WorldWideScience

Sample records for access control communications

  1. The effects of hands free communication devices on clinical communication: balancing communication access needs with user control.

    Richardson, Joshua E; Richardson, Joshua Edwin; Ash, Joan S; Ash, Joan

    2008-01-01

    Hands Free Communication Device (HFCD) systems are a relatively new information and communication technology. HFCD systems enable clinicians to directly contact and communicate with one another using wearable, voice-controlled badges that are VoIP-based (voice-over IP) and are linked to one another over a wireless local area network (WLAN). This qualitative study utilized a grounded theory, multiple perspectives approach to understand how the use of HFCDs affected communication in the hospitals that implemented them. The study generated five themes revolving around HFCDs impact on communication. This paper specifically focuses on two of those themes: Communication Access and Control. PMID:18999046

  2. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  3. An internet of things example: classrooms access control over near field communication.

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  4. In-home Power Line Communication Media Access Control Protocol Based on Collision Resolution

    WANG Bo; HUANG Pei-wei; ZHONG You-ping; QI Ying-hao

    2009-01-01

    Most existing media access control (MAC) protocols in power line communication (PLC) networks just discard the colliding data packets when collision occurs. The collision deteriorates throughput and delay performance of system under high traffic conditions. This article presents a novel media access scheme with fast collision resolution for in-home power line networks. It works by first recognizing the colliding stations through detecting the inserted unique ID sequence ahead of data packets, then the source nodes retransmitting their packets immediately after the collision slot. The proposed protocol maintains the benefits of ALOHA systems. It needs no scheduling overhead and is suitable for bursty sources, such as multimedia data packets. Computer simulations have demonstrated that this approach can achieve high throughput due to its ability of resolving collisions.

  5. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  6. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications

    Mario Manzano

    2013-01-01

    Full Text Available The emergence of intelligent transport systems has brought out a new set of requirements on wireless communication. To cope with these requirements, several proposals are currently under discussion. In this highly mobile environment, the design of a prompt, efficient, flexible, and reliable medium access control, able to cover the specific constraints of the named real-time communications applications, is still unsolved. This paper presents the original proposal integrating Non-Cooperative Cognitive Time Division Multiple Access (NCC-TDMA based on Cognitive Radio (CR techniques to obtain a mechanism which complies with the requirements of real-time communications. Though the proposed MAC uses a slotted channel, it can be adapted to operate on the physical layer of different standards. The authors’ analysis considers the IEEE WAVE and 802.11p as the standards of reference. The mechanism also offers other advantages, such as avoiding signalling and the adaptation capacity to channel conditions and interferences. The solution is applied to the problem of units merging a convoy. Comparison results between NCC-TDMA and Slotted-Aloha are included.

  7. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 3: Software and Hardware. Rehab/Education Technology ResourceBook Series.

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for the disabled or the elderly, the book focuses on hardware and software. The guide's 13 chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  8. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 4: Update to Books 1, 2, and 3.

    Borden, Peter A., Ed.; Vanderheiden, Gregg C., Ed.

    This update to the three-volume first edition of the "Rehab/Education ResourceBook Series" describes special software and products pertaining to communication, control, and computer access, designed specifically for the needs of disabled and elderly people. The 22 chapters cover: speech aids; pointing and typing aids; training and communication…

  9. Detection and response to unauthorized access to a communication device

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  10. Digital autonomous terminal access communications

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  11. Android Access Control Extension

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  12. Android Access Control Extension

    Anton Baláž; Branislav Madoš; Michal Ambróz

    2015-01-01

    The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by pr...

  13. RFID access control

    Luzar, Boštjan

    2012-01-01

    The goal of the thesis was to learn about the procedure of developing applications based on microcontrollers using the Arduino development platform and the IDE environment. Through practical development in the Arduino environment we realized a logic which is capable to authorize access to specific locations and areas based on 125 kHz RFID tags. Although many solutions exist, most of them require a lot of hardware and software because of their modular design and communication types, the so...

  14. Enclosure and open access in communication scholarship

    Morrison, Heather

    2011-01-01

    The current state of scholarly communication is one of contest between an increasingly commercial system that is dysfunctional and incompatible with the basic aims of scholarship, and emerging alternatives, particularly open access publishing and open access archiving. Two approaches to facilitating global participation in scholarly communication are contrasted in this paper; equity is seen as a superior goal to the donor model, which requires poverty or inequity to succeed. The current stat...

  15. 47 CFR 95.645 - Control accessibility.

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  16. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identify to a central processor. The system installed at the Barnwell Nuclear Fuel Plant is described

  17. Analysing Access Control Specifications

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  18. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identity to a central processor. The central processor associates that individual's authorization file with a card-key obtained at the access point. The system generates a record of personnel movement, provides a personnel inventory on a real-time basis, and it can retrieve a record of all prior events. The system installed at the Barnwell Nuclear Fuel Plant is described

  19. Information, communication, travel behaviour and accessibility.

    Wee, van B.; Chorus, C.; Geurs, K.T.

    2013-01-01

    Over the past two decades many papers have been published on the impact of Information and Communication Technologies (ICT) on travel behavior, but the literature focusing on the impact of ICT on accessibility is relatively scarce. In this paper we give an overview of the impact of ICT on four compo

  20. Anonymous Biometric Access Control

    Shuiming Ye

    2009-01-01

    Full Text Available Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine individuals' rights of privacy. Biometric signals are immutable and can be exploited to associate individuals' identities to sensitive personal records across disparate databases. In this paper, we propose the Anonymous Biometric Access Control (ABAC system to protect user anonymity. The ABAC system uses novel Homomorphic Encryption (HE based protocols to verify membership of a user without knowing his/her true identity. To make HE-based protocols scalable to large biometric databases, we propose the k-Anonymous Quantization (kAQ framework that provides an effective and secure tradeoff of privacy and complexity. kAQ limits server's knowledge of the user to k maximally dissimilar candidates in the database, where k controls the amount of complexity-privacy tradeoff. kAQ is realized by a constant-time table lookup to identity the k candidates followed by a HE-based matching protocol applied only on these candidates. The maximal dissimilarity protects privacy by destroying any similarity patterns among the returned candidates. Experimental results on iris biometrics demonstrate the validity of our framework and illustrate a practical implementation of an anonymous biometric system.

  1. Digital Autonomous Terminal Access Communication (DATAC) system

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  2. Physical Access Control Database

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  3. Decentralized control and communication

    Bakule, Lubomír; Papík, Martin

    2012-01-01

    Roč. 36, č. 1 (2012), s. 1-10. ISSN 1367-5788 R&D Projects: GA MŠk(CZ) LG12014 Institutional research plan: CEZ:AV0Z10750506 Keywords : decentralization * communication * large-scale complex systems Subject RIV: BC - Control Systems Theory Impact factor: 1.289, year: 2012

  4. System control and communication

    Rapid and ongoing development in the energy sector has consequences for system control at all levels. In relation to system control and communication the control system is challenged in five important ways: 1) Expectations for security of supply, robustness and vulnerability are becoming more stringent, and the control system plays a big part in meeting these expectations. 2) Services are becoming increasingly based on markets that involve the transmission system operators (TSOs), generators and distribution companies. Timely, accurate and secure communication is essential to the smooth running of the markets. 3) Adding large amounts of renewable energy (RE) to the mix is a challenge for control systems because of the intermittent availability of many RE sources. 4) Increasing the number of active components in the system, such as small CHP plants, micro-CHP and intelligent loads, means that the system control will be much more complex. 5) In the future it is likely that power, heat, gas, transport and communication systems will be tighter coupled and interact much more. (au)

  5. Communication for adaptive control

    Malik, Abdul Mubeen

    2010-01-01

    Ericsson developed the signal processing methods to be used in the digital power to increase the performance and the functionality of the converter. In the continuation of that the method of identifying the load of the DC/DC converter was developed in this project. The aim was to develop the algorithm that controls and communicate with the DC/DC converter “BMR450”. A current sensing circuit was been made for the voltage measurement in the DC/DC converter across the “inductor” in one part of t...

  6. Robust access control framework for mobile cloud computing network

    Li, F; Rahulamathavan, Y.; Conti, M.; Rajarajan, M.

    2015-01-01

    Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of unified communications, employees exploit the advantages of smart devices and 4G wireless technology to access the data from anywhere and anytime. Security protocols such as access control designed for traditional setup are not su...

  7. Studying Media Access andControl Protocols

    Mohammed, Alalelddin Fuad Yousif

    2010-01-01

    This thesis project’s goal is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The thesis fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) re...

  8. 水声通信网络媒介访问控制协议的研究%Research on Media Access Control Protocol for Underwater Acoustic Communication Network

    匡锐

    2014-01-01

    Media access control protocol is the most important part of data link layer protocol, which plays a decisive significance to the distribution of channels. This paper designs a media access control protocol that com-bines normal access mode and MACAW access mode respectively modeling of channel and underwater communi-cation equipment, simulating the normal access mode and MACAW access mode in throughput, bit error rate and transmission delay.%媒介访问控制协议是数据链路层协议中最重要的部分,对信道的分配起着决定性的作用。本文设计了一种普通访问模式和MACAW访问模式相结合的媒介访问控制协议,分别对信道和水下通信设备进行建模,对普通访问模式和MACAW访问模式在吞吐量、误码率和传输延迟进行了仿真。

  9. LANSCE personnel access control system (PACS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  10. Wireless ad hoc networks access for aeronautical communications

    Besse, Frédéric; Garcia, Fabien; Pirovano, Alain; Radzik, José

    2010-01-01

    There is an increasing interest in the current aeronautical context to offer new services for civil aircraft passengers. For example, airlines want to offer their customers the opportunity to access the Internet, to manage their mails, to watch video on demand, to access corporate VPNs.... All these services represent a new type of air-ground communications called APC (Aeronautical Passenger Communications) in the ATN (Aeronautical Telecommunication Network) context. In this paper, we will sh...

  11. Towards Trusted Network Access Control

    Bente, Ingo; von Helden, Josef

    Network Access Control (NAC) solutions promise to significantly increase the security level of modern networks. In short, they allow to measure the integrity state of an endpoint that tries to get access to the network. Based upon the measurement results, which are compared to a defined NAC policy, access to the network can be allowed or denied. One problem of all currently available NAC solutions is referred to as the “lying endpoint” problem. Normally, special software components are responsible for gathering the relevant integrity information on the endpoint. If an attacker modifies those software components, an endpoint can lie about its current integrity state. Therefore, endpoints which are not compliant to the defined NAC policy can get access to the network. Those endpoints must be considered as potential threat. This paper summarizes a possible solution for the lying endpoint problem based upon the specifications of the Trusted Computing Group (TCG) and the results of the two research projects TNC@ FHH and Turaya. The goal is to develop an open source, TNC compatible NAC solution with full TPM support within a new research project: tNAC.

  12. Medium Access Control of Non Uniformly Distributed Multi Hop Network Communication Node%非均匀分布多跳网络通信节点介质访问控制

    杨志忠

    2015-01-01

    在非均匀分布多跳网络中,需要对通信节点进行介质访问控制设计,提高网络通信节点的吞吐性和安全性.传统方法采用多路复用器输出端口信号检测方法进行非均匀分布多跳网络通信节点的介质访问控制,产生强烈的信道畸变,节点的通信控制性能不好.提出一种基于协同调度的混合协议激振算法的非均匀分布多跳网络通信节点介质访问控制方法.将非均匀分布多跳网络通信节点分簇模型的服务器网络接收端和发送端数据的信息熵作为信道传递向量函数,构建协同调度混合协议服务器模型,求得非均匀分布多跳网络时延扩展与信道特性测量均衡后的频谱,可以有效提高信息传输的保真度.仿真结果表明,采用该算法可以有效提高对多跳网络的通信节点介质访问控制性能,提高了通信节点的吞吐性能,降低重复传输次数,保证非均匀分布多跳网络通信的安全性和保真性.%In the non uniform distribution in multi hop networks, the need for access control design of node communication medium, to increase the throughput and security of network communication node. The traditional method is using the detec-tion method of the multiplexer output port signals are non uniformly distributed multi hop network communication node me-dium access control, produce the channel distortion strongly, node communication control performance is not good. This pa-per proposes a hybrid protocol excitation algorithm based on collaborative scheduling non-uniform distribution of multi hop network communication node medium access control method. Non uniform distribution of multi hop network communication node clustering model information entropy server network receiver and transmitter data as the channel transfer vector func-tion, construction of the collaborative scheduling hybrid protocol server model, obtain the non uniformly distributed multi hop network delay spread and

  13. Open access and scholarly communication, part 4

    Eden, Brad

    2009-01-01

    This fourth e-book on the subject of open access in the academic field includes a Latin American case study on open access penetration, a paper from Germany on the promotion of OA illustrated by a project at the University of Konstanz, and a case study on OA at Bioline International, a non-profit scholarly publications aggregator, distributor, publisher and publishing assistance service.

