WorldWideScience

Sample records for access control communications

  1. The effects of hands free communication devices on clinical communication: balancing communication access needs with user control.

    Richardson, Joshua E; Richardson, Joshua Edwin; Ash, Joan S; Ash, Joan

    2008-01-01

    Hands Free Communication Device (HFCD) systems are a relatively new information and communication technology. HFCD systems enable clinicians to directly contact and communicate with one another using wearable, voice-controlled badges that are VoIP-based (voice-over IP) and are linked to one another over a wireless local area network (WLAN). This qualitative study utilized a grounded theory, multiple perspectives approach to understand how the use of HFCDs affected communication in the hospitals that implemented them. The study generated five themes revolving around HFCDs impact on communication. This paper specifically focuses on two of those themes: Communication Access and Control. PMID:18999046

  2. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  3. An internet of things example: classrooms access control over near field communication.

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  4. In-home Power Line Communication Media Access Control Protocol Based on Collision Resolution

    WANG Bo; HUANG Pei-wei; ZHONG You-ping; QI Ying-hao

    2009-01-01

    Most existing media access control (MAC) protocols in power line communication (PLC) networks just discard the colliding data packets when collision occurs. The collision deteriorates throughput and delay performance of system under high traffic conditions. This article presents a novel media access scheme with fast collision resolution for in-home power line networks. It works by first recognizing the colliding stations through detecting the inserted unique ID sequence ahead of data packets, then the source nodes retransmitting their packets immediately after the collision slot. The proposed protocol maintains the benefits of ALOHA systems. It needs no scheduling overhead and is suitable for bursty sources, such as multimedia data packets. Computer simulations have demonstrated that this approach can achieve high throughput due to its ability of resolving collisions.

  5. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  6. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications

    Mario Manzano

    2013-01-01

    Full Text Available The emergence of intelligent transport systems has brought out a new set of requirements on wireless communication. To cope with these requirements, several proposals are currently under discussion. In this highly mobile environment, the design of a prompt, efficient, flexible, and reliable medium access control, able to cover the specific constraints of the named real-time communications applications, is still unsolved. This paper presents the original proposal integrating Non-Cooperative Cognitive Time Division Multiple Access (NCC-TDMA based on Cognitive Radio (CR techniques to obtain a mechanism which complies with the requirements of real-time communications. Though the proposed MAC uses a slotted channel, it can be adapted to operate on the physical layer of different standards. The authors’ analysis considers the IEEE WAVE and 802.11p as the standards of reference. The mechanism also offers other advantages, such as avoiding signalling and the adaptation capacity to channel conditions and interferences. The solution is applied to the problem of units merging a convoy. Comparison results between NCC-TDMA and Slotted-Aloha are included.

  7. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 3: Software and Hardware. Rehab/Education Technology ResourceBook Series.

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for the disabled or the elderly, the book focuses on hardware and software. The guide's 13 chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  8. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 4: Update to Books 1, 2, and 3.

    Borden, Peter A., Ed.; Vanderheiden, Gregg C., Ed.

    This update to the three-volume first edition of the "Rehab/Education ResourceBook Series" describes special software and products pertaining to communication, control, and computer access, designed specifically for the needs of disabled and elderly people. The 22 chapters cover: speech aids; pointing and typing aids; training and communication…

  9. Detection and response to unauthorized access to a communication device

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  10. Digital autonomous terminal access communications

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  11. Android Access Control Extension

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  12. Android Access Control Extension

    Anton Baláž; Branislav Madoš; Michal Ambróz

    2015-01-01

    The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by pr...

  13. RFID access control

    Luzar, Boštjan

    2012-01-01

    The goal of the thesis was to learn about the procedure of developing applications based on microcontrollers using the Arduino development platform and the IDE environment. Through practical development in the Arduino environment we realized a logic which is capable to authorize access to specific locations and areas based on 125 kHz RFID tags. Although many solutions exist, most of them require a lot of hardware and software because of their modular design and communication types, the so...

  14. 47 CFR 95.645 - Control accessibility.

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  15. Enclosure and open access in communication scholarship

    Morrison, Heather

    2011-01-01

    The current state of scholarly communication is one of contest between an increasingly commercial system that is dysfunctional and incompatible with the basic aims of scholarship, and emerging alternatives, particularly open access publishing and open access archiving. Two approaches to facilitating global participation in scholarly communication are contrasted in this paper; equity is seen as a superior goal to the donor model, which requires poverty or inequity to succeed. The current stat...

  16. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identify to a central processor. The system installed at the Barnwell Nuclear Fuel Plant is described

  17. Analysing Access Control Specifications

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  18. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identity to a central processor. The central processor associates that individual's authorization file with a card-key obtained at the access point. The system generates a record of personnel movement, provides a personnel inventory on a real-time basis, and it can retrieve a record of all prior events. The system installed at the Barnwell Nuclear Fuel Plant is described

  19. Information, communication, travel behaviour and accessibility.

    Wee, van B.; Chorus, C.; Geurs, K.T.

    2013-01-01

    Over the past two decades many papers have been published on the impact of Information and Communication Technologies (ICT) on travel behavior, but the literature focusing on the impact of ICT on accessibility is relatively scarce. In this paper we give an overview of the impact of ICT on four compo

  20. Anonymous Biometric Access Control

    Shuiming Ye

    2009-01-01

    Full Text Available Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine individuals' rights of privacy. Biometric signals are immutable and can be exploited to associate individuals' identities to sensitive personal records across disparate databases. In this paper, we propose the Anonymous Biometric Access Control (ABAC system to protect user anonymity. The ABAC system uses novel Homomorphic Encryption (HE based protocols to verify membership of a user without knowing his/her true identity. To make HE-based protocols scalable to large biometric databases, we propose the k-Anonymous Quantization (kAQ framework that provides an effective and secure tradeoff of privacy and complexity. kAQ limits server's knowledge of the user to k maximally dissimilar candidates in the database, where k controls the amount of complexity-privacy tradeoff. kAQ is realized by a constant-time table lookup to identity the k candidates followed by a HE-based matching protocol applied only on these candidates. The maximal dissimilarity protects privacy by destroying any similarity patterns among the returned candidates. Experimental results on iris biometrics demonstrate the validity of our framework and illustrate a practical implementation of an anonymous biometric system.

  1. Digital Autonomous Terminal Access Communication (DATAC) system

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  2. Physical Access Control Database

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  3. Decentralized control and communication

    Bakule, Lubomír; Papík, Martin

    2012-01-01

    Roč. 36, č. 1 (2012), s. 1-10. ISSN 1367-5788 R&D Projects: GA MŠk(CZ) LG12014 Institutional research plan: CEZ:AV0Z10750506 Keywords : decentralization * communication * large-scale complex systems Subject RIV: BC - Control Systems Theory Impact factor: 1.289, year: 2012

  4. System control and communication

    Rapid and ongoing development in the energy sector has consequences for system control at all levels. In relation to system control and communication the control system is challenged in five important ways: 1) Expectations for security of supply, robustness and vulnerability are becoming more stringent, and the control system plays a big part in meeting these expectations. 2) Services are becoming increasingly based on markets that involve the transmission system operators (TSOs), generators and distribution companies. Timely, accurate and secure communication is essential to the smooth running of the markets. 3) Adding large amounts of renewable energy (RE) to the mix is a challenge for control systems because of the intermittent availability of many RE sources. 4) Increasing the number of active components in the system, such as small CHP plants, micro-CHP and intelligent loads, means that the system control will be much more complex. 5) In the future it is likely that power, heat, gas, transport and communication systems will be tighter coupled and interact much more. (au)

  5. Communication for adaptive control

    Malik, Abdul Mubeen

    2010-01-01

    Ericsson developed the signal processing methods to be used in the digital power to increase the performance and the functionality of the converter. In the continuation of that the method of identifying the load of the DC/DC converter was developed in this project. The aim was to develop the algorithm that controls and communicate with the DC/DC converter “BMR450”. A current sensing circuit was been made for the voltage measurement in the DC/DC converter across the “inductor” in one part of t...

  6. Robust access control framework for mobile cloud computing network

    Li, F; Rahulamathavan, Y.; Conti, M.; Rajarajan, M.

    2015-01-01

    Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of unified communications, employees exploit the advantages of smart devices and 4G wireless technology to access the data from anywhere and anytime. Security protocols such as access control designed for traditional setup are not su...

  7. Studying Media Access andControl Protocols

    Mohammed, Alalelddin Fuad Yousif

    2010-01-01

    This thesis project’s goal is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The thesis fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) re...

  8. 水声通信网络媒介访问控制协议的研究%Research on Media Access Control Protocol for Underwater Acoustic Communication Network

    匡锐

    2014-01-01

    Media access control protocol is the most important part of data link layer protocol, which plays a decisive significance to the distribution of channels. This paper designs a media access control protocol that com-bines normal access mode and MACAW access mode respectively modeling of channel and underwater communi-cation equipment, simulating the normal access mode and MACAW access mode in throughput, bit error rate and transmission delay.%媒介访问控制协议是数据链路层协议中最重要的部分,对信道的分配起着决定性的作用。本文设计了一种普通访问模式和MACAW访问模式相结合的媒介访问控制协议,分别对信道和水下通信设备进行建模,对普通访问模式和MACAW访问模式在吞吐量、误码率和传输延迟进行了仿真。

  9. LANSCE personnel access control system (PACS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  10. Wireless ad hoc networks access for aeronautical communications

    Besse, Frédéric; Garcia, Fabien; Pirovano, Alain; Radzik, José

    2010-01-01

    There is an increasing interest in the current aeronautical context to offer new services for civil aircraft passengers. For example, airlines want to offer their customers the opportunity to access the Internet, to manage their mails, to watch video on demand, to access corporate VPNs.... All these services represent a new type of air-ground communications called APC (Aeronautical Passenger Communications) in the ATN (Aeronautical Telecommunication Network) context. In this paper, we will sh...

  11. Towards Trusted Network Access Control

    Bente, Ingo; von Helden, Josef

    Network Access Control (NAC) solutions promise to significantly increase the security level of modern networks. In short, they allow to measure the integrity state of an endpoint that tries to get access to the network. Based upon the measurement results, which are compared to a defined NAC policy, access to the network can be allowed or denied. One problem of all currently available NAC solutions is referred to as the “lying endpoint” problem. Normally, special software components are responsible for gathering the relevant integrity information on the endpoint. If an attacker modifies those software components, an endpoint can lie about its current integrity state. Therefore, endpoints which are not compliant to the defined NAC policy can get access to the network. Those endpoints must be considered as potential threat. This paper summarizes a possible solution for the lying endpoint problem based upon the specifications of the Trusted Computing Group (TCG) and the results of the two research projects TNC@ FHH and Turaya. The goal is to develop an open source, TNC compatible NAC solution with full TPM support within a new research project: tNAC.

