates from the object-attribute (OA) dataflow computing architecture and is similar to a frame knowledge representation scheme. In this paper, we propose a pseudo-physical database architecture which integrates spatiotemporal aspects of the application domain and provides support for reasoning with an OA-grammar of the graph transformation system, a proprietary calculus for spatial reasoning, and an OA-language. A prototype of the OA-DB has been implemented and used to model an application domain-Natural Language Processing.
Олейник П.П., Салибекян С.М. Модель разграничения прав доступа для объектно-ориентированных и объектно-атрибутных приложений. Труды ИСП РАН, 2016, том 28, вып. 3, с. 35-50
35Model of security for object-oriented and object-attributed applications Abstract. The article describes two approaches for control access rights based on role approach (RBAC) and the use of tables (lists) access rights (ACL). At first, an overview of modern approaches to information security and control user access rights of applications with different architectures is provided. After that, two author's methods of data protection is described. The first approach was developed for the protection of object-oriented applications, the second approach was developed for object-attribute applications used to operating network (graph) databases and knowledge bases. The focus of attention is the first author's approach based on the description of access rights for classes, attributes of classes and objects that has a certain criterion. The approach is implemented by the use of a class hierarchy, composition and structure describing in detail in the article. The article gives examples of specific information systems developed by the first author: information system for scientific conferences that was repeatedly used at the conference "Object systems" (objectsystems.ru) and information system of the beauty salon. Further focus is on the second approach required development of new technique to the information security of network (graph) information structures. The approach developed by second author fully duplicates the functionality of the first approach. In particular, it provides permissions copy when copying of the network data structure, just as in the object-oriented paradigm is a transfer of the properties of parent to child class; the article gives a detailed description of such mechanism. For access control, the method involves the use of a special virtual device. Information about access rights is linked to the node network (graph) if restrict access is needed.Keywords: Security of information systems; Object-oriented applications; Object System Metamodel; Model of Permissions; object-attribute approach.DOI: 10.15514/ISPRAS-2016-28(3)-3 Oleynik P.P., Salibekyan S.M. Model of security for object-oriented and object-attributed applications. Trudy ISP RAN / Proc. ISP RAS, 2016, vol. 28, issue 3, pp. 35-50
36For citation: Oleynik P.P., Salibekyan S.M. Model of security for object-oriented and objectattributed applications. Trudy ISP RAN/Proc.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.