  14. LTE-advanced random access mechanism for M2M communication: A review

    Mustafa, Rashid; Sarowa, Sandeep; Jaglan, Reena Rathee; Khan, Mohammad Junaid; Agrawal, Sunil

    2016-03-01

    Machine Type Communications (MTC) enables one or more self-sufficient machines to communicate directly with one another without human interference. MTC applications include smart grid, security, e-Health and intelligent automation system. To support huge numbers of MTC devices, one of the challenging issues is to provide a competent way for numerous access in the network and to minimize network overload. In this article, the different control mechanisms for overload random access are reviewed to avoid congestion caused by random access channel (RACH) of MTC devices. However, past and present wireless technologies have been engineered for Human-to-Human (H2H) communications, in particular, for transmission of voice. Consequently the Long Term Evolution (LTE) -Advanced is expected to play a central role in communicating Machine to Machine (M2M) and are very optimistic about H2H communications. Distinct and unique characteristics of M2M communications create new challenges from those in H2H communications. In this article, we investigate the impact of massive M2M terminals attempting random access to LTE-Advanced all at once. We discuss and review the solutions to alleviate the overload problem by Third Generation Partnership Project (3GPP). As a result, we evaluate and compare these solutions that can effectively eliminate the congestion on the random access channel for M2M communications without affecting H2H communications.

  15. Controlling Access to Suicide Means

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  16. The Effects of Information and Communication Technologies on Accessibility

    Lu, R.

    2015-01-01

    It is expected that information and communication technology (ICT) can have great impacts on traveler’s accessibility. However, understanding of the effects of ICT on accessibility is still limited. Consequently, this thesis aims to increase the understanding of such effects. The thesis develops a g

  17. Code-Expanded Random Access for Machine-Type Communications

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir;

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose a...

  18. Institutional repositories and Open Access: the future of scholarly communication?

    Prosser, David C

    2003-01-01

    The current model of scholarly communications fails to meet the information needs of researchers world-wide. New technology (in particular the coming of the internet) allows us to revise or to reinvent scholarly communication. This talk discusses the new models that are taking advantage of the new technology and describes a possible future for scholarly communications. In particular, I focus on the development of institutional repositories and open access journals and the way their interactio...

  19. Access Request Trustworthiness in Weighted Access Control Framework

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  20. A Linux Implementation of Temporal Access Controls

    Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E.

    2007-01-01

    Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval File Protection System (TIFPS), a prototype of the Time Interval Access Control (TIAC) model, has been implemented by modifying Linux extended attributes to include temporal metadata associated both with files and users. The Linux Security Module was used to provide hooks fo...

  1. Key issues of multiple access technique for LEO satellite communication systems

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  2. An Access Control Framework for Reflective Middleware

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  3. The Open Access Initiative: A New Paradigm for Scholarly Communications

    Yiotis, Kristin

    2013-01-01

    This paper gives an account of the origin and development of the Open Access Initiative (OAI) and the digital technology that enables its existence. The researcher explains the crisis in scholarly communications and how open access (OA) can reform the present system. OA has evolved two systems for delivering research articles: OA archives or repositories and OA journals. They differ in that OA journals conduct peer review and OA archives do not. Discussion focuses on how these two delivery sy...

  4. Random Access Game and Medium Access Control Design

    Chen, Lijun; Low, Steven H.; Doyle, John C.

    2010-01-01

    Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (strategy evolutions) to achieve Nash equilibria. This provides a general analytical framework that is capable of modeling a large class of system-wide quality-of-service (QoS) models via the specification of per-node util...

  5. Use of action requests to control communications

    This paper discusses the Plant Information Management System (PIMS) that is implemented at Pacific Gas and Electric Company's (PG and E) Diablo Canyon Power Plant (DCPP). PIMS is implemented on IBM mainframes located at the plant, is on-line and interactive, and is accessed via a computer communication system that supports more than 450 IBM 3270 PC workstations. This paper discusses the role of the ACTION REQUEST module of PIMS and how it is used to control plant sensitive communications. The ACTION REQUEST module of PIMS can be accessed from any workstation and during the first year of Commercial Operation of DCPP replaced numerous and redundant forms of manual communication mechanisms. Also in this first year, users at the plant generated approximately 25,000 Action Requests which were controlled through review and approval cycles by PIMS. Each organization assigned action were immediately notified of their responsibilities so that action could be taken in a timely manner. The Diablo Canyon Power Plant broke Westinghouse world-wide operating records for the first year of operation (over 90% availability) due to a well built and reliable plant and due to a responsive Operations organization, which was well informed and controlled

  6. Congestion Control Strategy of Random Access Channel in Machine Type Communication%机器类型通信中随机接入信道的拥塞控制策略

    周伟; 谭小彬; 季海波

    2015-01-01

    在基于3GPP长期演进技术的机器类型通信( MTC)应用背景下,针对无线接入网络中随机接入信道的拥塞问题,提出一种改进的拥塞控制策略,MTC器件利用基站广播信息自适应调整各自的接入时间,避免由于大量MTC器件同时发起随机接入而引起接入碰撞的问题,实现基站的负载均衡及信道资源的合理分配。基于最大熵原理证明各MTC器件接入时间的均匀分布是最优分布。仿真实验结果表明,与接入类别限制策略相比,该策略可缓解随机接入信道的拥塞状况,提高MTC器件的随机接入成功率,降低接入时延,从而提升网络整体性能及服务质量。%This paper proposes an improved congestion control strategy to alleviate the congestion of random access channel in radio access network of Machine Type Communication(MTC) based on 3GPP-Long Term Evolution(LTE). In order to reach the base-station’ s load balancing in the time interval and allocate the channel resources rationally,it schedules the access time of MTC devices through the base-station’ s broadcasted information,and thereby avoids access collisions caused by massive number of MTC devices access the base-station simultaneously. It also proofs that uniform distribution of the access time is the optimal choice by maximum entropy principle. Simulation experimental results show that the strategy can alleviate the channel congestion significantly and increase the random access success rate of MTC devices,reduce the delay,and thus improve the network’ s performance and guarantee the network’ s Quality of Service ( QoS) compared with Access Class Barring( ACB) strategy.

  7. User Behavior Trust Based Cloud Computing Access Control Model

    Jiangcheng, Qin

    2016-01-01

    Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud...

  8. An electronically controlled automatic security access gate

    Jonathan A. Enokela; Michael N. TYOWUAH

    2014-01-01

    The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF) transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is ...

  9. Efficient Access Control for Wireless Sensor Data

    Sorniotti, Alessandro; Molva, Refik; GOMEZ, Laurent; Trefois, Christophe; Laube, Annett; Scaglioso, Piervito

    2009-01-01

    Abstract Although very developed in many sectors (databases, filesystems), access control schemes are still somewhat elusive when it comes to wireless sensor net- works. However, it is clear that many WSN systems—such as healthcare and automotive ones—need a controlled access to data that sensor nodes produce, given its high sensitivity. Enforcing access control in wireless sensor networks is a particularly difficult task due to the limited computational capacity of wireless sensor nodes. In ...

  10. Evaluation of file access control implementations

    Madar, Fatima Ali

    2005-01-01

    This thesis discusses two implementations of file access controls: the UNIX Permissions (UP) and the Access Control List (ACL). We will evaluate advantages and weaknesses in these two implementations. The criteria of evaluation are usefulness, security and manageability. The level of usefulness of systems was measured by evaluating user-surveys. The level of security was measured by comparing the implementations against well-established file access control models concerning privacy, inte...

  11. How Much Control Do Children and Adolescents Have over Genomic Testing, Parental Access to Their Results, and Parental Communication of Those Results to Others?

    Clayton, Ellen Wright

    2015-01-01

    Adolescents may often have opinions about whether they want genetic and genomic testing in both the clinic and research and about who should have access to the results. This legal analysis demonstrates that the law provides very little protection to minors' wishes. PMID:26479563

  12. Formative Evaluation to Assess Communication Technology Access and Health Communication Preferences of Alaska Native People

    Robinson, Renee F.; Dillard, Denise A.; Hiratsuka, Vanessa Y.; Smith, Julia J.; Tierney, Steve; Avey, Jaedon P.; Buchwald, Dedra S.

    2016-01-01

    Objective Information technology can improve the quality, safety, and efficiency of healthcare delivery by improving provider and patient access to health information. We conducted a nonrandomized, cross-sectional, self-report survey to determine whether Alaska Native and American Indian (AN/AI) people have access to the health communication technologies available through a patient-centered medical home. Methods In 2011, we administered a self-report survey in an urban, tribally owned and operated primary care center serving AN/AI adults. Patients in the center’s waiting rooms completed the survey on paper; center staff completed it electronically. Results Approximately 98% (n = 654) of respondents reported computer access, 97% (n = 650) email access, and 94% (n = 631) mobile phone use. Among mobile phone users, 60% had Internet access through their phones. Rates of computer access (p = .011) and email use (p = .005) were higher among women than men, but we found no significant gender difference in mobile phone access to the Internet or text messaging. Respondents in the oldest age category (65–80 years of age) were significantly less likely to anticipate using the Internet to schedule appointments, refill medications, or communicate with their health care providers (all p < .001). Conclusion Information on use of health communication technologies enables administrators to deploy these technologies more efficiently to address health concerns in AN/AI communities. Our results will drive future research on health communication for chronic disease screening and health management.

  13. Evaluation of Accessibility and Use of New Communication Technologies in Patients With Type 1 Diabetes Mellitus

    Giménez-Pérez, Gabriel; Gallach, Maria; Acera, Edita; Prieto, Araceli; Carro, Olga; Ortega, Emilio; González-Clemente, José-Miguel; Mauricio, Dídac

    2002-01-01

    Background The role of patients in the management and control of type 1 diabetes mellitus, a chronic disease, is well established. The advent of new communication technologies is expected to improve patients' access to health information. However, little is known about the extent to which patients with type 1 diabetes mellitus use the Internet to retrieve medical information and about the impact, if any, this retrieval has on their health status. Objective To evaluate the accessibility and us...

  14. Access control system for ISABELLE

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  15. Campus Access Control System RFID Based

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  16. Control with a random access protocol and packet dropouts

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  17. The entire network topology display system of terminal communication access network

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  18. Access control and service-oriented architectures

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  19. Proximity Displays for Access Control

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  20. SPS access control system a new user interface

    Riesco, T

    1999-01-01

    This document describes the project to implement at CERN new trends in industrial control systems and integrate new requirements and functions requested by users. This project will be the testing ground for the specification of procedures in the Access Control and Machine Interlock of LHC. The last modification in the Access Control System to the primary beam areas was made in 1995, and this new project is to improve the fields of personal security, access security and the introduction of modern communication networks used in the industrial control systems. Inside the cycle model of project life, it is at the present time in the test phase in terms of security and exploitation inside the Accelerator Decelerator (AD) project. The presence of Authorization Management System (AMS) to guarantee the automatic information distribution of authorizations to controlled areas is in line with this project.

  1. Privacy Preservation in Role-based Access Control Model

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  2. Disk access controller for Multi 8 computer

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  3. Modelling Access Control For Healthcare Information Systems

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  4. Communication access in the library for individuals who use augmentative and alternative communication.

    Shepherd, Tracy A; McDougall, Stacy

    2008-12-01

    Libraries for All is a community-based program that aims to enhance communication access to the library for individuals who use augmentative and alternative communication (AAC), by providing resources and instruction. The goals are to (a) provide communication boards, (b) complete facilitator training, and (c) promote the program. To accomplish these goals, four communication boards were created and provided to all public libraries in London, Ontario. A train-the-trainer model was employed to ensure that all members of the library staff were familiar with the boards and aware of strategies to communicate more effectively with individuals who use AAC. Marketing materials were sent to potential stakeholders. The success of the program in meeting these three goals is highlighted. PMID:19023753

  5. Access control and personal identification systems

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  6. Access control, security, and trust a logical approach

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  7. Making the innovation case in Open Access scholary communication

    CERN. Geneva

    2005-01-01

    It seems almost unnecessary to have to elaborate additional reasons for the adoption of Open Access scholarly communication (OA sc) as manifested through Open Access journals and self-archiving practices. To those active within the OA arena, the case has been convincingly made, and current arguments merely need to be disseminated beyond the Library and Information Science (LIS) sphere. However, it is my contention that a convincing argument for OA sc needs to be launched from the Science Policy perspective if any government mandated pro-OA policy changes are to be effected. This paper, then, is an attempt at taking the OA discussion beyond the LIS arena and into the realm of Science and Innovation Policy. Using Innovation Theory as its theoretical framework, it is argued that Open Access scholarly communication can only serve to bolster Innovation Systems, be they national, regional, or sectoral. The case of South Africa is taken as an illustrative example, though the case can and will be generalised to beyon...

