2017 IEEE International Conference on Big Data (Big Data) 2017
DOI: 10.1109/bigdata.2017.8258265
|View full text |Cite
|
Sign up to set email alerts
|

Community-based self generation of policies and processes for assets: Concepts and research directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…These conditions thus influence the set of policies to be considered for local operation. Shared policies could be used by the AMS's GPM to leverage policies learned in different contexts by other trusted AMSs in a collaborative fashion, as is proposed in community-based policy learning (CASWiki) by Bertino, et al [16]. In the CASWiki, agents, primarily autonomous systems such as Connected and Autonomous Vehicles (CAVs) or Internet of Things (IoT) devices, contribute policies to a shared knowledge base.…”
Section: A Key Components Of Agenpmentioning
confidence: 99%
“…These conditions thus influence the set of policies to be considered for local operation. Shared policies could be used by the AMS's GPM to leverage policies learned in different contexts by other trusted AMSs in a collaborative fashion, as is proposed in community-based policy learning (CASWiki) by Bertino, et al [16]. In the CASWiki, agents, primarily autonomous systems such as Connected and Autonomous Vehicles (CAVs) or Internet of Things (IoT) devices, contribute policies to a shared knowledge base.…”
Section: A Key Components Of Agenpmentioning
confidence: 99%
“…While machine learning allows the ability for devices to determine their own models, it would provide a greater flexibility if devices could share the models that they have learnt with each other. This sharing of knowledge on how to determine policies in general has been introduced in [4] and can be used to further improve dynamic access control policy determination. Devices in this model act like a community of managers of other devices.…”
Section: Sharing Of Modelsmentioning
confidence: 99%