  12. Medium Access Control of Non Uniformly Distributed Multi Hop Network Communication Node%非均匀分布多跳网络通信节点介质访问控制

    杨志忠

    2015-01-01

    在非均匀分布多跳网络中,需要对通信节点进行介质访问控制设计,提高网络通信节点的吞吐性和安全性.传统方法采用多路复用器输出端口信号检测方法进行非均匀分布多跳网络通信节点的介质访问控制,产生强烈的信道畸变,节点的通信控制性能不好.提出一种基于协同调度的混合协议激振算法的非均匀分布多跳网络通信节点介质访问控制方法.将非均匀分布多跳网络通信节点分簇模型的服务器网络接收端和发送端数据的信息熵作为信道传递向量函数,构建协同调度混合协议服务器模型,求得非均匀分布多跳网络时延扩展与信道特性测量均衡后的频谱,可以有效提高信息传输的保真度.仿真结果表明,采用该算法可以有效提高对多跳网络的通信节点介质访问控制性能,提高了通信节点的吞吐性能,降低重复传输次数,保证非均匀分布多跳网络通信的安全性和保真性.%In the non uniform distribution in multi hop networks, the need for access control design of node communication medium, to increase the throughput and security of network communication node. The traditional method is using the detec-tion method of the multiplexer output port signals are non uniformly distributed multi hop network communication node me-dium access control, produce the channel distortion strongly, node communication control performance is not good. This pa-per proposes a hybrid protocol excitation algorithm based on collaborative scheduling non-uniform distribution of multi hop network communication node medium access control method. Non uniform distribution of multi hop network communication node clustering model information entropy server network receiver and transmitter data as the channel transfer vector func-tion, construction of the collaborative scheduling hybrid protocol server model, obtain the non uniformly distributed multi hop network delay spread and

  13. Open access and scholarly communication, part 4

    Eden, Brad

    2009-01-01

    This fourth e-book on the subject of open access in the academic field includes a Latin American case study on open access penetration, a paper from Germany on the promotion of OA illustrated by a project at the University of Konstanz, and a case study on OA at Bioline International, a non-profit scholarly publications aggregator, distributor, publisher and publishing assistance service.

  14. Controlling Access to Suicide Means

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  15. LTE-advanced random access mechanism for M2M communication: A review

    Mustafa, Rashid; Sarowa, Sandeep; Jaglan, Reena Rathee; Khan, Mohammad Junaid; Agrawal, Sunil

    2016-03-01

    Machine Type Communications (MTC) enables one or more self-sufficient machines to communicate directly with one another without human interference. MTC applications include smart grid, security, e-Health and intelligent automation system. To support huge numbers of MTC devices, one of the challenging issues is to provide a competent way for numerous access in the network and to minimize network overload. In this article, the different control mechanisms for overload random access are reviewed to avoid congestion caused by random access channel (RACH) of MTC devices. However, past and present wireless technologies have been engineered for Human-to-Human (H2H) communications, in particular, for transmission of voice. Consequently the Long Term Evolution (LTE) -Advanced is expected to play a central role in communicating Machine to Machine (M2M) and are very optimistic about H2H communications. Distinct and unique characteristics of M2M communications create new challenges from those in H2H communications. In this article, we investigate the impact of massive M2M terminals attempting random access to LTE-Advanced all at once. We discuss and review the solutions to alleviate the overload problem by Third Generation Partnership Project (3GPP). As a result, we evaluate and compare these solutions that can effectively eliminate the congestion on the random access channel for M2M communications without affecting H2H communications.

  16. Code-Expanded Random Access for Machine-Type Communications

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir;

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose a...

  17. The Effects of Information and Communication Technologies on Accessibility

    Lu, R.

    2015-01-01

    It is expected that information and communication technology (ICT) can have great impacts on traveler’s accessibility. However, understanding of the effects of ICT on accessibility is still limited. Consequently, this thesis aims to increase the understanding of such effects. The thesis develops a g

  18. Institutional repositories and Open Access: the future of scholarly communication?

    Prosser, David C

    2003-01-01

    The current model of scholarly communications fails to meet the information needs of researchers world-wide. New technology (in particular the coming of the internet) allows us to revise or to reinvent scholarly communication. This talk discusses the new models that are taking advantage of the new technology and describes a possible future for scholarly communications. In particular, I focus on the development of institutional repositories and open access journals and the way their interactio...

  19. Access Request Trustworthiness in Weighted Access Control Framework

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  20. A Linux Implementation of Temporal Access Controls

    Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E.

    2007-01-01

    Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval File Protection System (TIFPS), a prototype of the Time Interval Access Control (TIAC) model, has been implemented by modifying Linux extended attributes to include temporal metadata associated both with files and users. The Linux Security Module was used to provide hooks fo...

  1. Key issues of multiple access technique for LEO satellite communication systems

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  2. An Access Control Framework for Reflective Middleware

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  3. The Open Access Initiative: A New Paradigm for Scholarly Communications

    Yiotis, Kristin

    2013-01-01

    This paper gives an account of the origin and development of the Open Access Initiative (OAI) and the digital technology that enables its existence. The researcher explains the crisis in scholarly communications and how open access (OA) can reform the present system. OA has evolved two systems for delivering research articles: OA archives or repositories and OA journals. They differ in that OA journals conduct peer review and OA archives do not. Discussion focuses on how these two delivery sy...

  4. Random Access Game and Medium Access Control Design

    Chen, Lijun; Low, Steven H.; Doyle, John C.

    2010-01-01

    Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (strategy evolutions) to achieve Nash equilibria. This provides a general analytical framework that is capable of modeling a large class of system-wide quality-of-service (QoS) models via the specification of per-node util...

  5. Use of action requests to control communications

    This paper discusses the Plant Information Management System (PIMS) that is implemented at Pacific Gas and Electric Company's (PG and E) Diablo Canyon Power Plant (DCPP). PIMS is implemented on IBM mainframes located at the plant, is on-line and interactive, and is accessed via a computer communication system that supports more than 450 IBM 3270 PC workstations. This paper discusses the role of the ACTION REQUEST module of PIMS and how it is used to control plant sensitive communications. The ACTION REQUEST module of PIMS can be accessed from any workstation and during the first year of Commercial Operation of DCPP replaced numerous and redundant forms of manual communication mechanisms. Also in this first year, users at the plant generated approximately 25,000 Action Requests which were controlled through review and approval cycles by PIMS. Each organization assigned action were immediately notified of their responsibilities so that action could be taken in a timely manner. The Diablo Canyon Power Plant broke Westinghouse world-wide operating records for the first year of operation (over 90% availability) due to a well built and reliable plant and due to a responsive Operations organization, which was well informed and controlled

  6. Congestion Control Strategy of Random Access Channel in Machine Type Communication%机器类型通信中随机接入信道的拥塞控制策略

    周伟; 谭小彬; 季海波

    2015-01-01

    在基于3GPP长期演进技术的机器类型通信( MTC)应用背景下,针对无线接入网络中随机接入信道的拥塞问题,提出一种改进的拥塞控制策略,MTC器件利用基站广播信息自适应调整各自的接入时间,避免由于大量MTC器件同时发起随机接入而引起接入碰撞的问题,实现基站的负载均衡及信道资源的合理分配。基于最大熵原理证明各MTC器件接入时间的均匀分布是最优分布。仿真实验结果表明,与接入类别限制策略相比,该策略可缓解随机接入信道的拥塞状况,提高MTC器件的随机接入成功率,降低接入时延,从而提升网络整体性能及服务质量。%This paper proposes an improved congestion control strategy to alleviate the congestion of random access channel in radio access network of Machine Type Communication(MTC) based on 3GPP-Long Term Evolution(LTE). In order to reach the base-station’ s load balancing in the time interval and allocate the channel resources rationally,it schedules the access time of MTC devices through the base-station’ s broadcasted information,and thereby avoids access collisions caused by massive number of MTC devices access the base-station simultaneously. It also proofs that uniform distribution of the access time is the optimal choice by maximum entropy principle. Simulation experimental results show that the strategy can alleviate the channel congestion significantly and increase the random access success rate of MTC devices,reduce the delay,and thus improve the network’ s performance and guarantee the network’ s Quality of Service ( QoS) compared with Access Class Barring( ACB) strategy.

  7. User Behavior Trust Based Cloud Computing Access Control Model

    Jiangcheng, Qin

    2016-01-01

    Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud...

  8. Evaluation of file access control implementations

    Madar, Fatima Ali

    2005-01-01

    This thesis discusses two implementations of file access controls: the UNIX Permissions (UP) and the Access Control List (ACL). We will evaluate advantages and weaknesses in these two implementations. The criteria of evaluation are usefulness, security and manageability. The level of usefulness of systems was measured by evaluating user-surveys. The level of security was measured by comparing the implementations against well-established file access control models concerning privacy, inte...

  9. An electronically controlled automatic security access gate

    Jonathan A. Enokela; Michael N. TYOWUAH

    2014-01-01

    The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF) transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is ...

  10. Efficient Access Control for Wireless Sensor Data

    Sorniotti, Alessandro; Molva, Refik; GOMEZ, Laurent; Trefois, Christophe; Laube, Annett; Scaglioso, Piervito

    2009-01-01

    Abstract Although very developed in many sectors (databases, filesystems), access control schemes are still somewhat elusive when it comes to wireless sensor net- works. However, it is clear that many WSN systems—such as healthcare and automotive ones—need a controlled access to data that sensor nodes produce, given its high sensitivity. Enforcing access control in wireless sensor networks is a particularly difficult task due to the limited computational capacity of wireless sensor nodes. In ...

  11. How Much Control Do Children and Adolescents Have over Genomic Testing, Parental Access to Their Results, and Parental Communication of Those Results to Others?

    Clayton, Ellen Wright

    2015-01-01

    Adolescents may often have opinions about whether they want genetic and genomic testing in both the clinic and research and about who should have access to the results. This legal analysis demonstrates that the law provides very little protection to minors' wishes. PMID:26479563

  12. Formative Evaluation to Assess Communication Technology Access and Health Communication Preferences of Alaska Native People

    Robinson, Renee F.; Dillard, Denise A.; Hiratsuka, Vanessa Y.; Smith, Julia J.; Tierney, Steve; Avey, Jaedon P.; Buchwald, Dedra S.

    2016-01-01

    Objective Information technology can improve the quality, safety, and efficiency of healthcare delivery by improving provider and patient access to health information. We conducted a nonrandomized, cross-sectional, self-report survey to determine whether Alaska Native and American Indian (AN/AI) people have access to the health communication technologies available through a patient-centered medical home. Methods In 2011, we administered a self-report survey in an urban, tribally owned and operated primary care center serving AN/AI adults. Patients in the center’s waiting rooms completed the survey on paper; center staff completed it electronically. Results Approximately 98% (n = 654) of respondents reported computer access, 97% (n = 650) email access, and 94% (n = 631) mobile phone use. Among mobile phone users, 60% had Internet access through their phones. Rates of computer access (p = .011) and email use (p = .005) were higher among women than men, but we found no significant gender difference in mobile phone access to the Internet or text messaging. Respondents in the oldest age category (65–80 years of age) were significantly less likely to anticipate using the Internet to schedule appointments, refill medications, or communicate with their health care providers (all p < .001). Conclusion Information on use of health communication technologies enables administrators to deploy these technologies more efficiently to address health concerns in AN/AI communities. Our results will drive future research on health communication for chronic disease screening and health management.

  13. Access control system for ISABELLE

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  14. Evaluation of Accessibility and Use of New Communication Technologies in Patients With Type 1 Diabetes Mellitus

    Giménez-Pérez, Gabriel; Gallach, Maria; Acera, Edita; Prieto, Araceli; Carro, Olga; Ortega, Emilio; González-Clemente, José-Miguel; Mauricio, Dídac

    2002-01-01

    Background The role of patients in the management and control of type 1 diabetes mellitus, a chronic disease, is well established. The advent of new communication technologies is expected to improve patients' access to health information. However, little is known about the extent to which patients with type 1 diabetes mellitus use the Internet to retrieve medical information and about the impact, if any, this retrieval has on their health status. Objective To evaluate the accessibility and us...

  15. Campus Access Control System RFID Based

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  16. Control with a random access protocol and packet dropouts

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  17. The entire network topology display system of terminal communication access network

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  18. Access control and service-oriented architectures

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  19. Proximity Displays for Access Control

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  20. SPS access control system a new user interface

    Riesco, T

    1999-01-01

    This document describes the project to implement at CERN new trends in industrial control systems and integrate new requirements and functions requested by users. This project will be the testing ground for the specification of procedures in the Access Control and Machine Interlock of LHC. The last modification in the Access Control System to the primary beam areas was made in 1995, and this new project is to improve the fields of personal security, access security and the introduction of modern communication networks used in the industrial control systems. Inside the cycle model of project life, it is at the present time in the test phase in terms of security and exploitation inside the Accelerator Decelerator (AD) project. The presence of Authorization Management System (AMS) to guarantee the automatic information distribution of authorizations to controlled areas is in line with this project.