  8. Access control issues in social networks

    Carreras Coch, Anna; Rodríguez Luna, Eva; Delgado Mercè, Jaime; Maroñas Borras, Xavier

    2010-01-01

    Social Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies in Social Networks. Subsequently, two main issues are addressed: the interoperability amongst systems using different policy languages and the lack of elements in the existing policy languages when trying to express Social Networks’ access control. In part...

  9. Communicable Diseases and Outbreak Control.

    Ameli, Jonathan

    2015-10-01

    Infectious disease during an emergency condition can raise the death rate 60 times in comparison to other causes including trauma. An epidemic, or outbreak, can occur when several aspects of the agent (pathogen), population (hosts), and the environment create an ideal situation for spread. Overcrowding, poor regional design and hygiene due to poverty, dirty drinking water, rapid climate changes, and natural disasters, can lead to conditions that allow easier transmission of disease. Once it has been established that an emergency condition exists, there must be a prompt and thorough response for communicable disease control. A camp should be created, and the disease managed rapidly. The overall goals are rapid assessment, prevention, surveillance, outbreak control, and disease management. PMID:27437528

  10. Promotion of access to essential medicines for non-communicable diseases : practical implications of the UN political declaration

    Hogerzeil, Hans V.; Liberman, Jonathan; Wirtz, Veronika J.; Kishore, Sandeep P.; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N.; von Schoen-Angerer, Tido

    2013-01-01

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and v

  11. Open Access. Chapter 6 of Scholarly Communication for Librarians.

    Morrison, Heather

    2008-01-01

    In-depth overview of open access, covering definitions (open access publishing, open access archives, gratis and libre, open access works versus open access processes), major statements and declarations, types of open access, major initiatives, trends, advocacy and lobbying.

  12. Distributed Access Control Policies for Spectrum Sharing

    Baldini, Gianmarco; NAI-FOVINO Igor; Trombetta, Alberto; Braghin, Stefano

    2012-01-01

    Cognitive Radio (CR) is a novel wireless communication technology that allows for adaptive configuration of the reception parameters of a terminal, based on the information collected from the environment. Cognitive radio (CR) technology can be used in innovative spectrum management approaches like spectrum sharing, where radio frequency spectral bands can be shared among various users through a dynamic exclusive-use spectrum access model. Spectrum sharing can be applied to various...

  13. A Survey of Access Control Models in Wireless Sensor Networks

    Htoo Aung Maw

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.

  14. OVERSAMPLED CHAOTIC BINARY SEQUENCES FOR MULTGIPLE ACCESS COMMUNICATION

    ZhongHongtao; WangHuiyun; 等

    2002-01-01

    Noise interference and multiple access interference are the main impairment to the performance of DS/CDMA communication system.This letter presents that OverSampled Chaotic Map(OSCM)binary sequences are secure as spreading sequences,and based on the optimal quantizing method,the BER performance of the system has been derived in detail,the internal relationships among the number of users,the power of noise and the lengh of code chips are revealed in mathematical formulae.The performance of the system can be improved by employing these formulae.Numerical results conform the efficiency of discussion in this letter.

  15. OVERSAMPLED CHAOTIC BINARY SEQUENCES FOR MULTIPLE ACCESS COMMUNICATION

    Zhang Hongtao; Wang Huiyun; Ding Runtao

    2002-01-01

    Noise interference and multiple access interference are the main impairment to the performance of DS/CDMA communication system. This letter presents that OverSampled Chaotic Map (OSCM) binary sequences are secure as spreading sequences, and based on the optimal quantizing method, the BER performance of the system has been derived in detail, the internal relationships among the number of users, the power of noise and the length of code chips are revealed in mathematical formulae. The performance of the system can be improved by employing these formulae. Numerical results conform the efficiency of discussion in this letter.

  16. Evaluation of Accessibility and Use of New Communication Technologies in Patients With Type 1 Diabetes Mellitus

    Gallach, Maria; Acera, Edita; Prieto, Araceli; Carro, Olga; Ortega, Emilio; González-Clemente, José-Miguel; Mauricio, Dídac

    2002-01-01

    Background The role of patients in the management and control of type 1 diabetes mellitus, a chronic disease, is well established. The advent of new communication technologies is expected to improve patients' access to health information. However, little is known about the extent to which patients with type 1 diabetes mellitus use the Internet to retrieve medical information and about the impact, if any, this retrieval has on their health status. Objective To evaluate the accessibility and use of new communication technologies in a population of patients with type 1 diabetes mellitus. Methods Patients with type 1 diabetes mellitus attending the Diabetes Clinic of the Hospital de Sabadell, Sabadell, Spain, in a 6-month period were asked to answer a structured questionnaire about education level, Internet accessibility, use of health-related Web sites, and mobile-phone ownership and use. Results Of 302 patients with type 1 diabetes mellitus attending the Diabetes Clinic on a regular basis, 244 (115 men, 129 women) were interviewed (response rate 80.8%). Personal computers were owned by 58.2% of patients. Fifty-nine percent had access to the Internet, 39.3% had access to the Internet at home; however, only 36.5% were regular Internet users. Internet users were younger, more frequently men, and of higher education level. Among Internet users only 49.4% had ever accessed a health-related Web site. Internet users who had ever accessed a health-related Web site had a higher level of education, presented severe hypoglycemia more frequently, and were more likely to have access to the Internet at home. No differences were found in metabolic control between Internet users and nonusers or between Internet users who had ever accessed a health-related Web site and Internet users who had never accessed a health-related Web site. Of the 76.6% of the patients that owned a mobile phone, 96% used it more than once a week. Conclusions The impact of new communication technologies might

  17. An Access Control Model of Virtual Machine Security

    QIN Zhong-yuan; Chen, Qi; Lv, You; Qiang, Yong; GUO Ai-wen; SHEN Ri-sheng; Zhang Qunfang

    2013-01-01

    Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improve...

  18. A Generic Role Based Access Control Model for Wind Power Systems

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  19. Access Control Management for SCADA Systems

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  20. Towards Communication and Information Access for Deaf People

    Edwin Blake

    2014-10-01

    Full Text Available In tightly circumscribed communication situations an interactive system resident on a mobile device can assist Deaf people with their communication and information needs. The Deaf users considered here use South African Sign Language and information is conveyed by a collection of pre-recorded video clips and images. The system was developed according to our method of community-based co-design. We present several stages of the development as a series of case studies and highlight our experience. The first stage involved ethnographically inspired methods such as cultural probes. In the next stage we co-designed a medical consultation system that was ultimately dropped for technical reasons. A smaller system was developed for pharmaceutical dispensing and successfully implemented and tested. It now awaits deployment in an actual pharmacy. We also developed a preliminary authoring tool to tackle the problem of content generation for interactive computer literacy training. We are also working on another medical health information tool. We intend that a generic authoring tool be able to generate mobile applications for all of these scenarios. These mobile applications bridge communication gaps for Deaf people via accessible and affordable assistive technology.

  1. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  2. An Access Definition and Query Language : Towards a Unified Access Control Model

    Sonnenbichler, Andreas

    2013-01-01

    In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of rights, ego-centered roles, and decentralized administration. The suggested meta access control model is named \\'\\'Access Definition and Query Language\\'\\' (ADQL). ADQL is represented by a formal, context-free grammar allowing to express the targeted access control model, policies, facts, and access queries as a formal language.

  3. Performance estimates for personnel access control systems

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  4. Performance estimates for personnel access control systems

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  5. Access Control in Data Management Systems

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  6. A QUANTUM MULTIPLE ACCESS COMMUNICATIONS SCHEME USING ORBITAL ANGULAR MOMENTUM

    Dong Xiaoliang; Zhao Shengmei; Zheng Baoyu

    2013-01-01

    We propose a quantum multiple access communications scheme using Orbital Angular Momentum (OAM) sector states in the paper.In the scheme,each user has an individual modified Poincare Bloch sphere and encodes his information with his own corresponding sector OAM states.A prepared entangled photon pairs are separated at transmitter and receiver.At the transmitter,each user encodes his information with the sector OAM states on the photons and the superposition of the different sector OAM states is carried by the photons.Then the photons are transmitted through quantum noiseless channel to the receiver.At the receiver,each user could retrieve his information by coincidently measuring the transmitted photons with the receiver side photons which are modulated by a special prepared measurement basis.The theoretical analysis and the numerical simulations show that each user could get his information from the superposition state without error.It seems that this scheme provides a novel method for quantum multiple users communications.

  7. Communication for command and control systems

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  8. An electronically controlled automatic security access gate

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  9. Network Access Control List Situation Awareness

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  10. Integrating Usage Control with SIP-Based Communications

    A. Lakas

    2008-11-01

    Full Text Available The Session Initiation Protocol (SIP is a signaling protocol used for establishing and maintaining communication sessions involving two or more participants. SIP was initially designed for voice over IP and multimedia conferencing, and then was extended to support other services such as instant messaging and presence management. Today, SIP is also adopted to be used with 3G wireless networks, thus it becomes an integral protocol for ubiquitous environment. SIP has various methods that support a variety of applications such as subscribing to a service, notification of an event, status update, and location and presence services. However, when it comes to security, the use of wireless and mobile communication technologies and the pervasive nature of this environment introduce higher risks to security than that of the old simple environment. In this paper, we introduce new architecture that implements a new type of access control called usage access control (UCON to control the access to the SIP-based communication at preconnection, during connection, and postconnection. This will enable prescribers of SIP services to control who can identify their locations to approve or disapprove their subsequent connections, and to also set some parameters to determine whether a certain communication can continue or should terminate.

  11. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  12. Communication and control for networked complex systems

    Peng, Chen; Han, Qing-Long

    2015-01-01

    This book reports on the latest advances in the study of Networked Control Systems (NCSs). It highlights novel research concepts on NCSs; the analysis and synthesis of NCSs with special attention to their networked character; self- and event-triggered communication schemes for conserving limited network resources; and communication and control co-design for improving the efficiency of NCSs. The book will be of interest to university researchers, control and network engineers, and graduate students in the control engineering, communication and network sciences interested in learning the core principles, methods, algorithms and applications of NCSs.

  13. Cross-layer rate control, medium access control and routing design in cooperative VANET

    Zhou, Liang; Zheng, Baoyu; Geller, Benoit; Wei, Anne; Xu, Shan; Li, Yajun

    2008-01-01

    In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-layer design. At first, we introduce the cooperative communication conception to VANET, and propose an opportunistic cooperation strategy to improve the system performance. And then, we develop a cross-layer solution which consists of the link capacity detection with adjusting persistence probability at the MAC Layer, th...

  14. Measurement Based Self-Optimization in Random Access Communications

    Giovanidis, Anastasios; Stanczak, Slawomir

    2011-01-01

    This work considers a single-cell random access channel in cellular wireless networks and provides an algorithmic approach to the problem of optimal coordination of user actions. In the scenario considered, an access effort is successful if (a) the signal is detected at the receiver and (b) no collision occurs. The first event is controlled by the user transmission power while the second one by the choice of access (back-off) probability. These constitute the user action pair. The algorithm aims at exploiting information from measurements and user reports, in order to estimate current values of the system situation. Based on these estimates, two optimization problems can be formulated and solved for the so called contention level and transmission power level at the base station side. The methodology to find the optimal values is based on minimization of a drift function. The two values are broadcast in order to help the users update their actions ``almost optimally``. In this way the wireless cell can achieve...

  15. Speed control system for an access gate

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  16. Establishing mandatory access control on Android OS

    Bugiel, Sven

    2015-01-01

    Common characteristic of all mobile operating systems for smart devices is an extensive middleware that provides a feature-rich API for the onboard sensors and user’s data (e.g., contacts). To effectively protect the device’s integrity, the user’s privacy, and to ensure non-interference between mutually distrusting apps, it is imperative that the middleware enforces rigid security and privacy policies. This thesis presents a line of work that integrates mandatory access control (MAC) mecha...