  1. Privacy Preservation in Role-based Access Control Model

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  2. Disk access controller for Multi 8 computer

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  3. Modelling Access Control For Healthcare Information Systems

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  4. Access control and personal identification systems

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  5. Communication access in the library for individuals who use augmentative and alternative communication.

    Shepherd, Tracy A; McDougall, Stacy

    2008-12-01

    Libraries for All is a community-based program that aims to enhance communication access to the library for individuals who use augmentative and alternative communication (AAC), by providing resources and instruction. The goals are to (a) provide communication boards, (b) complete facilitator training, and (c) promote the program. To accomplish these goals, four communication boards were created and provided to all public libraries in London, Ontario. A train-the-trainer model was employed to ensure that all members of the library staff were familiar with the boards and aware of strategies to communicate more effectively with individuals who use AAC. Marketing materials were sent to potential stakeholders. The success of the program in meeting these three goals is highlighted. PMID:19023753

  6. Access control, security, and trust a logical approach

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  7. Making the innovation case in Open Access scholary communication

    CERN. Geneva

    2005-01-01

    It seems almost unnecessary to have to elaborate additional reasons for the adoption of Open Access scholarly communication (OA sc) as manifested through Open Access journals and self-archiving practices. To those active within the OA arena, the case has been convincingly made, and current arguments merely need to be disseminated beyond the Library and Information Science (LIS) sphere. However, it is my contention that a convincing argument for OA sc needs to be launched from the Science Policy perspective if any government mandated pro-OA policy changes are to be effected. This paper, then, is an attempt at taking the OA discussion beyond the LIS arena and into the realm of Science and Innovation Policy. Using Innovation Theory as its theoretical framework, it is argued that Open Access scholarly communication can only serve to bolster Innovation Systems, be they national, regional, or sectoral. The case of South Africa is taken as an illustrative example, though the case can and will be generalised to beyon...

  8. Access control issues in social networks

    Carreras Coch, Anna; Rodríguez Luna, Eva; Delgado Mercè, Jaime; Maroñas Borras, Xavier

    2010-01-01

    Social Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies in Social Networks. Subsequently, two main issues are addressed: the interoperability amongst systems using different policy languages and the lack of elements in the existing policy languages when trying to express Social Networks’ access control. In part...

  9. Communicable Diseases and Outbreak Control.

    Ameli, Jonathan

    2015-10-01

    Infectious disease during an emergency condition can raise the death rate 60 times in comparison to other causes including trauma. An epidemic, or outbreak, can occur when several aspects of the agent (pathogen), population (hosts), and the environment create an ideal situation for spread. Overcrowding, poor regional design and hygiene due to poverty, dirty drinking water, rapid climate changes, and natural disasters, can lead to conditions that allow easier transmission of disease. Once it has been established that an emergency condition exists, there must be a prompt and thorough response for communicable disease control. A camp should be created, and the disease managed rapidly. The overall goals are rapid assessment, prevention, surveillance, outbreak control, and disease management. PMID:27437528

  10. Promotion of access to essential medicines for non-communicable diseases : practical implications of the UN political declaration

    Hogerzeil, Hans V.; Liberman, Jonathan; Wirtz, Veronika J.; Kishore, Sandeep P.; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N.; von Schoen-Angerer, Tido

    2013-01-01

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and v

  11. Open Access. Chapter 6 of Scholarly Communication for Librarians.

    Morrison, Heather

    2008-01-01

    In-depth overview of open access, covering definitions (open access publishing, open access archives, gratis and libre, open access works versus open access processes), major statements and declarations, types of open access, major initiatives, trends, advocacy and lobbying.

  12. Distributed Access Control Policies for Spectrum Sharing

    Baldini, Gianmarco; NAI-FOVINO Igor; Trombetta, Alberto; Braghin, Stefano

    2012-01-01

    Cognitive Radio (CR) is a novel wireless communication technology that allows for adaptive configuration of the reception parameters of a terminal, based on the information collected from the environment. Cognitive radio (CR) technology can be used in innovative spectrum management approaches like spectrum sharing, where radio frequency spectral bands can be shared among various users through a dynamic exclusive-use spectrum access model. Spectrum sharing can be applied to various...

  13. A Survey of Access Control Models in Wireless Sensor Networks

    Htoo Aung Maw

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.

  14. OVERSAMPLED CHAOTIC BINARY SEQUENCES FOR MULTGIPLE ACCESS COMMUNICATION

    ZhongHongtao; WangHuiyun; 等

    2002-01-01

    Noise interference and multiple access interference are the main impairment to the performance of DS/CDMA communication system.This letter presents that OverSampled Chaotic Map(OSCM)binary sequences are secure as spreading sequences,and based on the optimal quantizing method,the BER performance of the system has been derived in detail,the internal relationships among the number of users,the power of noise and the lengh of code chips are revealed in mathematical formulae.The performance of the system can be improved by employing these formulae.Numerical results conform the efficiency of discussion in this letter.

  15. OVERSAMPLED CHAOTIC BINARY SEQUENCES FOR MULTIPLE ACCESS COMMUNICATION

    Zhang Hongtao; Wang Huiyun; Ding Runtao

    2002-01-01

    Noise interference and multiple access interference are the main impairment to the performance of DS/CDMA communication system. This letter presents that OverSampled Chaotic Map (OSCM) binary sequences are secure as spreading sequences, and based on the optimal quantizing method, the BER performance of the system has been derived in detail, the internal relationships among the number of users, the power of noise and the length of code chips are revealed in mathematical formulae. The performance of the system can be improved by employing these formulae. Numerical results conform the efficiency of discussion in this letter.

  16. Evaluation of Accessibility and Use of New Communication Technologies in Patients With Type 1 Diabetes Mellitus

    Gallach, Maria; Acera, Edita; Prieto, Araceli; Carro, Olga; Ortega, Emilio; González-Clemente, José-Miguel; Mauricio, Dídac

    2002-01-01

    Background The role of patients in the management and control of type 1 diabetes mellitus, a chronic disease, is well established. The advent of new communication technologies is expected to improve patients' access to health information. However, little is known about the extent to which patients with type 1 diabetes mellitus use the Internet to retrieve medical information and about the impact, if any, this retrieval has on their health status. Objective To evaluate the accessibility and use of new communication technologies in a population of patients with type 1 diabetes mellitus. Methods Patients with type 1 diabetes mellitus attending the Diabetes Clinic of the Hospital de Sabadell, Sabadell, Spain, in a 6-month period were asked to answer a structured questionnaire about education level, Internet accessibility, use of health-related Web sites, and mobile-phone ownership and use. Results Of 302 patients with type 1 diabetes mellitus attending the Diabetes Clinic on a regular basis, 244 (115 men, 129 women) were interviewed (response rate 80.8%). Personal computers were owned by 58.2% of patients. Fifty-nine percent had access to the Internet, 39.3% had access to the Internet at home; however, only 36.5% were regular Internet users. Internet users were younger, more frequently men, and of higher education level. Among Internet users only 49.4% had ever accessed a health-related Web site. Internet users who had ever accessed a health-related Web site had a higher level of education, presented severe hypoglycemia more frequently, and were more likely to have access to the Internet at home. No differences were found in metabolic control between Internet users and nonusers or between Internet users who had ever accessed a health-related Web site and Internet users who had never accessed a health-related Web site. Of the 76.6% of the patients that owned a mobile phone, 96% used it more than once a week. Conclusions The impact of new communication technologies might

  17. An Access Control Model of Virtual Machine Security

    QIN Zhong-yuan; Chen, Qi; Lv, You; Qiang, Yong; GUO Ai-wen; SHEN Ri-sheng; Zhang Qunfang

    2013-01-01

    Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improve...

  18. A Generic Role Based Access Control Model for Wind Power Systems

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  19. Access Control Management for SCADA Systems

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  20. Towards Communication and Information Access for Deaf People

    Edwin Blake

    2014-10-01

    Full Text Available In tightly circumscribed communication situations an interactive system resident on a mobile device can assist Deaf people with their communication and information needs. The Deaf users considered here use South African Sign Language and information is conveyed by a collection of pre-recorded video clips and images. The system was developed according to our method of community-based co-design. We present several stages of the development as a series of case studies and highlight our experience. The first stage involved ethnographically inspired methods such as cultural probes. In the next stage we co-designed a medical consultation system that was ultimately dropped for technical reasons. A smaller system was developed for pharmaceutical dispensing and successfully implemented and tested. It now awaits deployment in an actual pharmacy. We also developed a preliminary authoring tool to tackle the problem of content generation for interactive computer literacy training. We are also working on another medical health information tool. We intend that a generic authoring tool be able to generate mobile applications for all of these scenarios. These mobile applications bridge communication gaps for Deaf people via accessible and affordable assistive technology.

  1. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  2. Access Control in Data Management Systems

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  3. Performance estimates for personnel access control systems

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  4. Performance estimates for personnel access control systems

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  5. An Access Definition and Query Language : Towards a Unified Access Control Model

    Sonnenbichler, Andreas

    2013-01-01

    In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of rights, ego-centered roles, and decentralized administration. The suggested meta access control model is named \\'\\'Access Definition and Query Language\\'\\' (ADQL). ADQL is represented by a formal, context-free grammar allowing to express the targeted access control model, policies, facts, and access queries as a formal language.

  6. Communication for command and control systems

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  7. A QUANTUM MULTIPLE ACCESS COMMUNICATIONS SCHEME USING ORBITAL ANGULAR MOMENTUM

    Dong Xiaoliang; Zhao Shengmei; Zheng Baoyu

    2013-01-01

    We propose a quantum multiple access communications scheme using Orbital Angular Momentum (OAM) sector states in the paper.In the scheme,each user has an individual modified Poincare Bloch sphere and encodes his information with his own corresponding sector OAM states.A prepared entangled photon pairs are separated at transmitter and receiver.At the transmitter,each user encodes his information with the sector OAM states on the photons and the superposition of the different sector OAM states is carried by the photons.Then the photons are transmitted through quantum noiseless channel to the receiver.At the receiver,each user could retrieve his information by coincidently measuring the transmitted photons with the receiver side photons which are modulated by a special prepared measurement basis.The theoretical analysis and the numerical simulations show that each user could get his information from the superposition state without error.It seems that this scheme provides a novel method for quantum multiple users communications.

  8. An electronically controlled automatic security access gate

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  9. Network Access Control List Situation Awareness

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  10. Integrating Usage Control with SIP-Based Communications

    A. Lakas

    2008-11-01

    Full Text Available The Session Initiation Protocol (SIP is a signaling protocol used for establishing and maintaining communication sessions involving two or more participants. SIP was initially designed for voice over IP and multimedia conferencing, and then was extended to support other services such as instant messaging and presence management. Today, SIP is also adopted to be used with 3G wireless networks, thus it becomes an integral protocol for ubiquitous environment. SIP has various methods that support a variety of applications such as subscribing to a service, notification of an event, status update, and location and presence services. However, when it comes to security, the use of wireless and mobile communication technologies and the pervasive nature of this environment introduce higher risks to security than that of the old simple environment. In this paper, we introduce new architecture that implements a new type of access control called usage access control (UCON to control the access to the SIP-based communication at preconnection, during connection, and postconnection. This will enable prescribers of SIP services to control who can identify their locations to approve or disapprove their subsequent connections, and to also set some parameters to determine whether a certain communication can continue or should terminate.

  11. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  12. Communication and control for networked complex systems

    Peng, Chen; Han, Qing-Long

    2015-01-01

    This book reports on the latest advances in the study of Networked Control Systems (NCSs). It highlights novel research concepts on NCSs; the analysis and synthesis of NCSs with special attention to their networked character; self- and event-triggered communication schemes for conserving limited network resources; and communication and control co-design for improving the efficiency of NCSs. The book will be of interest to university researchers, control and network engineers, and graduate students in the control engineering, communication and network sciences interested in learning the core principles, methods, algorithms and applications of NCSs.