  17. Predictive access control for distributed computation

    Yang, Fan; Hankin, Chris; Nielson, Flemming;

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  18. An Access Control Model of Virtual Machine Security

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  19. Privacy and Access Control for IHE-Based Systems

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  20. External access to ALICE controls conditions data

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  1. External access to ALICE controls conditions data

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  2. An Enhanced Multiple Random Access Scheme for Satellite Communications

    Bui, Huyen-Chi; Boucheret, Marie-Laure

    2011-01-01

    In this paper, we introduce Multi-Slots Coded ALOHA (MuSCA) as a multiple random access method for satellite communications. This scheme can be considered as a generalization of the Contention Resolution Diversity Slotted Aloha (CRDSA) mechanism. Instead of transmitting replicas, this system replaces them by several parts of a single word of an error correcting code. It is also different from Coded Slotted ALOHA (CSA) as the assumption of destructive collisions is not adopted. In MuSCA, the entity in charge of the decoding mechanism collects all bursts of the same user (including the interfered slots) before decoding and implements a successive interference cancellation (SIC) process to remove successfully decoded signals. Simulations show that for a frame of 100 slots, the achievable total normalized throughput is greater than 1.25 and 1.4 for a frame of 500 slots, resulting in a gain of 80% and 75% with respect to CRDSA and CSA respectively. This paper is a first analysis of the proposed scheme and opens se...

  3. Fulfilling the Promise of Scholarly Communication – a Comparison Between Old and New Access Models

    David C. Prosser

    2005-01-01

    The convergence of dissatisfaction with traditional, subscription-based business model for scholarly communications and the development of new, digital technologies allow us to look consider the claims of new models. This paper describes the requirements of a scholarly communication system and investigates which model – subscription-based access or open access – best satisfies these requirements.

  4. Promotion of access to essential medicines for Non-Communicable Diseases: Practical implications of the UN Political Declaration

    Hogerzeil, Hans V; Liberman, Jonathan; Wirtz, Veronika J.; Kishore, Sandeep P; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N; von Schoen-Angerer, Tido

    2013-01-01

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and vaccines for such diseases. 30 years of experience with policies for essential medicines and 10 years of scaling up of HIV treatment have provided the knowledge needed to address barriers to long-te...

  5. Distributed medium access control in wireless networks

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  6. Open Access in the Natural and Social Sciences: The Correspondence of Innovative Moves to Enhance Access, Inclusion and Impact in Scholarly Communication

    Armbruster, Chris

    2008-01-01

    Online, open access is the superior model for scholarly communication. A variety of scientific communities in physics, the life sciences and economics have gone furthest in innovating their scholarly communication through open access, enhancing accessibility for scientists, students and the interested public. Open access enjoys a comparative…

  7. WP EMPLACEMENT CONTROL AND COMMUNICATION EQUIPMENT DESCRIPTIONS

    The objective and scope of this document are to list and briefly describe the major control and communication equipment necessary for waste package emplacement at the proposed nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the required equipment are explained and summarized in the individual subsections of this document. This task was evaluated in accordance with QAP-2-0 and found not to be quality affecting. Therefore, this document was prepared in accordance with NAP-MG-012. The following control and communication equipment are addressed in this document: (1) Programmable Logic Controllers (PLC's); (2) Leaky Feeder Radio Frequency Communication Equipment; (3) Slotted Microwave guide Communication Equipment; (4) Vision Systems; (5) Radio Control Equipment; and (6) Enclosure Cooling Systems

  8. Viewpoints on control of military satellite communications

    Heppe, S. B.

    1983-07-01

    The three main factors are system management, communication protocols, and the control system architecture. Each of these is analyzed here in terms of a model. The model for system management is the definition of system control of the Defense Communications System, referred to as DCS syscon. The model for communication protocols is referred to as the ISO model of OSI, ISO denoting the International Standards Organization and OSI denoting open systems interconnection. The model of the control system architecture is an elemental model. The interplay between the models is highlighted. Examples are presented from the Defense Satellite Communications System and from MILSTAR. Prospects for the future are considered in view of the integration expected as systems become more capable and sophisticated. It is expected that many of the real-time control functions performed at the worldwide and theater levels will be automated on the satellite.

  9. WP EMPLACEMENT CONTROL AND COMMUNICATION EQUIPMENT DESCRIPTIONS

    N.T. Raczka

    1997-10-02

    The objective and scope of this document are to list and briefly describe the major control and communication equipment necessary for waste package emplacement at the proposed nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the required equipment are explained and summarized in the individual subsections of this document. This task was evaluated in accordance with QAP-2-0 and found not to be quality affecting. Therefore, this document was prepared in accordance with NAP-MG-012. The following control and communication equipment are addressed in this document: (1) Programmable Logic Controllers (PLC's); (2) Leaky Feeder Radio Frequency Communication Equipment; (3) Slotted Microwave guide Communication Equipment; (4) Vision Systems; (5) Radio Control Equipment; and (6) Enclosure Cooling Systems.

  10. ARCPAS - Automatic radiation control point access system an automated data collection terminal for radiation dose and access control

    Nuclear facilities such as nuclear power plants or fuel processing facilities are required to maintain accurate records of personnel access, exposure and work performed. Most facilities today have some sort of computerized data collection system for radiation dose and access control. The great majority rely on handwritten records, i.e., dose card or sign-in sheet which in turn are transferred to a computerized records management system manually. The ARCPAS terminal provides a method for automating personnel exposure data collection and processing. The terminal is a user interactive device which contains a unit for automatically reading and zeroing pocket dosemeters, a security badge reader for personnel identification, a 16 digit key pad for RWP information entry, a high resolution color CRT for interactive communication and a high speed tape printer providing an entry chit. The chit provides the individual worker with a record of the transaction including an individual identifying number, remaining dose for the quarter or period and RWP under which the worker entered the controlled area. The purpose of automating the access control is to provide fast, accurate, realtime data to the records management system. A secondary purpose is to relieve trained health physics technicians of control point duties so that their training and skills can be utilized more effectively in a facility's health physics program

  11. Integrating Attributes into Role-Based Access Control

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area of...... research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  12. Group Communication Over LTE : A Radio Access Perspective

    Kim, Juyeop; Choi, Sang Won; Shin, Won-Yong; Song, Yong-Soo; Kim, Yong-Kyu

    2016-01-01

    Long Term Evolution (LTE), which has its root on commercial mobile communications, recently becomes an influential solution to future public safety communications. To verify the feasibility of LTE for public safety, it is essential to investigate whether an LTE system optimized for one-to-one communications is capable of providing group communication, which is one of the most important service concepts in public safety. In general, a number of first responders for public safety need to form a...

  13. Authorisation and access control for electronic health record systems.

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  14. Cardea: Dynamic Access Control in Distributed Systems

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  15. Advances in Control and Communication

    2012-01-01

    With success of ICEEE 2010 in Wuhan, China, and December 4 to 5, 2010, the second International Conference of Electrical and Electronics Engineering (ICEEE 2011) will be held in Macau, China, and December 1 to 2, 2011. ICEEE is an annual conference to call together researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Electrical and Electronics Engineering along with Computer Science and Technology, Communication Technology, Artificial Intelligence, Information Technology, etc.   This year ICEEE is sponsored by International Industrial Electronics Center, Hong Kong. And based on the deserved reputation, more than 750 papers have been submitted to ICEEE 2011, from which 92 high quality original papers have been selected for the conference presentation and inclusion in the “Future Information Technology and Computer Engineering” book based on the referees’ comments from peer-refereed.     We expec...

  16. Research of user access control for networked manufacturing system

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  17. NOVANET: communications network for a control system

    NOVANET is a control system oriented fiber optic local area network that was designed to meet the unique and often conflicting requirements of the Nova laser control system which will begin operation in 1984. The computers and data acquisition devices that form the distributed control system for a large laser fusion research facility need reliable, high speed communications. Both control/status messages and experimental data must be handled. A subset of NOVANET is currently operating on the two beam Novette laser system

  18. Analysis and Comparison of Access Control Policies Validation Mechanisms

    Muhammad Aqib; Riaz Ahmed Shaikh

    2014-01-01

    Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by the researchers. However, comprehensive analysis and evaluation of the existing access control policy validation techniques is missing in the literature....

  19. Wireless Control Communication for Mechatronic Systems

    Belda, Květoslav; Rychnovský, V.

    Veszprém: University of Pannonia, 2010, s. 68-73. ISBN 978-615-5044-00-7. [11th International PhD Workshop on Systems and Control a Young Generation Viewpoint. Veszprém (HU), 01.09.2010-03.09.2010] R&D Projects: GA MŠk 1M0572 Institutional research plan: CEZ:AV0Z10750506 Keywords : ZigBee * process monitoring and supervision * Wireless Communication Subject RIV: BC - Control Systems Theory http://library.utia.cas.cz/separaty/2010/AS/belda- wireless control communication for mechatronic systems.pdf

  20. Adaptive quality control for multimedia communications

    Santichai Chuaywong; Sinchai Kamolphiwong; Thossaporn Kamolphiwong; Kevin Robert Elz; Suthon Sae-Wong

    2008-01-01

    Multimedia communications are communications with several types of media, such as audio, video and data. The current Internet has some levels of capability to support multimedia communications, unfortunately, the QoS (Quality of Service) is still challenging. A large number of QoS mechanisms has been proposed; however, the main concern is for low levels, e.g. layer 2 (Data Link) or 3 (Transport). In this paper, mechanisms for control the quality of audio and video are proposed. G.723.1 and MP...

  1. Smart Grid Control and Communication

    Ciontea, Catalin-Iosif; Pedersen, Rasmus; Kristensen, Thomas le Fevre;

    2015-01-01

    reliability due to the stochastic behavior found in such networks. Therefore, key concepts are presented in this paper targeting the support of proper smart grid control in these network environments and its Real-Time Hardware-In-the Loop (HIL) verification. An overview on the required Information and...

  2. [Access to birth control: a world estimate].

    Blanco, C

    1988-04-01

    The populations of the developed countries have easy access to contraception, but adequate family planning services are lacking in 80 of 93 recently studied Third World countries. 58% of the population of the developing world lives in these 80 countries. 43% or 372 million of the world's reproductive aged couples use modern and safe contraception. Of these, 102 million live in industrialized countries, about 146 million in the People's Republic of China, and 124 million in other developing countries. Only 27% of couples in developing countries apart from China use modern contraception. Abortion continues to be the most used method of fertility control. About 33 million legal abortions and 27 million illegal abortions are performed annually. Some 250 million women in developing countries who do not desire pregnancy are without family planning information or services. 1 year of protection costs about US $20 per couple in a developing country. Governments of developed countries spend about US $1.5 billion on family planning programs, of which about $500 million is slated for external aid to population programs. An additional investment of $5 billion is needed to provide family planning services to the 250 million women needing them. The 15 most populated industrialized countries which account for 91% of the population of the developed world mostly have good or excellent access to family planning services and information, although some comparatively minor problems may persist. Access to contraception in the countries of Eastern Europe is considered only good because of governmental restrictions on sterilization. Access is hampered in Japan by unavailability of some types of IUDs and pills and severe restrictions on sterilization. Family planning services are only average in the USSR because of poor quality and irregular supplies of modern contraceptives, especially in rural areas. Abortion, although not always easy to arrange because of bureaucratic delays, remains the

  3. Communication for Inquiry and Access: Teaching Techniques from Discourse Research

    Staats, Susan; Duranczyk, Irene; Moore, Randy; Hatch, Jay; Jensen, Murray; Somdahl, Charles

    2006-01-01

    Adopting inquiry-based science and mathematics pedagogies changes traditional classroom communication patterns. Linguistic research in science and mathematics classrooms has identified communication techniques that help teachers manage classroom discussions to increase student interaction and a sense of student responsibility for learning. These…

  4. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  5. Break-glass handling exceptional situations in access control

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  6. Delegation in Role Based Access Control Model for Workflow Systems

    Prasanna H Bammigatti

    2008-03-01

    Full Text Available Role -based access control (RBAC has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy then access rights are inherited upwards through the hierarchy. In organization workflow the main threat is of access control. The Role based access control is one of the best suitable access control model one can think of. It is not only the role hierarchies but also other control factors that affect the access control in the workflow. The paper discusses the control factors and role hierarchies in workflow and brings a new model of RBAC. This paper also over comes the conflicts and proves that the system is safe by applying the new model to the workflow

  7. The Interface communicate to DC motor control

    Retuerta Cornet, Iu

    2010-01-01

    Mälardalens University makes internationally recognized research in the field of Robotics. This technological work shows an electrical engine control developed at Mälardalens University. The target of this project is to make an interface able to communicate with a platform/robot to move the platform/robot using an electric engine control in ADA language. There are different kinds of electric engines, AC, DC, stepper motor, etc. This control focuses on DC electric motors beca...