  13. Cross-layer rate control, medium access control and routing design in cooperative VANET

    Zhou, Liang; Zheng, Baoyu; Geller, Benoit; Wei, Anne; Xu, Shan; Li, Yajun

    2008-01-01

    In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-layer design. At first, we introduce the cooperative communication conception to VANET, and propose an opportunistic cooperation strategy to improve the system performance. And then, we develop a cross-layer solution which consists of the link capacity detection with adjusting persistence probability at the MAC Layer, th...

  14. Measurement Based Self-Optimization in Random Access Communications

    Giovanidis, Anastasios; Stanczak, Slawomir

    2011-01-01

    This work considers a single-cell random access channel in cellular wireless networks and provides an algorithmic approach to the problem of optimal coordination of user actions. In the scenario considered, an access effort is successful if (a) the signal is detected at the receiver and (b) no collision occurs. The first event is controlled by the user transmission power while the second one by the choice of access (back-off) probability. These constitute the user action pair. The algorithm aims at exploiting information from measurements and user reports, in order to estimate current values of the system situation. Based on these estimates, two optimization problems can be formulated and solved for the so called contention level and transmission power level at the base station side. The methodology to find the optimal values is based on minimization of a drift function. The two values are broadcast in order to help the users update their actions ``almost optimally``. In this way the wireless cell can achieve...

  15. Speed control system for an access gate

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  16. Establishing mandatory access control on Android OS

    Bugiel, Sven

    2015-01-01

    Common characteristic of all mobile operating systems for smart devices is an extensive middleware that provides a feature-rich API for the onboard sensors and user’s data (e.g., contacts). To effectively protect the device’s integrity, the user’s privacy, and to ensure non-interference between mutually distrusting apps, it is imperative that the middleware enforces rigid security and privacy policies. This thesis presents a line of work that integrates mandatory access control (MAC) mecha...

  17. Predictive access control for distributed computation

    Yang, Fan; Hankin, Chris; Nielson, Flemming;

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  18. An Access Control Model of Virtual Machine Security

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  19. Privacy and Access Control for IHE-Based Systems

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  20. External access to ALICE controls conditions data

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  1. External access to ALICE controls conditions data

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  2. An Enhanced Multiple Random Access Scheme for Satellite Communications

    Bui, Huyen-Chi; Boucheret, Marie-Laure

    2011-01-01

    In this paper, we introduce Multi-Slots Coded ALOHA (MuSCA) as a multiple random access method for satellite communications. This scheme can be considered as a generalization of the Contention Resolution Diversity Slotted Aloha (CRDSA) mechanism. Instead of transmitting replicas, this system replaces them by several parts of a single word of an error correcting code. It is also different from Coded Slotted ALOHA (CSA) as the assumption of destructive collisions is not adopted. In MuSCA, the entity in charge of the decoding mechanism collects all bursts of the same user (including the interfered slots) before decoding and implements a successive interference cancellation (SIC) process to remove successfully decoded signals. Simulations show that for a frame of 100 slots, the achievable total normalized throughput is greater than 1.25 and 1.4 for a frame of 500 slots, resulting in a gain of 80% and 75% with respect to CRDSA and CSA respectively. This paper is a first analysis of the proposed scheme and opens se...

  3. Fulfilling the Promise of Scholarly Communication – a Comparison Between Old and New Access Models

    David C. Prosser

    2005-01-01

    The convergence of dissatisfaction with traditional, subscription-based business model for scholarly communications and the development of new, digital technologies allow us to look consider the claims of new models. This paper describes the requirements of a scholarly communication system and investigates which model – subscription-based access or open access – best satisfies these requirements.

  4. Promotion of access to essential medicines for Non-Communicable Diseases: Practical implications of the UN Political Declaration

    Hogerzeil, Hans V; Liberman, Jonathan; Wirtz, Veronika J.; Kishore, Sandeep P; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N; von Schoen-Angerer, Tido

    2013-01-01

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and vaccines for such diseases. 30 years of experience with policies for essential medicines and 10 years of scaling up of HIV treatment have provided the knowledge needed to address barriers to long-te...

  5. Distributed medium access control in wireless networks

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  6. WP EMPLACEMENT CONTROL AND COMMUNICATION EQUIPMENT DESCRIPTIONS

    The objective and scope of this document are to list and briefly describe the major control and communication equipment necessary for waste package emplacement at the proposed nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the required equipment are explained and summarized in the individual subsections of this document. This task was evaluated in accordance with QAP-2-0 and found not to be quality affecting. Therefore, this document was prepared in accordance with NAP-MG-012. The following control and communication equipment are addressed in this document: (1) Programmable Logic Controllers (PLC's); (2) Leaky Feeder Radio Frequency Communication Equipment; (3) Slotted Microwave guide Communication Equipment; (4) Vision Systems; (5) Radio Control Equipment; and (6) Enclosure Cooling Systems

  7. Viewpoints on control of military satellite communications

    Heppe, S. B.

    1983-07-01

    The three main factors are system management, communication protocols, and the control system architecture. Each of these is analyzed here in terms of a model. The model for system management is the definition of system control of the Defense Communications System, referred to as DCS syscon. The model for communication protocols is referred to as the ISO model of OSI, ISO denoting the International Standards Organization and OSI denoting open systems interconnection. The model of the control system architecture is an elemental model. The interplay between the models is highlighted. Examples are presented from the Defense Satellite Communications System and from MILSTAR. Prospects for the future are considered in view of the integration expected as systems become more capable and sophisticated. It is expected that many of the real-time control functions performed at the worldwide and theater levels will be automated on the satellite.

  8. WP EMPLACEMENT CONTROL AND COMMUNICATION EQUIPMENT DESCRIPTIONS

    N.T. Raczka

    1997-10-02

    The objective and scope of this document are to list and briefly describe the major control and communication equipment necessary for waste package emplacement at the proposed nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the required equipment are explained and summarized in the individual subsections of this document. This task was evaluated in accordance with QAP-2-0 and found not to be quality affecting. Therefore, this document was prepared in accordance with NAP-MG-012. The following control and communication equipment are addressed in this document: (1) Programmable Logic Controllers (PLC's); (2) Leaky Feeder Radio Frequency Communication Equipment; (3) Slotted Microwave guide Communication Equipment; (4) Vision Systems; (5) Radio Control Equipment; and (6) Enclosure Cooling Systems.

  9. Open Access in the Natural and Social Sciences: The Correspondence of Innovative Moves to Enhance Access, Inclusion and Impact in Scholarly Communication

    Armbruster, Chris

    2008-01-01

    Online, open access is the superior model for scholarly communication. A variety of scientific communities in physics, the life sciences and economics have gone furthest in innovating their scholarly communication through open access, enhancing accessibility for scientists, students and the interested public. Open access enjoys a comparative…

  10. ARCPAS - Automatic radiation control point access system an automated data collection terminal for radiation dose and access control

    Nuclear facilities such as nuclear power plants or fuel processing facilities are required to maintain accurate records of personnel access, exposure and work performed. Most facilities today have some sort of computerized data collection system for radiation dose and access control. The great majority rely on handwritten records, i.e., dose card or sign-in sheet which in turn are transferred to a computerized records management system manually. The ARCPAS terminal provides a method for automating personnel exposure data collection and processing. The terminal is a user interactive device which contains a unit for automatically reading and zeroing pocket dosemeters, a security badge reader for personnel identification, a 16 digit key pad for RWP information entry, a high resolution color CRT for interactive communication and a high speed tape printer providing an entry chit. The chit provides the individual worker with a record of the transaction including an individual identifying number, remaining dose for the quarter or period and RWP under which the worker entered the controlled area. The purpose of automating the access control is to provide fast, accurate, realtime data to the records management system. A secondary purpose is to relieve trained health physics technicians of control point duties so that their training and skills can be utilized more effectively in a facility's health physics program

  11. Integrating Attributes into Role-Based Access Control

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area of...... research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  12. Authorisation and access control for electronic health record systems.

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  13. Group Communication Over LTE : A Radio Access Perspective

    Kim, Juyeop; Choi, Sang Won; Shin, Won-Yong; Song, Yong-Soo; Kim, Yong-Kyu

    2016-01-01

    Long Term Evolution (LTE), which has its root on commercial mobile communications, recently becomes an influential solution to future public safety communications. To verify the feasibility of LTE for public safety, it is essential to investigate whether an LTE system optimized for one-to-one communications is capable of providing group communication, which is one of the most important service concepts in public safety. In general, a number of first responders for public safety need to form a...

  14. Cardea: Dynamic Access Control in Distributed Systems

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  15. Advances in Control and Communication

    2012-01-01

    With success of ICEEE 2010 in Wuhan, China, and December 4 to 5, 2010, the second International Conference of Electrical and Electronics Engineering (ICEEE 2011) will be held in Macau, China, and December 1 to 2, 2011. ICEEE is an annual conference to call together researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Electrical and Electronics Engineering along with Computer Science and Technology, Communication Technology, Artificial Intelligence, Information Technology, etc.   This year ICEEE is sponsored by International Industrial Electronics Center, Hong Kong. And based on the deserved reputation, more than 750 papers have been submitted to ICEEE 2011, from which 92 high quality original papers have been selected for the conference presentation and inclusion in the “Future Information Technology and Computer Engineering” book based on the referees’ comments from peer-refereed.     We expec...

  16. Research of user access control for networked manufacturing system

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  17. NOVANET: communications network for a control system

    NOVANET is a control system oriented fiber optic local area network that was designed to meet the unique and often conflicting requirements of the Nova laser control system which will begin operation in 1984. The computers and data acquisition devices that form the distributed control system for a large laser fusion research facility need reliable, high speed communications. Both control/status messages and experimental data must be handled. A subset of NOVANET is currently operating on the two beam Novette laser system

  18. Analysis and Comparison of Access Control Policies Validation Mechanisms

    Muhammad Aqib; Riaz Ahmed Shaikh

    2014-01-01

    Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by the researchers. However, comprehensive analysis and evaluation of the existing access control policy validation techniques is missing in the literature....

  19. Wireless Control Communication for Mechatronic Systems

    Belda, Květoslav; Rychnovský, V.

    Veszprém: University of Pannonia, 2010, s. 68-73. ISBN 978-615-5044-00-7. [11th International PhD Workshop on Systems and Control a Young Generation Viewpoint. Veszprém (HU), 01.09.2010-03.09.2010] R&D Projects: GA MŠk 1M0572 Institutional research plan: CEZ:AV0Z10750506 Keywords : ZigBee * process monitoring and supervision * Wireless Communication Subject RIV: BC - Control Systems Theory http://library.utia.cas.cz/separaty/2010/AS/belda- wireless control communication for mechatronic systems.pdf

  20. Adaptive quality control for multimedia communications

    Santichai Chuaywong; Sinchai Kamolphiwong; Thossaporn Kamolphiwong; Kevin Robert Elz; Suthon Sae-Wong

    2008-01-01

    Multimedia communications are communications with several types of media, such as audio, video and data. The current Internet has some levels of capability to support multimedia communications, unfortunately, the QoS (Quality of Service) is still challenging. A large number of QoS mechanisms has been proposed; however, the main concern is for low levels, e.g. layer 2 (Data Link) or 3 (Transport). In this paper, mechanisms for control the quality of audio and video are proposed. G.723.1 and MP...

  1. Smart Grid Control and Communication

    Ciontea, Catalin-Iosif; Pedersen, Rasmus; Kristensen, Thomas le Fevre;

    2015-01-01

    reliability due to the stochastic behavior found in such networks. Therefore, key concepts are presented in this paper targeting the support of proper smart grid control in these network environments and its Real-Time Hardware-In-the Loop (HIL) verification. An overview on the required Information and...

  2. [Access to birth control: a world estimate].

    Blanco, C

    1988-04-01

    The populations of the developed countries have easy access to contraception, but adequate family planning services are lacking in 80 of 93 recently studied Third World countries. 58% of the population of the developing world lives in these 80 countries. 43% or 372 million of the world's reproductive aged couples use modern and safe contraception. Of these, 102 million live in industrialized countries, about 146 million in the People's Republic of China, and 124 million in other developing countries. Only 27% of couples in developing countries apart from China use modern contraception. Abortion continues to be the most used method of fertility control. About 33 million legal abortions and 27 million illegal abortions are performed annually. Some 250 million women in developing countries who do not desire pregnancy are without family planning information or services. 1 year of protection costs about US $20 per couple in a developing country. Governments of developed countries spend about US $1.5 billion on family planning programs, of which about $500 million is slated for external aid to population programs. An additional investment of $5 billion is needed to provide family planning services to the 250 million women needing them. The 15 most populated industrialized countries which account for 91% of the population of the developed world mostly have good or excellent access to family planning services and information, although some comparatively minor problems may persist. Access to contraception in the countries of Eastern Europe is considered only good because of governmental restrictions on sterilization. Access is hampered in Japan by unavailability of some types of IUDs and pills and severe restrictions on sterilization. Family planning services are only average in the USSR because of poor quality and irregular supplies of modern contraceptives, especially in rural areas. Abortion, although not always easy to arrange because of bureaucratic delays, remains the

  3. Communication for Inquiry and Access: Teaching Techniques from Discourse Research

    Staats, Susan; Duranczyk, Irene; Moore, Randy; Hatch, Jay; Jensen, Murray; Somdahl, Charles

    2006-01-01

    Adopting inquiry-based science and mathematics pedagogies changes traditional classroom communication patterns. Linguistic research in science and mathematics classrooms has identified communication techniques that help teachers manage classroom discussions to increase student interaction and a sense of student responsibility for learning. These…

  4. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  5. Break-glass handling exceptional situations in access control

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  6. Delegation in Role Based Access Control Model for Workflow Systems

    Prasanna H Bammigatti

    2008-03-01

    Full Text Available Role -based access control (RBAC has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy then access rights are inherited upwards through the hierarchy. In organization workflow the main threat is of access control. The Role based access control is one of the best suitable access control model one can think of. It is not only the role hierarchies but also other control factors that affect the access control in the workflow. The paper discusses the control factors and role hierarchies in workflow and brings a new model of RBAC. This paper also over comes the conflicts and proves that the system is safe by applying the new model to the workflow

  7. The Interface communicate to DC motor control

    Retuerta Cornet, Iu

    2010-01-01

    Mälardalens University makes internationally recognized research in the field of Robotics. This technological work shows an electrical engine control developed at Mälardalens University. The target of this project is to make an interface able to communicate with a platform/robot to move the platform/robot using an electric engine control in ADA language. There are different kinds of electric engines, AC, DC, stepper motor, etc. This control focuses on DC electric motors beca...

  8. Context-Based E-Health System Access Control Mechanism

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  9. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.;

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  10. Attributes Enhanced Role-Based Access Control Model

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com- plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an...... important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  11. Code-expanded radio access protocol for machine-to-machine communications

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir;

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated by...... access subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems....

  12. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  13. Ultra Wide Wavelength Division Multiplexing Optical Code Division Multiple Access Communication Systems in Wide Area Optical Communication Networks

    Ahmed Nabih Zaki Rashed

    2013-01-01

    Full Text Available The effect of dispersion of fiber on the performance of OCDMA systemand to find the limitations imposed by dispersion on number of user and length of transmission. It has been observed that in the bit error rate performance curve the error is decreased when the number of subscriber is increased side by side the optical power is reduced when the users is added. This paper has presented the ultra wide wavelength division multiplexing optical code division multiple access (OCDMA communication systems in wide area optical communication networks and the transmission efficiency to be evaluated in order to determine the impact ofmulti access interference.

  14. Future Computer, Communication, Control and Automation

    2011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume topics covered include wireless communications, advances in wireless video, wireless sensors networking, security in wireless networks, network measurement and management, hybrid and discrete-event systems, internet analytics and automation, robotic system and applications, reconfigurable automation systems, machine vision in automation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  15. COMPASS CONTROL, DATA ACQUISITION, AND COMMUNICATION SYSTEM

    Hron, Martin; Písačka, Jan; Fernandes, H.; Sousa, J.; Neto, A.

    Inuyama, 2007. [IAEA Technical Meeting on Control , Data Acquisition, and Remote Participation for Fusion Research/6th./. 4.6.2007-8.6.2007, Inuyama] Institutional research plan: CEZ:AV0Z20430508 Keywords : tokamak * communication system * data acquisition Subject RIV: JC - Computer Hardware ; Software http://tm2007.nifs.ac.jp/

  16. Random Access for Machine-Type Communication based on Bloom Filtering

    Pratas, Nuno; Stefanovic, Cedomir; Madueño, Germán Corrales;

    2016-01-01

    We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a signature during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity and...

  17. 76 FR 21741 - Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town...

    2011-04-18

    ... COMMISSION Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town... Programming Accessibility Act (the Act or CVAA) hosted by the California State University at Northridge (CSUN... and video programming changes required by the Act. DATES: The Town Hall meeting was held on...

  18. A Group-oriented Access Control Scheme for P2P Networks

    Wang Xiaoming; Cheng Fan

    2011-01-01

    A group-oriented access control scheme is proposed for P2P (peer to peer) networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can...

  19. Adaptive quality control for multimedia communications

    Santichai Chuaywong

    2008-01-01

    Full Text Available Multimedia communications are communications with several types of media, such as audio, video and data. The current Internet has some levels of capability to support multimedia communications, unfortunately, the QoS (Quality of Service is still challenging. A large number of QoS mechanisms has been proposed; however, the main concern is for low levels, e.g. layer 2 (Data Link or 3 (Transport. In this paper, mechanisms for control the quality of audio and video are proposed. G.723.1 and MPEG-4 are used as the audio and video codec respectively. The proposed algorithm for adaptive quality control of audio communication is based on forward error correction (FEC. In the case of video communication, the proposed algorithm adapts the value of key frame interval, which is an encoding parameter of MPEG-4. We evaluated our proposed algorithms by computer simulation. We have shown that, in most cases, the proposed scheme gained a higher throughput compared to other schemes.

  20. Access Control in Decentralised Publish/Subscribe Systems

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  1. Decentralized Control and Communication (Plenary talk)

    Bakule, Lubomír

    Villeneuve d'Ascq: IFAC, 2010, s. 1-11. ISBN 978-2-915913-26-2. [IFAC Symposium on Large Scale Systems: Theory and Applications /12/. Villeneuve d'Ascq (FR), 12.07.2010-14.07.2010] R&D Projects: GA AV ČR(CZ) IAA200750802 Institutional research plan: CEZ:AV0Z10750506 Keywords : decentralization * communication * large-scale systems * complex systems * networked control systems Subject RIV: BC - Control Systems Theory

  2. Verifying Resource Access Control on Mobile Interactive Devices

    Besson, Frédéric; Dufay, Guillaume; Jensen, Thomas; Pichardie, David

    2010-01-01

    A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operation...

  3. Open Access to Scholarly Research : An Emerging Success Story in Emancipatory Communication

    Morrison, Heather

    2007-01-01

    Open access is defined, and explored in the context of enclosure and emancipatory communication. One attempt at enclosure, in the form of heavy lobbying by very wealthy companies in the publishing industry against research funders' open access mandates, has been exposed. A PR message is traced from the recommendations of PR pitbull Eric Dezenhall to a failed anti-OA coalition attempt called PRISM to the White House. In spite of this intense lobbying, open access is succeeding. Resources are ...

  4. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with o...

  5. Simplified Optics and Controls for Laser Communications

    Chen, Chien-Chung; Hemmati, Hamid

    2006-01-01

    A document discusses an architecture of a spaceborne laser communication system that provides for a simplified control subsystem that stabilizes the line of sight in a desired direction. Heretofore, a typical design for a spaceborne laser communication system has called for a high-bandwidth control loop, a steering mirror and associated optics, and a fast steering-mirror actuator to stabilize the line of sight in the presence of vibrations. In the present architecture, the need for this fast steering-mirror subsystem is eliminated by mounting the laser-communication optics on a disturbance-free platform (DFP) that suppresses coupling of vibrations to the optics by 60 dB. Taking advantage of microgravitation, in the DFP, the optical assembly is free-flying relative to the rest of the spacecraft, and a low-spring-constant pointing control subsystem exerts small forces to regulate the position and orientation of the optics via voice coils. All steering is effected via the DFP, which can be controlled in all six degrees of freedom relative to the spacecraft. A second control loop, closed around a position sensor and the spacecraft attitude-control system, moves the spacecraft as needed to prevent mechanical contact with the optical assembly.

  6. Communicating the Open Access Message: A Case Study from Ireland

    Lawton, Aoife

    2016-01-01

    Since 2009, Open Access (OA) Week has been celebrated worldwide in October each year. It is an opportunity for librarians to engage with the research community and demonstrate the value that they bring to their organisations in the area of disseminating scholarly output. Although thousands of events have been held since the inception of OA Week, a…

  7. How Public Is the Web?: Robots, Access, and Scholarly Communication.

    Snyder, Herbert; Rosenbaum, Howard

    1998-01-01

    Examines the use of Robot Exclusion Protocol (REP) to restrict the access of search engine robots to 10 major United States university Web sites. An analysis of Web site searching and interviews with Web server administrators shows that the decision to use this procedure is largely technical and is typically made by the Web server administrator.…

  8. High speed serial communications for control systems

    The Superconducting Super Collider Laboratory is a complex of accelerators being built in Ellis County, Texas. The SSCL control system consists of front-end processors and their associated control points remotely distributed from the Central and Regional control rooms. Control messages passing between these locations require timely (deterministic) distribution. A prototype network consisting of point-to-point links utilizing commercial T1 (1.544 Mb/s) communication boards has been implemented. These dedicated communication links will replace networking services traditionally provided for by shared medium networks like Ethernet(IEEE 802.3) and FDDI(IEEE 802.5). A seamless migration will be achieved by using packet encapsulation based on PPP(Point-to-Point Protocol, RFC 1171). All other networking functions including routing and reliable delivery are still being handled by the usual internet services. A distributed control system that currently uses Ethernet for communication is being re-implemented using these point-to-point links. The authors report on throughput measurements, timing constraints and ease of transition of a point-to-point network

  9. Recursive estimation algorithms for power controls of wireless communication networks

    Gang George YIN; Chin-An TAN; Le Yi WANG; Chengzhong XU

    2008-01-01

    Power control problems for wireless communication networks are investigated in direct-sequence codedivision multiple-access(DS/CDMA)channels.It is shown that the underlying problem can be formulated as a constrained optimization problem in a stochastic framework.For effective solutions to this optimization problem in real time,recursive algorithms of stochastic approximation type are developed that can solve the problem with unknown system components.Under broad conditions,convergence of the algorithms is established by using weak convergence methods.

  10. Science and society: the communications revolution and cancer control.

    Viswanath, K

    2005-10-01

    Advances in communications technology, particularly with regards to computer-based media, have opened up exciting possibilities to intervene and influence the trajectory of cancer control, from disease prevention to survivorship, and to reduce the cancer burden. The resulting explosion in cancer information in the mass media and on the Internet, however, also offers challenges in terms of equality in access to information and the ability to act on it, as well as in making sure that it is accurate, readily available and easy to use. PMID:16195753

  11. Accessing quantum secrets via local operations and classical communication

    Gheorghiu, Vlad; Sanders, Barry C.