  8. Context-Based E-Health System Access Control Mechanism

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  9. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.;

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  10. Attributes Enhanced Role-Based Access Control Model

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com- plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an...... important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  11. Code-expanded radio access protocol for machine-to-machine communications

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir;

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated by...... access subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems....

  12. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  13. Ultra Wide Wavelength Division Multiplexing Optical Code Division Multiple Access Communication Systems in Wide Area Optical Communication Networks

    Ahmed Nabih Zaki Rashed

    2013-01-01

    Full Text Available The effect of dispersion of fiber on the performance of OCDMA systemand to find the limitations imposed by dispersion on number of user and length of transmission. It has been observed that in the bit error rate performance curve the error is decreased when the number of subscriber is increased side by side the optical power is reduced when the users is added. This paper has presented the ultra wide wavelength division multiplexing optical code division multiple access (OCDMA communication systems in wide area optical communication networks and the transmission efficiency to be evaluated in order to determine the impact ofmulti access interference.

  14. Future Computer, Communication, Control and Automation

    2011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume topics covered include wireless communications, advances in wireless video, wireless sensors networking, security in wireless networks, network measurement and management, hybrid and discrete-event systems, internet analytics and automation, robotic system and applications, reconfigurable automation systems, machine vision in automation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  15. COMPASS CONTROL, DATA ACQUISITION, AND COMMUNICATION SYSTEM

    Hron, Martin; Písačka, Jan; Fernandes, H.; Sousa, J.; Neto, A.

    Inuyama, 2007. [IAEA Technical Meeting on Control , Data Acquisition, and Remote Participation for Fusion Research/6th./. 4.6.2007-8.6.2007, Inuyama] Institutional research plan: CEZ:AV0Z20430508 Keywords : tokamak * communication system * data acquisition Subject RIV: JC - Computer Hardware ; Software http://tm2007.nifs.ac.jp/

  16. 76 FR 21741 - Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town...

    2011-04-18

    ... COMMISSION Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town... Programming Accessibility Act (the Act or CVAA) hosted by the California State University at Northridge (CSUN... and video programming changes required by the Act. DATES: The Town Hall meeting was held on...

  17. Random Access for Machine-Type Communication based on Bloom Filtering

    Pratas, Nuno; Stefanovic, Cedomir; Madueño, Germán Corrales;

    2016-01-01

    We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a signature during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity and...

  18. A Group-oriented Access Control Scheme for P2P Networks

    Wang Xiaoming; Cheng Fan

    2011-01-01

    A group-oriented access control scheme is proposed for P2P (peer to peer) networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can...

  19. Adaptive quality control for multimedia communications

    Santichai Chuaywong

    2008-01-01

    Full Text Available Multimedia communications are communications with several types of media, such as audio, video and data. The current Internet has some levels of capability to support multimedia communications, unfortunately, the QoS (Quality of Service is still challenging. A large number of QoS mechanisms has been proposed; however, the main concern is for low levels, e.g. layer 2 (Data Link or 3 (Transport. In this paper, mechanisms for control the quality of audio and video are proposed. G.723.1 and MPEG-4 are used as the audio and video codec respectively. The proposed algorithm for adaptive quality control of audio communication is based on forward error correction (FEC. In the case of video communication, the proposed algorithm adapts the value of key frame interval, which is an encoding parameter of MPEG-4. We evaluated our proposed algorithms by computer simulation. We have shown that, in most cases, the proposed scheme gained a higher throughput compared to other schemes.

  20. Access Control in Decentralised Publish/Subscribe Systems

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  1. Decentralized Control and Communication (Plenary talk)

    Bakule, Lubomír

    Villeneuve d'Ascq: IFAC, 2010, s. 1-11. ISBN 978-2-915913-26-2. [IFAC Symposium on Large Scale Systems: Theory and Applications /12/. Villeneuve d'Ascq (FR), 12.07.2010-14.07.2010] R&D Projects: GA AV ČR(CZ) IAA200750802 Institutional research plan: CEZ:AV0Z10750506 Keywords : decentralization * communication * large-scale systems * complex systems * networked control systems Subject RIV: BC - Control Systems Theory

  2. Verifying Resource Access Control on Mobile Interactive Devices

    Besson, Frédéric; Dufay, Guillaume; Jensen, Thomas; Pichardie, David

    2010-01-01

    A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operation...

  3. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with o...

  4. Open Access to Scholarly Research : An Emerging Success Story in Emancipatory Communication

    Morrison, Heather

    2007-01-01

    Open access is defined, and explored in the context of enclosure and emancipatory communication. One attempt at enclosure, in the form of heavy lobbying by very wealthy companies in the publishing industry against research funders' open access mandates, has been exposed. A PR message is traced from the recommendations of PR pitbull Eric Dezenhall to a failed anti-OA coalition attempt called PRISM to the White House. In spite of this intense lobbying, open access is succeeding. Resources are ...

  5. Simplified Optics and Controls for Laser Communications

    Chen, Chien-Chung; Hemmati, Hamid

    2006-01-01

    A document discusses an architecture of a spaceborne laser communication system that provides for a simplified control subsystem that stabilizes the line of sight in a desired direction. Heretofore, a typical design for a spaceborne laser communication system has called for a high-bandwidth control loop, a steering mirror and associated optics, and a fast steering-mirror actuator to stabilize the line of sight in the presence of vibrations. In the present architecture, the need for this fast steering-mirror subsystem is eliminated by mounting the laser-communication optics on a disturbance-free platform (DFP) that suppresses coupling of vibrations to the optics by 60 dB. Taking advantage of microgravitation, in the DFP, the optical assembly is free-flying relative to the rest of the spacecraft, and a low-spring-constant pointing control subsystem exerts small forces to regulate the position and orientation of the optics via voice coils. All steering is effected via the DFP, which can be controlled in all six degrees of freedom relative to the spacecraft. A second control loop, closed around a position sensor and the spacecraft attitude-control system, moves the spacecraft as needed to prevent mechanical contact with the optical assembly.

  6. Communicating the Open Access Message: A Case Study from Ireland

    Lawton, Aoife

    2016-01-01

    Since 2009, Open Access (OA) Week has been celebrated worldwide in October each year. It is an opportunity for librarians to engage with the research community and demonstrate the value that they bring to their organisations in the area of disseminating scholarly output. Although thousands of events have been held since the inception of OA Week, a…

  7. How Public Is the Web?: Robots, Access, and Scholarly Communication.

    Snyder, Herbert; Rosenbaum, Howard

    1998-01-01

    Examines the use of Robot Exclusion Protocol (REP) to restrict the access of search engine robots to 10 major United States university Web sites. An analysis of Web site searching and interviews with Web server administrators shows that the decision to use this procedure is largely technical and is typically made by the Web server administrator.…

  8. High speed serial communications for control systems

    The Superconducting Super Collider Laboratory is a complex of accelerators being built in Ellis County, Texas. The SSCL control system consists of front-end processors and their associated control points remotely distributed from the Central and Regional control rooms. Control messages passing between these locations require timely (deterministic) distribution. A prototype network consisting of point-to-point links utilizing commercial T1 (1.544 Mb/s) communication boards has been implemented. These dedicated communication links will replace networking services traditionally provided for by shared medium networks like Ethernet(IEEE 802.3) and FDDI(IEEE 802.5). A seamless migration will be achieved by using packet encapsulation based on PPP(Point-to-Point Protocol, RFC 1171). All other networking functions including routing and reliable delivery are still being handled by the usual internet services. A distributed control system that currently uses Ethernet for communication is being re-implemented using these point-to-point links. The authors report on throughput measurements, timing constraints and ease of transition of a point-to-point network

  9. Science and society: the communications revolution and cancer control.

    Viswanath, K

    2005-10-01

    Advances in communications technology, particularly with regards to computer-based media, have opened up exciting possibilities to intervene and influence the trajectory of cancer control, from disease prevention to survivorship, and to reduce the cancer burden. The resulting explosion in cancer information in the mass media and on the Internet, however, also offers challenges in terms of equality in access to information and the ability to act on it, as well as in making sure that it is accurate, readily available and easy to use. PMID:16195753

  10. Recursive estimation algorithms for power controls of wireless communication networks

    Gang George YIN; Chin-An TAN; Le Yi WANG; Chengzhong XU

    2008-01-01

    Power control problems for wireless communication networks are investigated in direct-sequence codedivision multiple-access(DS/CDMA)channels.It is shown that the underlying problem can be formulated as a constrained optimization problem in a stochastic framework.For effective solutions to this optimization problem in real time,recursive algorithms of stochastic approximation type are developed that can solve the problem with unknown system components.Under broad conditions,convergence of the algorithms is established by using weak convergence methods.

  11. Accessing quantum secrets via local operations and classical communication

    Gheorghiu, Vlad; Sanders, Barry C.

    2013-01-01

    Quantum secret-sharing and quantum error-correction schemes rely on multipartite decoding protocols, yet the non-local operations involved are challenging and sometimes infeasible. Here we construct a quantum secret-sharing protocol with a reduced number of quantum communication channels between the players. Our scheme is based on embedding a classical linear code into a quantum error-correcting code. Our work paves the way towards the more general problem of simplifying the decoding of quant...

  12. A Formal Model of Access Control for Mobile Interactive Devices

    Besson, Frédéric; Dufay, Guillaume; Jensen, Thomas

    2006-01-01

    This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Javaenabled mobile telephones. We consider access control permissions with multiplicities in order to allow to use a permission a certain number of times. An operational semantics of the model and a formal definition of what it means for...

  13. ACADA: Access Control-driven Architecture with Dynamic Adaptation

    Pereira, Óscar Narciso Mortágua; Rui L. Aguiar; Santos, Maribel Yasmina

    2012-01-01

    Programmers of relational database applications use software solutions (Hibernate, JDBC, LINQ, ADO.NET) to ease the development process of business tiers. These software solutions were not devised to address access control policies, much less for evolving access control policies, in spite of their unavoidable relevance. Currently, access control policies, whenever implemented, are enforced by independent components leading to a separation between policies and their enf...

  14. Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access

    Pawelczak, P.; Pollin, S.; So, H.-S.W.; Bahai, A.R.S.; Prasad, R.V.; Hekmat, R.

    2009-01-01

    In this paper, different control channel (CC) implementations for multichannel medium access control (MAC) algorithms are compared and analyzed in the context of opportunistic spectrum access (OSA) as a function of spectrum-sensing performance and licensed user activity. The analysis is based on a d

  15. CONTEXT BASED ACCESS CONTROL MODEL FOR PROTECTING PERVASIVE ENVIRONMENT

    V. Nirmalrani

    2014-04-01

    Full Text Available -In Pervasive Computing, access control is a critical issue which gives many opportunities for users to access and share the resources anytime and anywhere in a more easiest way. Pervasive Computing Environments are heterogeneous and dynamic sensor-rich environments characterized by frequent and unpredictable changes on users, resources, and environment situations. These environments call the access control solutions that allow dynamic adjustments of access permissions based on information describing the conditions of these entities (context, such as location and time. Some existing models attempt to identify context information which is used as an optional attribute for limiting the scope of access control permissions. However, these approaches normally exploit identities and roles dynamically assigned to the users in order to grant access permissions, which is an inappropriate solution for open and dynamic environments. Those environments cannot assume the existence of predefined roles and user-role associations. Hence the access permissions are claimed and assigned to the users only based on context information, which characterizing the three most important entities of any access control framework: owners, requestors, and resources. Thus, this paper proposes a generalized context-based access control model for making access control decisions completely based on context information, offering seven types of context-based access control policies. The proposed model also takes into account the privacy requirements when enforcing access control policies, such as the support to purposes and obligations. In addition this paper proposes the integration of mechanism to detect / resolve dynamic and static conflict on context-based access control policies.