    2013-01-01

    Quantum secret-sharing and quantum error-correction schemes rely on multipartite decoding protocols, yet the non-local operations involved are challenging and sometimes infeasible. Here we construct a quantum secret-sharing protocol with a reduced number of quantum communication channels between the players. Our scheme is based on embedding a classical linear code into a quantum error-correcting code. Our work paves the way towards the more general problem of simplifying the decoding of quant...

  12. A Formal Model of Access Control for Mobile Interactive Devices

    Besson, Frédéric; Dufay, Guillaume; Jensen, Thomas

    2006-01-01

    This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Javaenabled mobile telephones. We consider access control permissions with multiplicities in order to allow to use a permission a certain number of times. An operational semantics of the model and a formal definition of what it means for...

  13. ACADA: Access Control-driven Architecture with Dynamic Adaptation

    Pereira, Óscar Narciso Mortágua; Rui L. Aguiar; Santos, Maribel Yasmina

    2012-01-01

    Programmers of relational database applications use software solutions (Hibernate, JDBC, LINQ, ADO.NET) to ease the development process of business tiers. These software solutions were not devised to address access control policies, much less for evolving access control policies, in spite of their unavoidable relevance. Currently, access control policies, whenever implemented, are enforced by independent components leading to a separation between policies and their enf...

  14. Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access

    Pawelczak, P.; Pollin, S.; So, H.-S.W.; Bahai, A.R.S.; Prasad, R.V.; Hekmat, R.

    2009-01-01

    In this paper, different control channel (CC) implementations for multichannel medium access control (MAC) algorithms are compared and analyzed in the context of opportunistic spectrum access (OSA) as a function of spectrum-sensing performance and licensed user activity. The analysis is based on a d

  15. CONTEXT BASED ACCESS CONTROL MODEL FOR PROTECTING PERVASIVE ENVIRONMENT

    V. Nirmalrani

    2014-04-01

    Full Text Available -In Pervasive Computing, access control is a critical issue which gives many opportunities for users to access and share the resources anytime and anywhere in a more easiest way. Pervasive Computing Environments are heterogeneous and dynamic sensor-rich environments characterized by frequent and unpredictable changes on users, resources, and environment situations. These environments call the access control solutions that allow dynamic adjustments of access permissions based on information describing the conditions of these entities (context, such as location and time. Some existing models attempt to identify context information which is used as an optional attribute for limiting the scope of access control permissions. However, these approaches normally exploit identities and roles dynamically assigned to the users in order to grant access permissions, which is an inappropriate solution for open and dynamic environments. Those environments cannot assume the existence of predefined roles and user-role associations. Hence the access permissions are claimed and assigned to the users only based on context information, which characterizing the three most important entities of any access control framework: owners, requestors, and resources. Thus, this paper proposes a generalized context-based access control model for making access control decisions completely based on context information, offering seven types of context-based access control policies. The proposed model also takes into account the privacy requirements when enforcing access control policies, such as the support to purposes and obligations. In addition this paper proposes the integration of mechanism to detect / resolve dynamic and static conflict on context-based access control policies.

  16. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  17. Advances in Computer, Communication, Control and Automation

    011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume  topics covered include signal and Image processing, speech and audio Processing, video processing and analysis, artificial intelligence, computing and intelligent systems, machine learning, sensor and neural networks, knowledge discovery and data mining, fuzzy mathematics and Applications, knowledge-based systems, hybrid systems modeling and design, risk analysis and management, system modeling and simulation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  18. Open versus Controlled-Access Data | Office of Cancer Genomics

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  19. Optoelectronic Receiver For Communication And Control

    Kunath, Richard; Bendett, Mark; Mactaggart, I. Ross

    1994-01-01

    Many operational and diagnostic features integrated into circuit chip. GaAs-based integrated circuit designed to serve as optoelectronic interface in phased-array antenna. Intended function to receive digital control signals transmitted on optical fiber and to convert signals to electronic control signals, which then applied to monolithic microwave integrated circuit (MMIC). Also used in reception of high-rate optical digital communications within computers, between computers, and in signal-distribution systems in aircraft, automobiles, and ships. Interface circuit represents significant improvement over preexisting interface circuits in that its clock-signal-recovery subcircuit requires little or no preamble for immediate synchronization.

  20. Law-Aware Access Control and its Information Model

    Stieghahn, Michael

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  1. Integrated command, control, communications and computation system functional architecture

    Cooley, C. G.; Gilbert, L. E.

    1981-01-01

    The functional architecture for an integrated command, control, communications, and computation system applicable to the command and control portion of the NASA End-to-End Data. System is described including the downlink data processing and analysis functions required to support the uplink processes. The functional architecture is composed of four elements: (1) the functional hierarchy which provides the decomposition and allocation of the command and control functions to the system elements; (2) the key system features which summarize the major system capabilities; (3) the operational activity threads which illustrate the interrelationahip between the system elements; and (4) the interfaces which illustrate those elements that originate or generate data and those elements that use the data. The interfaces also provide a description of the data and the data utilization and access techniques.

  2. Distributed Role-based Access Control for Coaliagion Application

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  3. Dynamic User Role Assignment in Remote Access Control

    Saffarian, Mohsen; Tang, Qiang; Jonker, Willem; Hartel, Pieter

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  4. Analysis of Access Control Policies in Operating Systems

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  5. Control and estimation methods over communication networks

    Mahmoud, Magdi S

    2014-01-01

    This book provides a rigorous framework in which to study problems in the analysis, stability and design of networked control systems. Four dominant sources of difficulty are considered: packet dropouts, communication bandwidth constraints, parametric uncertainty, and time delays. Past methods and results are reviewed from a contemporary perspective, present trends are examined, and future possibilities proposed. Emphasis is placed on robust and reliable design methods. New control strategies for improving the efficiency of sensor data processing and reducing associated time delay are presented. The coverage provided features: ·        an overall assessment of recent and current fault-tolerant control algorithms; ·        treatment of several issues arising at the junction of control and communications; ·        key concepts followed by their proofs and efficient computational methods for their implementation; and ·        simulation examples (including TrueTime simulations) to...

  6. Research and teaching access to a large clinical picture archiving and communication system

    Harrison, Marc; Koh, Justin; Tran, Steven; Mongkolwat, Patanasak; Channin, David S.

    2001-01-01

    Purpose: To identify practical issues surrounding delivering digital images from picture archiving and communication systems (PACS) for research and teaching purposes. The complexity of Digital Imaging and Communications in Medicine (DICOM) access methods, security, patient confidentiality, PACS database integrity, portability, and scalability are discussed. A software prototype designed to resolve these issues is described.System Architecture: A six-component, three-tier, client server softw...

  7. A Model of Workflow-oriented Attributed Based Access Control

    Guoping Zhang

    2011-02-01

    Full Text Available the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC, and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  8. Analysis and Comparison of Access Control Policies Validation Mechanisms

    Muhammad Aqib

    2014-12-01

    Full Text Available Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by the researchers. However, comprehensive analysis and evaluation of the existing access control policy validation techniques is missing in the literature. In this paper, we have provided a first detailed survey of this domain and presented the taxonomy of the access control policy validation mechanisms. Furthermore, we have provided a qualitative comparison and trend analysis of the existing schemes. From this survey, we found that only few validation mechanisms exist that can handle both inconsistency and incompleteness problem. Also, most of the policy validation techniques are inefficient in handling continuous values and Boolean expressions.

  9. Media Access Control for Wireless Sensor and Actuator Networks

    Nabi, Muaz Un

    2012-01-01

    In a wireless network, the medium is a shared resource. The nodes in the network negotiate access of the shared resource using the Medium Access Control (MAC) protocol. The design of a MAC protocol for a sensor node is not the same as that for a wireless transceiver. Due to the transceiver characteristics, the MAC protocol design is limited in terms of medium access methods. However, in most cases, the protocols rely on simple access methods i.e. Time Division Multiple Access (TDMA) or Carrie...

  10. Communication Timing Control with Interference Detection for Wireless Sensor Networks

    Kokuke Sekiyama; Yuki Kubo

    2006-01-01

    This paper deals with a novel communication timing control for wireless networks and radio interference problem. Communication timing control is based on the mutual synchronization of coupled phase oscillatory dynamics with a stochastic adaptation, according to the history of collision frequency in communication nodes. Through local and fully distributed interactions in the communication network, the coupled phase dynamics self-organizes collision-free communication. In wireless communicatio...

  11. Efficient Controlled Quantum Secure Direct Communication Protocols

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  12. Communications and control for electric power systems

    Kirkham, H.; Goettsche, A.; Niebur, D.; Friend, H.; Johnston, A.

    1991-01-01

    The first section of the report describes the AbNET system, a hardware and software communications system designed for distribution automation (it can also find application in substation monitoring and control). The topology of the power system fixes the topology of the communications network, which can therefore be expected to include a larger number of branch points, tap points, and interconnections. These features make this communications network unlike any other. The network operating software has to solve the problem of communicating to all the nodes of a very complex network in as reliable a way as possible even if the network is damaged, and it has to do so with minimum transmission delays and at minimum cost. The design of the operating protocols is described within the framework of the seven-layer Open System Interconnection hierarchy of the International Standards Organization. Section 2 of the report describes the development and testing of a high voltage sensor based on an electro-optic polymer. The theory of operation is reviewed. Bulk fabrication of the polymer is discussed, as well as results of testing of the electro-optic coefficient of the material. Fabrication of a complete prototype sensor suitable for use in the range 1-20 kV is described. The electro-optic polymer is shown to be an important material for fiber optic sensing applications. Appendix A is theoretical support for this work. The third section of the report presents the application of an artificial neural network, Kohonen's self-organizing feature map, for the classification of power system states. This classifier maps vectors of an N-dimensional space to a 2-dimensional neural net in a nonlinear way preserving the topological order of the input vectors. These mappings are studied using a nonlinear power system model.

  13. Virus spreading in wireless sensor networks with a medium access control mechanism

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  14. Studying the Feasibility and Importance of Optical Access Network Strategies in the Information and Communication Environment

    Dr.S.S.Riaz Ahamed

    2010-05-01

    Full Text Available The access network has consistently been regarded as a bottleneck in the provisioning of data communication services. This is primarily because the bandwidth available has lagged behind that provided within local-area networks (LANs and in the upper echelons of the network (in metropolitan and core networks, for example, where concentration factors and economies of scale have allowed optical fiber to unleash significant bandwidth capacity. The optical access network is that part of the access network implemented using optical fiber. Optical access offers the promise of greatly increased access-network bandwidth by up to several gigabits per second (Gbps—and most likely more, as technology advances. This bandwidth availability opens up new architectural possibilities for the provisioning of high-bandwidth services.

  15. Controlled trial of an open-access physiotherapy service

    Gentle, P. H.; Herlihy, P. J.; Roxburgh, I. O.

    1984-01-01

    A randomized controlled trial of outpatient open-access physiotherapy was carried out at West Cornwall Hospital during 1979/80. The referral rate to consultant outpatient clinics for those patients offered open-access physiotherapy was considerably lower than for the control group (17 per cent and 56 per cent respectively). Patients using the service received physiotherapy promptly although this did not result in shorter treatments. Those of the control group who eventually received physiothe...

  16. Capability-based Access Control Delegation Model on the Federated IoT Network

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.;

    2012-01-01

    no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...... the identity-based capability-based access control approach as well as contextual information and secure federated IoT, this proposed model provides scalability and flexibility as well as secure authority delegation for highly distributed system....