  16. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  17. Advances in Computer, Communication, Control and Automation

    011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume  topics covered include signal and Image processing, speech and audio Processing, video processing and analysis, artificial intelligence, computing and intelligent systems, machine learning, sensor and neural networks, knowledge discovery and data mining, fuzzy mathematics and Applications, knowledge-based systems, hybrid systems modeling and design, risk analysis and management, system modeling and simulation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  18. Open versus Controlled-Access Data | Office of Cancer Genomics

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  19. Optoelectronic Receiver For Communication And Control

    Kunath, Richard; Bendett, Mark; Mactaggart, I. Ross

    1994-01-01

    Many operational and diagnostic features integrated into circuit chip. GaAs-based integrated circuit designed to serve as optoelectronic interface in phased-array antenna. Intended function to receive digital control signals transmitted on optical fiber and to convert signals to electronic control signals, which then applied to monolithic microwave integrated circuit (MMIC). Also used in reception of high-rate optical digital communications within computers, between computers, and in signal-distribution systems in aircraft, automobiles, and ships. Interface circuit represents significant improvement over preexisting interface circuits in that its clock-signal-recovery subcircuit requires little or no preamble for immediate synchronization.

  20. Law-Aware Access Control and its Information Model

    Stieghahn, Michael

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  1. Integrated command, control, communications and computation system functional architecture

    Cooley, C. G.; Gilbert, L. E.

    1981-01-01

    The functional architecture for an integrated command, control, communications, and computation system applicable to the command and control portion of the NASA End-to-End Data. System is described including the downlink data processing and analysis functions required to support the uplink processes. The functional architecture is composed of four elements: (1) the functional hierarchy which provides the decomposition and allocation of the command and control functions to the system elements; (2) the key system features which summarize the major system capabilities; (3) the operational activity threads which illustrate the interrelationahip between the system elements; and (4) the interfaces which illustrate those elements that originate or generate data and those elements that use the data. The interfaces also provide a description of the data and the data utilization and access techniques.

  2. Distributed Role-based Access Control for Coaliagion Application

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  3. Dynamic User Role Assignment in Remote Access Control

    Saffarian, Mohsen; Tang, Qiang; Jonker, Willem; Hartel, Pieter

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  4. Analysis of Access Control Policies in Operating Systems

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  5. Research and teaching access to a large clinical picture archiving and communication system

    Harrison, Marc; Koh, Justin; Tran, Steven; Mongkolwat, Patanasak; Channin, David S.

    2001-01-01

    Purpose: To identify practical issues surrounding delivering digital images from picture archiving and communication systems (PACS) for research and teaching purposes. The complexity of Digital Imaging and Communications in Medicine (DICOM) access methods, security, patient confidentiality, PACS database integrity, portability, and scalability are discussed. A software prototype designed to resolve these issues is described.System Architecture: A six-component, three-tier, client server softw...

  6. Control and estimation methods over communication networks

    Mahmoud, Magdi S

    2014-01-01

    This book provides a rigorous framework in which to study problems in the analysis, stability and design of networked control systems. Four dominant sources of difficulty are considered: packet dropouts, communication bandwidth constraints, parametric uncertainty, and time delays. Past methods and results are reviewed from a contemporary perspective, present trends are examined, and future possibilities proposed. Emphasis is placed on robust and reliable design methods. New control strategies for improving the efficiency of sensor data processing and reducing associated time delay are presented. The coverage provided features: ·        an overall assessment of recent and current fault-tolerant control algorithms; ·        treatment of several issues arising at the junction of control and communications; ·        key concepts followed by their proofs and efficient computational methods for their implementation; and ·        simulation examples (including TrueTime simulations) to...

  7. Analysis and Comparison of Access Control Policies Validation Mechanisms

    Muhammad Aqib

    2014-12-01

    Full Text Available Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by the researchers. However, comprehensive analysis and evaluation of the existing access control policy validation techniques is missing in the literature. In this paper, we have provided a first detailed survey of this domain and presented the taxonomy of the access control policy validation mechanisms. Furthermore, we have provided a qualitative comparison and trend analysis of the existing schemes. From this survey, we found that only few validation mechanisms exist that can handle both inconsistency and incompleteness problem. Also, most of the policy validation techniques are inefficient in handling continuous values and Boolean expressions.

  8. A Model of Workflow-oriented Attributed Based Access Control

    Guoping Zhang

    2011-02-01

    Full Text Available the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC, and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  9. Media Access Control for Wireless Sensor and Actuator Networks

    Nabi, Muaz Un

    2012-01-01

    In a wireless network, the medium is a shared resource. The nodes in the network negotiate access of the shared resource using the Medium Access Control (MAC) protocol. The design of a MAC protocol for a sensor node is not the same as that for a wireless transceiver. Due to the transceiver characteristics, the MAC protocol design is limited in terms of medium access methods. However, in most cases, the protocols rely on simple access methods i.e. Time Division Multiple Access (TDMA) or Carrie...

  10. Communication Timing Control with Interference Detection for Wireless Sensor Networks

    Kokuke Sekiyama; Yuki Kubo

    2006-01-01

    This paper deals with a novel communication timing control for wireless networks and radio interference problem. Communication timing control is based on the mutual synchronization of coupled phase oscillatory dynamics with a stochastic adaptation, according to the history of collision frequency in communication nodes. Through local and fully distributed interactions in the communication network, the coupled phase dynamics self-organizes collision-free communication. In wireless communicatio...

  11. Efficient Controlled Quantum Secure Direct Communication Protocols

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  12. Communications and control for electric power systems

    Kirkham, H.; Goettsche, A.; Niebur, D.; Friend, H.; Johnston, A.

    1991-01-01

    The first section of the report describes the AbNET system, a hardware and software communications system designed for distribution automation (it can also find application in substation monitoring and control). The topology of the power system fixes the topology of the communications network, which can therefore be expected to include a larger number of branch points, tap points, and interconnections. These features make this communications network unlike any other. The network operating software has to solve the problem of communicating to all the nodes of a very complex network in as reliable a way as possible even if the network is damaged, and it has to do so with minimum transmission delays and at minimum cost. The design of the operating protocols is described within the framework of the seven-layer Open System Interconnection hierarchy of the International Standards Organization. Section 2 of the report describes the development and testing of a high voltage sensor based on an electro-optic polymer. The theory of operation is reviewed. Bulk fabrication of the polymer is discussed, as well as results of testing of the electro-optic coefficient of the material. Fabrication of a complete prototype sensor suitable for use in the range 1-20 kV is described. The electro-optic polymer is shown to be an important material for fiber optic sensing applications. Appendix A is theoretical support for this work. The third section of the report presents the application of an artificial neural network, Kohonen's self-organizing feature map, for the classification of power system states. This classifier maps vectors of an N-dimensional space to a 2-dimensional neural net in a nonlinear way preserving the topological order of the input vectors. These mappings are studied using a nonlinear power system model.

  13. Virus spreading in wireless sensor networks with a medium access control mechanism

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  14. Studying the Feasibility and Importance of Optical Access Network Strategies in the Information and Communication Environment

    Dr.S.S.Riaz Ahamed

    2010-05-01

    Full Text Available The access network has consistently been regarded as a bottleneck in the provisioning of data communication services. This is primarily because the bandwidth available has lagged behind that provided within local-area networks (LANs and in the upper echelons of the network (in metropolitan and core networks, for example, where concentration factors and economies of scale have allowed optical fiber to unleash significant bandwidth capacity. The optical access network is that part of the access network implemented using optical fiber. Optical access offers the promise of greatly increased access-network bandwidth by up to several gigabits per second (Gbps—and most likely more, as technology advances. This bandwidth availability opens up new architectural possibilities for the provisioning of high-bandwidth services.

  15. Controlled trial of an open-access physiotherapy service

    Gentle, P. H.; Herlihy, P. J.; Roxburgh, I. O.

    1984-01-01

    A randomized controlled trial of outpatient open-access physiotherapy was carried out at West Cornwall Hospital during 1979/80. The referral rate to consultant outpatient clinics for those patients offered open-access physiotherapy was considerably lower than for the control group (17 per cent and 56 per cent respectively). Patients using the service received physiotherapy promptly although this did not result in shorter treatments. Those of the control group who eventually received physiothe...

  16. Capability-based Access Control Delegation Model on the Federated IoT Network

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.;

    2012-01-01

    no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...... the identity-based capability-based access control approach as well as contextual information and secure federated IoT, this proposed model provides scalability and flexibility as well as secure authority delegation for highly distributed system....

  17. Videophone Technology and Students with Deaf-Blindness: A Method for Increasing Access and Communication

    Emerson, Judith; Bishop, John

    2012-01-01

    Introduction: Seeing the Possibilities with Videophone Technology began as research project funded by the National Center for Technology Innovation. The project implemented a face-to-face social networking program for students with deaf-blindness to investigate the potential for increasing access and communication using videophone technology.…

  18. Institutional Repositories, Open Access, and Scholarly Communication: A Study of Conflicting Paradigms

    Cullen, Rowena; Chawner, Brenda

    2011-01-01

    The Open Access movement of the past decade, and institutional repositories developed by universities and academic libraries as a part of that movement, have openly challenged the traditional scholarly communication system. This article examines the growth of repositories around the world, and summarizes a growing body of evidence of the response…

  19. An Ecological Perspective on U.S. Latinos' Health Communication Behaviors, Access, and Outcomes

    Katz, Vikki S.; Ang, Alfonso; Suro, Roberto

    2012-01-01

    U.S. Latinos experience constrained access to formal health care resources, contributing to higher incidence of preventable diseases and chronic health conditions than the general population. The authors explore whether a rich set of informal health communication connections--to friends, family, radio, television, Internet, newspapers, magazines,…

  20. A new access control system by fingerprint for radioisotope facilities

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  1. An Extended Role Based Access Control Method for XML Documents

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  2. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    Pang, Xiaodan

    broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility of...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links...

  3. Role Based Access Control system in the ATLAS experiment

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  4. Role Based Access Control system in the ATLAS experiment

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  5. Geospacial information utilized under the access control strategy

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  6. Modeling Access Control Policy of a Social Network

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  7. Access Control of Web- and Java-Based Applications

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  8. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  9. Mining Attribute-Based Access Control Policies from Logs

    Xu, Zhongyuan; Stoller, Scott,

    2014-01-01

    Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the ...

  10. A United Access Control Model for Systems in Collaborative Commerce

    Ruo-Fei Han; Hou-Xiang Wang; Qian Xiao; Xiao-Pei Jing; Hui Li

    2009-01-01

    The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management...

  11. Reinforcement Learning Technique in Multiple Motorway Access Control Strategy Design

    Veljanovska, Kostandina; M. Bombol, Kristi; Maher, Tomaž

    2010-01-01

    An appropriately designed motorway access control can decrease the total travel time spent in the system up to 30% and consequently increase the merging operations safety. To date, implemented traffic responsive motorway access control systems have been of local or regulatory type and not truly adaptive in the real sense of the meaning. Hence, traffic flow can be influenced positively by numerous intelligent transportation system (ITS) techniques. In this paper a contemporary approach is pres...

  12. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  13. Promotion of access to essential medicines for non-communicable diseases: practical implications of the UN political declaration.

    Hogerzeil, Hans V; Liberman, Jonathan; Wirtz, Veronika J; Kishore, Sandeep P; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N; von Schoen-Angerer, Tido

    2013-02-23

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and vaccines for such diseases. 30 years of experience with policies for essential medicines and 10 years of scaling up of HIV treatment have provided the knowledge needed to address barriers to long-term effective treatment and prevention of NCDs. More medicines can be acquired within existing budgets with efficient selection, procurement, and use of generic medicines. Furthermore, low-income and middle-income countries need to increase mobilisation of domestic resources to cater for the many patients with NCDs who do not have access to treatment. Existing initiatives for HIV treatment offer useful lessons that can enhance access to pharmaceutical management of NCDs and improve adherence to long-term treatment of chronic illness; policy makers should also address unacceptable inequities in access to controlled opioid analgesics. In addition to off-patent medicines, governments can promote access to new and future on-patent medicinal products through coherent and equitable health and trade policies, particularly those for intellectual property. Frequent conflicts of interest need to be identified and managed, and indicators and targets for access to NCD medicines should be used to monitor progress. Only with these approaches can a difference be made to the lives of hundreds of millions of current and future patients with NCDs. PMID:23410612

  14. Dynamically Authorized Role-Based Access Control for Grid Applications

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  15. Access Control in Cloud Computing Environment

    Soorat Hussain

    2014-01-01

    Full Text Available Cloud Computing is a new technology which is directly connected with the internet which provide on demand self service internet infrastructure where a customer can pay and use only what is needed. Cloud Computing all services are managed by third party cloud service provider. Nowadays majority using static password to login into the system or access the online accounts in cloud but never change the password which is not secure . Since Cloud computing is a quite new subject, most of the cloud providers have not yet tighten up their security and still use insecure or complicated login method. Static password thoroughly investigated and found out that it is not completing the cloud computing security requirement. Proposed solution is One Time Password and One Day Password, OTP will get expire after two minutes, if user again login will request and receive new password via email and ODP will get expire after 24 hours and on request receive new password via email for new login session. OTP/ODP used with AES encryption. This paper focuses the authentication and transmission encryption in cloud computing services.

  16. Hopping control channel MAC protocol for opportunistic spectrum access networks

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  17. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being...

  18. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    Silvana Rossy de Brito

    Full Text Available This study fills demand for data on access and use of information and communication technologies (ICT in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i with computers and Internet access, (ii with mobile phones, and (iii with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources.

  19. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources. PMID:27035577

  20. Low-sampling-rate M-ary multiple access UWB communications in multipath channels

    Alkhodary, Mohammad T.

    2015-08-31

    The desirable characteristics of ultra-wideband (UWB) technology are challenged by formidable sampling frequency, performance degradation in the presence of multi-user interference, and complexity of the receiver due to the channel estimation process. In this paper, a low-rate-sampling technique is used to implement M-ary multiple access UWB communications, in both the detection and channel estimation stages. A novel approach is used for multiple-access-interference (MAI) cancelation for the purpose of channel estimation. Results show reasonable performance of the proposed receiver for different number of users operating many times below Nyquist rate.

  1. Distributing Digital Imaging and Communications in Medicine data and optimizing access over satellite networks

    Ernst, Randy D.; Kawashima, Akira; Shepherd, William(Santa Cruz Institute for Particle Physics and Department of Physics, Santa Cruz, CA, 95064, U.S.A); Tamm, Eric P.; Sandler, Carl M.

    1999-01-01

    To improve radiology access to full uncompressed Digital Imaging and Communications in Medicine (DICOM) data sets, we evaluated satellite access to a DICOM server. Radiologists′ home computers were connected by satellite to a medweb DICOM server (Medweb, San Francisco, CA). A 10.2-kb data set containing a 19-image head computed tomography (CT) scan was transferred using DirecPC (Hughes Electronics Corp, Arlington, VA) at three different times of the day; 6 AM, 3 PM, and 8 PM. The average tran...

  2. A United Access Control Model for Systems in Collaborative Commerce

    Ruo-Fei Han

    2009-06-01

    Full Text Available The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management of internal functions is of the same importance as external service management. It is very troublesome to control authorizations merely with attributes and composition of policies introduced from attribute-based access control (ABAC. So, we introduce a united access control model for systems in collaborative commerce, combining the advantages of conventional role-based access control (RBAC, task-based authentication control (TBAC and that of recent ABAC and automated trust negotiation (ATN. Innovational ideas in the model are analyzed, and the implement architecture is discussed. The paper concludes with a summary of the united model’s benefits and future work.

  3. Retaking Responsibility for How We Communicate. A Review of Open Access and the Humanities: Contexts, Controversies and the Future

    James Baker

    2015-06-01

    Full Text Available Since the publication of the Budapest Open Access Initiative statement in 2002, Open Access has grown from an ideal to a reality. Open Access and the Humanities explores scholarly practices, communications, and cultures in light of this change and argues that humanists can and should retake responsibility for how they chose to publish.

  4. Face recognition in controlled access points

    Mur Escartín, Olga

    2009-01-01

    The thesis consist in the study and evaluation of different methods for face recognition. The final objective is to select the most suitable techniques for face detection and recognition. Some of these techniques will be intergrated in a real time demontrator which will be a preliminary prototype that will have to work in controlled conditions (for ilumination and pose) and with reduced databases. The demonstrator will be done in Matlab and the main image acquisition rotines and face detectio...

  5. Distributed Frequency Control in Power Grids Under Limited Communication

    Parandehgheibi, Marzieh; Turitsyn, Konstantin; Modiano, Eytan

    2016-01-01

    In this paper, we analyze the impact of communication failures on the performance of optimal distributed frequency control. We consider a consensus-based control scheme, and show that it does not converge to the optimal solution when the communication network is disconnected. We propose a new control scheme that uses the dynamics of power grid to replicate the information not received from the communication network, and prove that it achieves the optimal solution under any single communicatio...

  6. AUV Control and Communication using Underwater Acoustic Networks

    Marques, Eduardo R.B.; Pinto, Marques; Kragelund, Sean; Dias, Paulo S.; Madureira, Luis; Sousa, Alexandre; Correia, Marcio; Ferreira, Hugo; Goncalves, Rui; Martins, Richardo; Horner, Douglas P.; Healey, Anthony J.; Goncalves, Gil M.; Sousa, Joao B.

    2007-01-01

    Underwater acoustic networks can be quite effective to establish communication links between autonomous underwater vehicles (AUVs) and other vehicles or control units, enabling complex vehicle applications and control scenarios. A communications and control framework to support the use of underwater acoustic networks and sample application scenarios are described for single and multi-AUV operation.

  7. Role Based Access Control system in the ATLAS experiment

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  8. Role Based Access Control System in the ATLAS Experiment

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  9. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  10. Based on asynchronous communication protocol of geographic space information service access mechanism research

    G. Chen; Zhao, J.; Gu, M; Li, D.

    2014-01-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text m...

  11. Access to communication technologies in a sample of cancer patients: an urban and rural survey

    Perkins Anthony

    2005-02-01

    Full Text Available Abstract Background There is a growing awareness among providers of the symptom burden experienced by cancer patients. Systematic symptom screening is difficult. Our plan was to evaluate a technology-based symptom screening process using touch-tone telephone and Internet in our rural outreach cancer program in Indiana. Would rural patients have adequate access to technologies for home-based symptom reporting? Objectives 1 To determine access to touch-tone telephone service and Internet for patients in urban and rural clinics; 2 to determine barriers to access; 3 to determine willingness to use technology for home-based symptom reporting. Methods Patients from representative clinics (seven rural and three urban in our network were surveyed. Inclusion criteria were age greater than 18, able to read, and diagnosis of malignancy. Results The response rate was 97%. Of 416 patients completing the survey (230 rural, 186 urban, 95% had access to touch-tone telephone service, while 46% had Internet access (56% of urban patients, 38% of rural patients. Higher rates of Internet access were related to younger patient age, current employment, and higher education and income. The primary barrier to Internet access was lack of interest. Use of the Internet for health related activities was less than 50%. The preferred means of symptom reporting in patients with internet access were the touch-tone telephone (70%, compared to reporting by the Internet (28%. Conclusion Access to communication technologies appears adequate for home-based symptom reporting. The use of touch-tone telephone and Internet reporting, based upon patient preference, has the potential of enhancing symptom detection among cancer patients that is not dependent solely upon clinic visits and clinician inquiry.

  12. Polarization division multiple access with polarization modulation for LOS wireless communications

    Cao Bin

    2011-01-01

    Full Text Available Abstract In this paper, we discuss a potential multiple access and modulation scheme based on polarized states (PS of electromagnetic (EM waves for line-of-sight (LOS communications. The proposed scheme is theoretic different from the existing polar modulation for EDGE and WCDMA systems. We propose the detailed bit representation (modulation and multiple access scheme using PS. Because of the inflexibility of polarization information in the time and frequency domains, as well as independence of frequency and space, the polarization information can be used independently for wireless communications, i.e., another independent resource domain that can be utilized. Due to the independence between the PS and the specific features of signals (such as waveform, bandwidth and data rate, the discussed polarization division multiple access (PDMA and polarization modulation (PM are expected to improve the spectrum utilization effectively. It is proved that the polarization filtering technique can be adopted in the PDMA-PM wireless communications to separate the multiuser signals and demodulate the bit information representing by PS for desired user. Some theoretical analysis is done to demonstrate the feasibility of the proposed scheme, and the simulation results are made to evaluate the performance of the suggested system.

  13. Efficient medium access control protocol for geostationary satellite systems

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  14. Public information: control, secret and right of access

    Carmem Lúcia Batista

    2012-01-01

    Recently, in November 2011, it was published the law on access to public information, legal and historic mark in the struggle for human rights in Brazil. This achievement is the result of a process marked by denial of access to public archives, as it was the case of the Araguaia Guerrilla, valuing the culture of secrecy, abuse of power and relations between public and private in Brazil. Thus, the aim of this paper is to present a brief history about the control of access to public information...

  15. Law-Aware Access Control and its Information Model

    Stieghahn, Michael; Engel, Thomas

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for exa...

  16. Open Platform Strategies and Innovation: Granting Access vs. Devolving Control

    Kevin Boudreau

    2010-01-01

    This paper studies two fundamentally distinct approaches to opening a technology platform and their different impacts on innovation. One approach is to grant access to a platform and thereby open up markets for complementary components around the platform. Another approach is to give up control over the platform itself. Using data on 21 handheld computing systems (1990-2004), I find that granting greater levels of access to independent hardware developer firms produces up to a fivefold accele...

  17. Reliable Radio Access for Massive Machine-to-Machine (M2M) Communication

    Madueño, Germán Corrales

    Machine-to-Machine (M2M) communication is a term that identifies the emerging paradigm of interconnected systems, machines, and things that communicate and collaborate without human intervention. The characteristics of M2M Communications are small payloads and sporadic transmissions, while the...... service requirements can range from massive number of devices to ultra-reliable. This PhD thesis focuses on novel mechanisms to meet these requirements in a variety of wireless systems, from well-established technologies such as cellular networks, to emerging technologies like IEEE 802.11ah. Today an...... preferable solution for M2M, no mechanisms are in place to guarantee reliable M2M access. Contrary to mainstream solutions that focus on preventing overload, we introduce mechanisms to provide reliable M2M service. We also investigate what cellular networks can do about upcoming smart metering traffic...

  18. A Group-oriented Access Control Scheme for P2P Networks

    Wang Xiaoming

    2011-02-01

    Full Text Available A group-oriented access control scheme is proposed for P2P (peer to peer networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can realize authentication and secure communication, but also can easily and efficiently add new group members and revoke malicious group members. Therefore, it is more efficient, and more practical protocol for P2P networks.

  19. Enhanced communication support between control room and field operation : Human communication and interaction

    Berg, Håkon Nergaard

    2007-01-01

    Communication between the field operator and the control room operator is vital for successful operation in the process industry. By reviewing models for human cognition and interpersonal communication and collaboration together with appropriate ~technology, concepts for enhancing the field operator/control room operator communication are developed. These concepts constitutes the basis for design and implementation of a working prototype. The prototype is utilizing a mobile device with wirele...

  20. Task-role-based Access Control Model in Smart Health-care System

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  1. Communication in command and control teams

    Schraagen, J.M.C.; Rasker, P.C.

    2001-01-01

    An important factor affecting team performance in Combat Information Centers is communication. Previous research has shown that high-performing teams use effective communication patterns, such as limiting idle chatter during high workload conditions, and sharing information before it is needed. Alth

  2. A LabVIEW-Based Remotely Controllable and Accesible Laboratory Platform for Communication Systems II Lecture Experiments

    Akar, Aynur; Yayla, Ayse; ERDER, Berkay

    2014-01-01

    In this study, a remotely accessible and controllable communication systems laboratory model is designed for the undergraduate Electronics and Communication Engineering Education. This laboratory model is designed by using LabVIEW program as real time and virtual for Communication Systems II lecture laboratory applications  that contain Convolutional Codes, Viterbi Decoding Algorithm Method, phase shift keying modulated / demodulated schemes and system performance experiments. ...

  3. Control and Communication Network in Hybrid Fuel Cell Vehicles

    朱元; 吴昊; 田光宇; 阳宪惠; 赵立安; 周伟波

    2004-01-01

    This paper describes the control and communication network in fuel cell vehicles, including both the protocol and the hardware.Based on the current protocol (ISO-11898 and SAE J1939), a new practical protocol is proposed and implemented for the control and communication network in fuel cell vehicles.To improve the reliability of data communication and to unify the network management, a new network system based on dual-port RAM is also implemented.