  17. An Ecological Perspective on U.S. Latinos' Health Communication Behaviors, Access, and Outcomes

    Katz, Vikki S.; Ang, Alfonso; Suro, Roberto

    2012-01-01

    U.S. Latinos experience constrained access to formal health care resources, contributing to higher incidence of preventable diseases and chronic health conditions than the general population. The authors explore whether a rich set of informal health communication connections--to friends, family, radio, television, Internet, newspapers, magazines,…

  18. Videophone Technology and Students with Deaf-Blindness: A Method for Increasing Access and Communication

    Emerson, Judith; Bishop, John

    2012-01-01

    Introduction: Seeing the Possibilities with Videophone Technology began as research project funded by the National Center for Technology Innovation. The project implemented a face-to-face social networking program for students with deaf-blindness to investigate the potential for increasing access and communication using videophone technology.…

  19. Institutional Repositories, Open Access, and Scholarly Communication: A Study of Conflicting Paradigms

    Cullen, Rowena; Chawner, Brenda

    2011-01-01

    The Open Access movement of the past decade, and institutional repositories developed by universities and academic libraries as a part of that movement, have openly challenged the traditional scholarly communication system. This article examines the growth of repositories around the world, and summarizes a growing body of evidence of the response…

  20. An Extended Role Based Access Control Method for XML Documents

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  1. A new access control system by fingerprint for radioisotope facilities

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  2. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    Pang, Xiaodan

    broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility of...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links...

  3. Role Based Access Control system in the ATLAS experiment

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  4. Role Based Access Control system in the ATLAS experiment

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  5. Geospacial information utilized under the access control strategy

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  6. Modeling Access Control Policy of a Social Network

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  7. Access Control of Web- and Java-Based Applications

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  8. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  9. Reinforcement Learning Technique in Multiple Motorway Access Control Strategy Design

    Veljanovska, Kostandina; M. Bombol, Kristi; Maher, Tomaž

    2010-01-01

    An appropriately designed motorway access control can decrease the total travel time spent in the system up to 30% and consequently increase the merging operations safety. To date, implemented traffic responsive motorway access control systems have been of local or regulatory type and not truly adaptive in the real sense of the meaning. Hence, traffic flow can be influenced positively by numerous intelligent transportation system (ITS) techniques. In this paper a contemporary approach is pres...

  10. A United Access Control Model for Systems in Collaborative Commerce

    Ruo-Fei Han; Hou-Xiang Wang; Qian Xiao; Xiao-Pei Jing; Hui Li

    2009-01-01

    The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management...

  11. Mining Attribute-Based Access Control Policies from Logs

    Xu, Zhongyuan; Stoller, Scott,

    2014-01-01

    Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the ...

  12. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  13. Promotion of access to essential medicines for non-communicable diseases: practical implications of the UN political declaration.

    Hogerzeil, Hans V; Liberman, Jonathan; Wirtz, Veronika J; Kishore, Sandeep P; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N; von Schoen-Angerer, Tido

    2013-02-23

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and vaccines for such diseases. 30 years of experience with policies for essential medicines and 10 years of scaling up of HIV treatment have provided the knowledge needed to address barriers to long-term effective treatment and prevention of NCDs. More medicines can be acquired within existing budgets with efficient selection, procurement, and use of generic medicines. Furthermore, low-income and middle-income countries need to increase mobilisation of domestic resources to cater for the many patients with NCDs who do not have access to treatment. Existing initiatives for HIV treatment offer useful lessons that can enhance access to pharmaceutical management of NCDs and improve adherence to long-term treatment of chronic illness; policy makers should also address unacceptable inequities in access to controlled opioid analgesics. In addition to off-patent medicines, governments can promote access to new and future on-patent medicinal products through coherent and equitable health and trade policies, particularly those for intellectual property. Frequent conflicts of interest need to be identified and managed, and indicators and targets for access to NCD medicines should be used to monitor progress. Only with these approaches can a difference be made to the lives of hundreds of millions of current and future patients with NCDs. PMID:23410612

  14. Dynamically Authorized Role-Based Access Control for Grid Applications

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  15. Access Control in Cloud Computing Environment

    Soorat Hussain

    2014-01-01

    Full Text Available Cloud Computing is a new technology which is directly connected with the internet which provide on demand self service internet infrastructure where a customer can pay and use only what is needed. Cloud Computing all services are managed by third party cloud service provider. Nowadays majority using static password to login into the system or access the online accounts in cloud but never change the password which is not secure . Since Cloud computing is a quite new subject, most of the cloud providers have not yet tighten up their security and still use insecure or complicated login method. Static password thoroughly investigated and found out that it is not completing the cloud computing security requirement. Proposed solution is One Time Password and One Day Password, OTP will get expire after two minutes, if user again login will request and receive new password via email and ODP will get expire after 24 hours and on request receive new password via email for new login session. OTP/ODP used with AES encryption. This paper focuses the authentication and transmission encryption in cloud computing services.

  16. Hopping control channel MAC protocol for opportunistic spectrum access networks

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  17. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being...

  18. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    Silvana Rossy de Brito

    Full Text Available This study fills demand for data on access and use of information and communication technologies (ICT in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i with computers and Internet access, (ii with mobile phones, and (iii with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources.

  19. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources. PMID:27035577

  20. Low-sampling-rate M-ary multiple access UWB communications in multipath channels

    Alkhodary, Mohammad T.

    2015-08-31

    The desirable characteristics of ultra-wideband (UWB) technology are challenged by formidable sampling frequency, performance degradation in the presence of multi-user interference, and complexity of the receiver due to the channel estimation process. In this paper, a low-rate-sampling technique is used to implement M-ary multiple access UWB communications, in both the detection and channel estimation stages. A novel approach is used for multiple-access-interference (MAI) cancelation for the purpose of channel estimation. Results show reasonable performance of the proposed receiver for different number of users operating many times below Nyquist rate.

  1. Distributing Digital Imaging and Communications in Medicine data and optimizing access over satellite networks

    Ernst, Randy D.; Kawashima, Akira; Shepherd, William(Santa Cruz Institute for Particle Physics and Department of Physics, Santa Cruz, CA, 95064, U.S.A); Tamm, Eric P.; Sandler, Carl M.

    1999-01-01

    To improve radiology access to full uncompressed Digital Imaging and Communications in Medicine (DICOM) data sets, we evaluated satellite access to a DICOM server. Radiologists′ home computers were connected by satellite to a medweb DICOM server (Medweb, San Francisco, CA). A 10.2-kb data set containing a 19-image head computed tomography (CT) scan was transferred using DirecPC (Hughes Electronics Corp, Arlington, VA) at three different times of the day; 6 AM, 3 PM, and 8 PM. The average tran...

  2. A United Access Control Model for Systems in Collaborative Commerce

    Ruo-Fei Han

    2009-06-01

    Full Text Available The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management of internal functions is of the same importance as external service management. It is very troublesome to control authorizations merely with attributes and composition of policies introduced from attribute-based access control (ABAC. So, we introduce a united access control model for systems in collaborative commerce, combining the advantages of conventional role-based access control (RBAC, task-based authentication control (TBAC and that of recent ABAC and automated trust negotiation (ATN. Innovational ideas in the model are analyzed, and the implement architecture is discussed. The paper concludes with a summary of the united model’s benefits and future work.

  3. Face recognition in controlled access points

    Mur Escartín, Olga

    2009-01-01

    The thesis consist in the study and evaluation of different methods for face recognition. The final objective is to select the most suitable techniques for face detection and recognition. Some of these techniques will be intergrated in a real time demontrator which will be a preliminary prototype that will have to work in controlled conditions (for ilumination and pose) and with reduced databases. The demonstrator will be done in Matlab and the main image acquisition rotines and face detectio...

  4. Retaking Responsibility for How We Communicate. A Review of Open Access and the Humanities: Contexts, Controversies and the Future

    James Baker

    2015-06-01

    Full Text Available Since the publication of the Budapest Open Access Initiative statement in 2002, Open Access has grown from an ideal to a reality. Open Access and the Humanities explores scholarly practices, communications, and cultures in light of this change and argues that humanists can and should retake responsibility for how they chose to publish.

  5. Distributed Frequency Control in Power Grids Under Limited Communication

    Parandehgheibi, Marzieh; Turitsyn, Konstantin; Modiano, Eytan

    2016-01-01

    In this paper, we analyze the impact of communication failures on the performance of optimal distributed frequency control. We consider a consensus-based control scheme, and show that it does not converge to the optimal solution when the communication network is disconnected. We propose a new control scheme that uses the dynamics of power grid to replicate the information not received from the communication network, and prove that it achieves the optimal solution under any single communicatio...

  6. AUV Control and Communication using Underwater Acoustic Networks

    Marques, Eduardo R.B.; Pinto, Marques; Kragelund, Sean; Dias, Paulo S.; Madureira, Luis; Sousa, Alexandre; Correia, Marcio; Ferreira, Hugo; Goncalves, Rui; Martins, Richardo; Horner, Douglas P.; Healey, Anthony J.; Goncalves, Gil M.; Sousa, Joao B.

    2007-01-01

    Underwater acoustic networks can be quite effective to establish communication links between autonomous underwater vehicles (AUVs) and other vehicles or control units, enabling complex vehicle applications and control scenarios. A communications and control framework to support the use of underwater acoustic networks and sample application scenarios are described for single and multi-AUV operation.

  7. Role Based Access Control system in the ATLAS experiment

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  8. Role Based Access Control System in the ATLAS Experiment

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  9. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  10. Based on asynchronous communication protocol of geographic space information service access mechanism research

    G. Chen; Zhao, J.; Gu, M; Li, D.

    2014-01-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text m...

  11. Access to communication technologies in a sample of cancer patients: an urban and rural survey

    Perkins Anthony

    2005-02-01

    Full Text Available Abstract Background There is a growing awareness among providers of the symptom burden experienced by cancer patients. Systematic symptom screening is difficult. Our plan was to evaluate a technology-based symptom screening process using touch-tone telephone and Internet in our rural outreach cancer program in Indiana. Would rural patients have adequate access to technologies for home-based symptom reporting? Objectives 1 To determine access to touch-tone telephone service and Internet for patients in urban and rural clinics; 2 to determine barriers to access; 3 to determine willingness to use technology for home-based symptom reporting. Methods Patients from representative clinics (seven rural and three urban in our network were surveyed. Inclusion criteria were age greater than 18, able to read, and diagnosis of malignancy. Results The response rate was 97%. Of 416 patients completing the survey (230 rural, 186 urban, 95% had access to touch-tone telephone service, while 46% had Internet access (56% of urban patients, 38% of rural patients. Higher rates of Internet access were related to younger patient age, current employment, and higher education and income. The primary barrier to Internet access was lack of interest. Use of the Internet for health related activities was less than 50%. The preferred means of symptom reporting in patients with internet access were the touch-tone telephone (70%, compared to reporting by the Internet (28%. Conclusion Access to communication technologies appears adequate for home-based symptom reporting. The use of touch-tone telephone and Internet reporting, based upon patient preference, has the potential of enhancing symptom detection among cancer patients that is not dependent solely upon clinic visits and clinician inquiry.

  12. Polarization division multiple access with polarization modulation for LOS wireless communications

    Cao Bin

    2011-01-01

    Full Text Available Abstract In this paper, we discuss a potential multiple access and modulation scheme based on polarized states (PS of electromagnetic (EM waves for line-of-sight (LOS communications. The proposed scheme is theoretic different from the existing polar modulation for EDGE and WCDMA systems. We propose the detailed bit representation (modulation and multiple access scheme using PS. Because of the inflexibility of polarization information in the time and frequency domains, as well as independence of frequency and space, the polarization information can be used independently for wireless communications, i.e., another independent resource domain that can be utilized. Due to the independence between the PS and the specific features of signals (such as waveform, bandwidth and data rate, the discussed polarization division multiple access (PDMA and polarization modulation (PM are expected to improve the spectrum utilization effectively. It is proved that the polarization filtering technique can be adopted in the PDMA-PM wireless communications to separate the multiuser signals and demodulate the bit information representing by PS for desired user. Some theoretical analysis is done to demonstrate the feasibility of the proposed scheme, and the simulation results are made to evaluate the performance of the suggested system.

  13. Public information: control, secret and right of access

    Carmem Lúcia Batista

    2012-01-01

    Recently, in November 2011, it was published the law on access to public information, legal and historic mark in the struggle for human rights in Brazil. This achievement is the result of a process marked by denial of access to public archives, as it was the case of the Araguaia Guerrilla, valuing the culture of secrecy, abuse of power and relations between public and private in Brazil. Thus, the aim of this paper is to present a brief history about the control of access to public information...

  14. Efficient medium access control protocol for geostationary satellite systems

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  15. Open Platform Strategies and Innovation: Granting Access vs. Devolving Control

    Kevin Boudreau

    2010-01-01

    This paper studies two fundamentally distinct approaches to opening a technology platform and their different impacts on innovation. One approach is to grant access to a platform and thereby open up markets for complementary components around the platform. Another approach is to give up control over the platform itself. Using data on 21 handheld computing systems (1990-2004), I find that granting greater levels of access to independent hardware developer firms produces up to a fivefold accele...

  16. Law-Aware Access Control and its Information Model

    Stieghahn, Michael; Engel, Thomas

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for exa...

  17. A Group-oriented Access Control Scheme for P2P Networks

    Wang Xiaoming

    2011-02-01

    Full Text Available A group-oriented access control scheme is proposed for P2P (peer to peer networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can realize authentication and secure communication, but also can easily and efficiently add new group members and revoke malicious group members. Therefore, it is more efficient, and more practical protocol for P2P networks.

  18. Reliable Radio Access for Massive Machine-to-Machine (M2M) Communication

    Madueño, Germán Corrales

    Machine-to-Machine (M2M) communication is a term that identifies the emerging paradigm of interconnected systems, machines, and things that communicate and collaborate without human intervention. The characteristics of M2M Communications are small payloads and sporadic transmissions, while the...... service requirements can range from massive number of devices to ultra-reliable. This PhD thesis focuses on novel mechanisms to meet these requirements in a variety of wireless systems, from well-established technologies such as cellular networks, to emerging technologies like IEEE 802.11ah. Today an...... preferable solution for M2M, no mechanisms are in place to guarantee reliable M2M access. Contrary to mainstream solutions that focus on preventing overload, we introduce mechanisms to provide reliable M2M service. We also investigate what cellular networks can do about upcoming smart metering traffic...

  19. Enhanced communication support between control room and field operation : Human communication and interaction

    Berg, Håkon Nergaard

    2007-01-01

    Communication between the field operator and the control room operator is vital for successful operation in the process industry. By reviewing models for human cognition and interpersonal communication and collaboration together with appropriate ~technology, concepts for enhancing the field operator/control room operator communication are developed. These concepts constitutes the basis for design and implementation of a working prototype. The prototype is utilizing a mobile device with wirele...

  20. Task-role-based Access Control Model in Smart Health-care System

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  1. Communication in command and control teams

    Schraagen, J.M.C.; Rasker, P.C.

    2001-01-01

    An important factor affecting team performance in Combat Information Centers is communication. Previous research has shown that high-performing teams use effective communication patterns, such as limiting idle chatter during high workload conditions, and sharing information before it is needed. Alth

  2. A LabVIEW-Based Remotely Controllable and Accesible Laboratory Platform for Communication Systems II Lecture Experiments

    Akar, Aynur; Yayla, Ayse; ERDER, Berkay

    2014-01-01

    In this study, a remotely accessible and controllable communication systems laboratory model is designed for the undergraduate Electronics and Communication Engineering Education. This laboratory model is designed by using LabVIEW program as real time and virtual for Communication Systems II lecture laboratory applications  that contain Convolutional Codes, Viterbi Decoding Algorithm Method, phase shift keying modulated / demodulated schemes and system performance experiments. ...

  3. Control and Communication Network in Hybrid Fuel Cell Vehicles

    朱元; 吴昊; 田光宇; 阳宪惠; 赵立安; 周伟波

    2004-01-01

    This paper describes the control and communication network in fuel cell vehicles, including both the protocol and the hardware.Based on the current protocol (ISO-11898 and SAE J1939), a new practical protocol is proposed and implemented for the control and communication network in fuel cell vehicles.To improve the reliability of data communication and to unify the network management, a new network system based on dual-port RAM is also implemented.

  4. Controlled Secure Quantum Communication Using Pure Entangled W Class States

    We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies

  5. A Service Access Security Control Model in Cyberspace

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  6. Access to Health Care and Control of ABCs of Diabetes

    Zhang, Xuanping; Bullard, Kai McKeever; Gregg, Edward W.; Beckles, Gloria L.; Williams, Desmond E.; Barker, Lawrence E; Albright, Ann L.; Imperatore, Giuseppina

    2012-01-01

    OBJECTIVE To examine the relationship between access to health care and diabetes control. RESEARCH DESIGN AND METHODS Using data from the National Health and Nutrition Examination Survey, 1999–2008, we identified 1,221 U.S. adults (age 18–64 years) with self-reported diabetes. Access was measured by current health insurance coverage, number of times health care was received over the past year, and routine place to go for health care. Diabetes control measures included the proportion of people...

  7. Future Communication, Computing, Control and Management Volume 2

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  8. Future Communication, Computing, Control and Management Volume 1

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  9. Future Computing, Communication, Control and Management Volume 2

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  10. Communication and control tools, systems, and new dimensions

    MacDougall, Robert; Cummings, Kevin

    2015-01-01

    Communication and Control: Tools, Systems, and New Dimensions advocates a systems view of human communication in a time of intelligent, learning machines. This edited collection sheds new light on things as mundane yet still profoundly consequential (and seemingly "low-tech") today as push buttons, pagers and telemarketing systems. Contributors also investigate aspects of "remote control" related to education, organizational design, artificial intelligence, cyberwarfa

  11. Optical label-controlled transparent metro-access network interface

    Osadchiy, Alexey Vladimirovich

    control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique for......This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges are...... arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  12. Controlling user access to electronic resources without password

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  13. Nanorack Compatible Standardized Data Processing, Communication, and Control Module Project

    National Aeronautics and Space Administration — This Phase I study will design and develop a NanoRacks Control Module (NCM) that provides communications, control functions and data processing in a NanoRacks...

  14. Analyzing Accuracy and Accessibility in Information and Communication Technology Ethical Scenario Context

    M. Masrom

    2011-01-01

    Full Text Available Problem statement: Recently, the development of Information and Communication Technology (ICT is indispensable to life. The utilization of ICT has provided advantages for people, organizations and society as a whole. Nevertheless, the widespread and rapid use of ICT in society has exacerbated existing ethical issues or dilemmas and also led to the emergence of new ethical issues such as unauthorized access, software piracy, internet pornography, privacy protection, information gap and many others. Approach: Therefore, the aim of this study is to discuss several issues of the ICT ethics. It will focusing on two major issues, that is, data accuracy and accessibility. Results: The results indicated that more than half percentage of respondents tend to be ethical in data accuracy scenario and also in accessibility scenario. Several computer ethics scenarios that relate to the data accuracy and accessibility are presented and the results of analysis are then discussed. Conclusion: Based on the results in this study, computer ethics issues such as data accuracy and accessibility should receive more attention in the ICT field.

  15. Researchers' perspectives on open access scholarly communication in Tanzanian public universities

    F.W. Dulle

    2009-04-01

    Full Text Available This research explored the awareness, usage and perspectives of Tanzanian researchers on open access as a mode of scholarly communication. A survey questionnaire targeted 544 respondents selected through stratified random sampling from a population of 1088 university researchers of the six public universities in Tanzania. With a response rate of 73%, the data were analysed using the Statistical Package for Social Sciences. The study reveals that the majority of the researchers were aware of and were positive towards open access. Findings further indicate that the majority of researchers in Tanzanian public universities used open access outlets more to access scholarly content than to disseminate their own research findings. It seems that most of these researchers would support open access publishing more if issues of recognition, quality and ownership were resolved. Thus many of them supported the idea of establishing institutional repositories at their respective universities as a way of improving the dissemination of local content. The study recommends that public universities and other research institutions in the country should consider establishing institutional repositories, with appropriate quality assurance measures, to improve the dissemination of research output emanating from these institutions.

  16. IEPLC Framework, Automated Communication in a Heterogeneous Control System Environment

    Locci, F

    2014-01-01

    In CERN accelerators control system several components are essential such as: Programmable Logic Controller (PLC), PCI Extensions for Instrumentation (PXI), and other micro-controller families. Together with their weaknesses and their strength points they typically present custom communication protocols and it is therefore difficult to federate them into the control system using a single communication strategy. Furthermore this dependency to the physical device interfaces and protocols makes most of the code not reusable and the replacement of old technology a difficult problem. The purpose of IEPLC ([1]) is to mitigate the communication issues given by this heterogeneity; it proposes a framework to define communication interfaces in a hardware independent manner. In addition it automatically generates all the resources needed on master side (typically represented by a FEC: Front-End Computer) and slave side (typically represented by the controller) to implement a common and generic Ethernet communication. Th...

  17. On the performance of shared access control strategy for femtocells

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  18. Regulatory Accessibility and Social Influences on State Self-Control

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  19. Review of Access Control Models for Cloud Computing

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  20. Fuzzy logic controller to improve powerline communication

    Tirrito, Salvatore

    2015-12-01

    The Power Line Communications (PLC) technology allows the use of the power grid in order to ensure the exchange of data information among devices. This work proposes an approach, based on Fuzzy Logic, that dynamically manages the amplitude of the signal, with which each node transmits, by processing the master-slave link quality measured and the master-slave distance. The main objective of this is to reduce both the impact of communication interferences induced and power consumption.

  1. An Efficient Radio Access Control Mechanism for Wireless Network-On-Chip Architectures

    Maurizio Palesi

    2015-03-01

    Full Text Available Modern systems-on-chip (SoCs today contain hundreds of cores, and this number is predicted to reach the thousands by the year 2020. As the number of communicating elements increases, there is a need for an efficient, scalable and reliable communication infrastructure. As technology geometries shrink to the deep submicron regime, however, the communication delay and power consumption of global interconnections become the major bottleneck. The network-on-chip (NoC design paradigm, based on a modular packet-switched mechanism, can address many of the on-chip communication issues, such as the performance limitations of long interconnects and integration of large number of cores on a chip. Recently, new communication technologies based on the NoC concept have emerged with the aim of improving the scalability limitations of conventional NoC-based architectures. Among them, wireless NoCs (WiNoCs use the radio medium for reducing the performance and energy penalties of long-range and multi-hop communications. As the radio medium can be accessed by a single transmitter at a time, a radio access control mechanism (RACM is needed. In this paper, we present a novel RACM, which allows one to improve both the performance and energy figures of the WiNoC. Experiments, carried out on both synthetic and real traffic scenarios, have shown the effectiveness of the proposed RACM. On average, a 30% reduction in communication delay and a 25% energy savings have been observed when the proposed RACM is applied to a known WiNoC architecture.

  2. Effective use of multibeam antenna and space-time multiple access technology in modern mobile communication systems

    Moskalets, N. V.

    2015-01-01

    A possibility for efficient use of radio-frequency spectrum and of corresponding increase in productivity of mobile communication system with space-time multiple access obtained by use of multibeam antenna of base station is considered.

  3. Access Control of Web and Java Based Applications

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  4. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  5. Object oriented programming techniques applied to device access and control

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  6. Audit-Based Access Control for Electronic Health Records

    Dekker, M.A.C.; Etalle, S.; Gadducci, F.

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori acce

  7. Audit-Based Access Control for Electronic Health Records

    Dekker, M.A.C.; Etalle, S.

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori acc

  8. Fine-Grained Access Control for Electronic Health Record Systems

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  9. Research on a dynamic workflow access control model

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  10. Secure Dynamic access control scheme of PHR in cloud computing.

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access