  4. Controlled Secure Quantum Communication Using Pure Entangled W Class States

    We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies

  5. A Service Access Security Control Model in Cyberspace

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  6. Access to Health Care and Control of ABCs of Diabetes

    Zhang, Xuanping; Bullard, Kai McKeever; Gregg, Edward W.; Beckles, Gloria L.; Williams, Desmond E.; Barker, Lawrence E; Albright, Ann L.; Imperatore, Giuseppina

    2012-01-01

    OBJECTIVE To examine the relationship between access to health care and diabetes control. RESEARCH DESIGN AND METHODS Using data from the National Health and Nutrition Examination Survey, 1999–2008, we identified 1,221 U.S. adults (age 18–64 years) with self-reported diabetes. Access was measured by current health insurance coverage, number of times health care was received over the past year, and routine place to go for health care. Diabetes control measures included the proportion of people...

  7. Future Communication, Computing, Control and Management Volume 1

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  8. Future Computing, Communication, Control and Management Volume 2

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  9. Future Communication, Computing, Control and Management Volume 2

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  10. Communication and control tools, systems, and new dimensions

    MacDougall, Robert; Cummings, Kevin

    2015-01-01

    Communication and Control: Tools, Systems, and New Dimensions advocates a systems view of human communication in a time of intelligent, learning machines. This edited collection sheds new light on things as mundane yet still profoundly consequential (and seemingly "low-tech") today as push buttons, pagers and telemarketing systems. Contributors also investigate aspects of "remote control" related to education, organizational design, artificial intelligence, cyberwarfa

  11. Optical label-controlled transparent metro-access network interface

    Osadchiy, Alexey Vladimirovich

    control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique for......This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges are...... arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  12. Controlling user access to electronic resources without password

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  13. Nanorack Compatible Standardized Data Processing, Communication, and Control Module Project

    National Aeronautics and Space Administration — This Phase I study will design and develop a NanoRacks Control Module (NCM) that provides communications, control functions and data processing in a NanoRacks...

  14. Analyzing Accuracy and Accessibility in Information and Communication Technology Ethical Scenario Context

    M. Masrom

    2011-01-01

    Full Text Available Problem statement: Recently, the development of Information and Communication Technology (ICT is indispensable to life. The utilization of ICT has provided advantages for people, organizations and society as a whole. Nevertheless, the widespread and rapid use of ICT in society has exacerbated existing ethical issues or dilemmas and also led to the emergence of new ethical issues such as unauthorized access, software piracy, internet pornography, privacy protection, information gap and many others. Approach: Therefore, the aim of this study is to discuss several issues of the ICT ethics. It will focusing on two major issues, that is, data accuracy and accessibility. Results: The results indicated that more than half percentage of respondents tend to be ethical in data accuracy scenario and also in accessibility scenario. Several computer ethics scenarios that relate to the data accuracy and accessibility are presented and the results of analysis are then discussed. Conclusion: Based on the results in this study, computer ethics issues such as data accuracy and accessibility should receive more attention in the ICT field.

  15. Researchers' perspectives on open access scholarly communication in Tanzanian public universities

    F.W. Dulle

    2009-04-01

    Full Text Available This research explored the awareness, usage and perspectives of Tanzanian researchers on open access as a mode of scholarly communication. A survey questionnaire targeted 544 respondents selected through stratified random sampling from a population of 1088 university researchers of the six public universities in Tanzania. With a response rate of 73%, the data were analysed using the Statistical Package for Social Sciences. The study reveals that the majority of the researchers were aware of and were positive towards open access. Findings further indicate that the majority of researchers in Tanzanian public universities used open access outlets more to access scholarly content than to disseminate their own research findings. It seems that most of these researchers would support open access publishing more if issues of recognition, quality and ownership were resolved. Thus many of them supported the idea of establishing institutional repositories at their respective universities as a way of improving the dissemination of local content. The study recommends that public universities and other research institutions in the country should consider establishing institutional repositories, with appropriate quality assurance measures, to improve the dissemination of research output emanating from these institutions.

  16. IEPLC Framework, Automated Communication in a Heterogeneous Control System Environment

    Locci, F

    2014-01-01

    In CERN accelerators control system several components are essential such as: Programmable Logic Controller (PLC), PCI Extensions for Instrumentation (PXI), and other micro-controller families. Together with their weaknesses and their strength points they typically present custom communication protocols and it is therefore difficult to federate them into the control system using a single communication strategy. Furthermore this dependency to the physical device interfaces and protocols makes most of the code not reusable and the replacement of old technology a difficult problem. The purpose of IEPLC ([1]) is to mitigate the communication issues given by this heterogeneity; it proposes a framework to define communication interfaces in a hardware independent manner. In addition it automatically generates all the resources needed on master side (typically represented by a FEC: Front-End Computer) and slave side (typically represented by the controller) to implement a common and generic Ethernet communication. Th...

  17. On the performance of shared access control strategy for femtocells

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  18. Regulatory Accessibility and Social Influences on State Self-Control

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  19. Review of Access Control Models for Cloud Computing

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  20. Fuzzy logic controller to improve powerline communication

    Tirrito, Salvatore

    2015-12-01

    The Power Line Communications (PLC) technology allows the use of the power grid in order to ensure the exchange of data information among devices. This work proposes an approach, based on Fuzzy Logic, that dynamically manages the amplitude of the signal, with which each node transmits, by processing the master-slave link quality measured and the master-slave distance. The main objective of this is to reduce both the impact of communication interferences induced and power consumption.

  1. Effective use of multibeam antenna and space-time multiple access technology in modern mobile communication systems

    Moskalets, N. V.

    2015-01-01

    A possibility for efficient use of radio-frequency spectrum and of corresponding increase in productivity of mobile communication system with space-time multiple access obtained by use of multibeam antenna of base station is considered.

  2. An Efficient Radio Access Control Mechanism for Wireless Network-On-Chip Architectures

    Maurizio Palesi

    2015-03-01

    Full Text Available Modern systems-on-chip (SoCs today contain hundreds of cores, and this number is predicted to reach the thousands by the year 2020. As the number of communicating elements increases, there is a need for an efficient, scalable and reliable communication infrastructure. As technology geometries shrink to the deep submicron regime, however, the communication delay and power consumption of global interconnections become the major bottleneck. The network-on-chip (NoC design paradigm, based on a modular packet-switched mechanism, can address many of the on-chip communication issues, such as the performance limitations of long interconnects and integration of large number of cores on a chip. Recently, new communication technologies based on the NoC concept have emerged with the aim of improving the scalability limitations of conventional NoC-based architectures. Among them, wireless NoCs (WiNoCs use the radio medium for reducing the performance and energy penalties of long-range and multi-hop communications. As the radio medium can be accessed by a single transmitter at a time, a radio access control mechanism (RACM is needed. In this paper, we present a novel RACM, which allows one to improve both the performance and energy figures of the WiNoC. Experiments, carried out on both synthetic and real traffic scenarios, have shown the effectiveness of the proposed RACM. On average, a 30% reduction in communication delay and a 25% energy savings have been observed when the proposed RACM is applied to a known WiNoC architecture.

  3. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  4. Access Control of Web and Java Based Applications

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  5. Research on a dynamic workflow access control model

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  6. Object oriented programming techniques applied to device access and control

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  7. Fine-Grained Access Control for Electronic Health Record Systems

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  8. Audit-Based Access Control for Electronic Health Records

    Dekker, M.A.C.; Etalle, S.; Gadducci, F.

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori acce

  9. Audit-Based Access Control for Electronic Health Records

    Dekker, M.A.C.; Etalle, S.

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori acc

  10. Secure Dynamic access control scheme of PHR in cloud computing.

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  11. Access control issues and solutions for large sites

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  12. Adaptive Medium Access Control Protocol for Wireless Body Area Networks

    Javaid, N.; Ahmad, A.; A. Rahim; Z.A. Khan; M. Ishfaq; Qasim, U.

    2014-01-01

    Wireless Body Area Networks (WBANs) are widely used for applications such as modern health-care systems, where wireless sensors (nodes) monitor the parameter(s) of interest. Nodes are provided with limited battery power and battery power is dependent on radio activity. MAC protocols play a key role in controlling the radio activity. Therefore, we present Adaptive Medium Access Control (A-MAC) protocol for WBANs supported by linear programming models for the minimization of energy consumption ...

  13. Access control and interlock system at the Advanced Photon Source

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D. [Argonne National Lab., IL (United States). Advanced Photon Source

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  14. Orthogonal frequency-division multiplexing access (OFDMA) based wireless visible light communication (VLC) system

    Sung, Jiun-Yu; Yeh, Chien-Hung; Chow, Chi-Wai; Lin, Wan-Feng; Liu, Yang

    2015-11-01

    An orthogonal frequency-division multiplexing access (OFDMA) based visible light communication (VLC) system is proposed in this paper. The architecture of the proposed system is divided into several VLC cells, which is defined in this paper. The deployment and upgrade of the system involve only simple combination of the VLC cells. Hence it is economically advantageous. To guarantee smooth communication, nearly equal data rate is provided at every location within the system with no concern on the system scale. The user location monitor strategy is also discussed to solve the region division issues. The characteristics of the proposed system are analyzed in detail in this paper. A one-dimensional experiment was demonstrated with 13.6 Mb/s data rate.

  15. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  16. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  17. The integration of open access journals in the scholarly communication system: Three science fields

    Faber Frandsen, Tove

    2009-01-01

    The greatest number of open access journals (OAJs) is found in the sciences and their influence is growing. However, there are only a few studies on the acceptance and thereby integration of these OAJs in the scholarly communication system. Even fewer studies provide insight into the differences...... across disciplines. This study is an analysis of the citing behaviour in journals within three science fields: biology, mathematics, and pharmacy and pharmacology. It is a statistical analysis of OAJs as well as non-OAJs including both the citing and cited side of the journal to journal citations...

  18. Ubiquitous access control and policy management in personal networks

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...... distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations....

  19. A User Profile Based Access Control Model and Architecture

    Meriem Zerkouk

    2013-02-01

    Full Text Available Personalization and adaptation to the user profile capability are the hottest issues to ensure ambientassisted living and context awareness in nowadays environments. With the growing healthcare andwellbeing context aware applications, modeling security policies becomes an important issue in thedesign of future access control models. This requires rich semantics using ontology modeling for themanagement of services provided to dependant people. However, current access control models remainunsuitable due to lack of personalization, adaptability and smartness to the handicap situation.In this paper, we propose a novel adaptable access control model and its related architecture in whichthe security policy is based on the handicap situation analyzed from the monitoring of user’s behavior inorder to grant a service using any assistive device within intelligent environment. The design of ourmodel is an ontology-learning and evolving security policy for predicting the future actions of dependentpeople. This is reached by reasoning about historical data, contextual data and user behavior accordingto the access rules that are used in the inference engine to provide the right service according to theuser’s needs.

  20. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    Fafoutis, Xenofon

    Control (MAC) protocols that are following the receiver-initiated paradigm of asynchronous communication. According to the receiver-initiated paradigm the communication is initiated by the receiver that states its availability to receive data through beacons. The sender is passively listening...... to the channel until it receives the beacon of interest. In this context, the dissertation begins with an in-depth survey of all the receiverinitiated MAC protocols and presents their unique optimization features, which deal with several challenges of the link layer such as mitigation of the energy consumption......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  1. Controlled and secure direct communication using GHZ state and teleportation

    A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), alice encodes the secret message directly on a sequence of particle states in the GHZ state and transmits them to Bob, supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if a perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of a third side. (orig.)

  2. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC

    Jungho Kang

    2015-06-01

    Full Text Available At the center of core technologies for a future cyber world, such as Internet of Things (IoT or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC-based electronic payments. Near-field Communication (NFC integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.

  3. A formal model for access control with supporting spatial context

    ZHANG Hong; HE YePing; SHI ZhiGuo

    2007-01-01

    There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented,and the role is assigned a logical location domain to specify the spatial boundary.Roles are activated based on the current physical position of the user which obtained from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, constrained SC-RBAC allows express various spatial separations of duty constraints,location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 invariants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.

  4. Layer-component-based communication stack framework for wireless residential control systems

    Torbensen, Rune Sonnich; Hjorth, Theis

    2010-01-01

    nodes such as bridges, controllers, sensor/actuators - as well as secure communication between them. A special messaging system facilitates inter-component communication, and a Virtual Port Service protocol enables resource addressing. The end-devices in the heterogeneous network are made accessible on...... a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It...

  5. Layer-component-based communication stack framework for wireless residential control systems

    Torbensen, R.; Hjorth, Theis S.

    2011-01-01

    nodes such as bridges, controllers, sensor/actuators – as well as secure communication between them. A special messaging system facilitates inter-component communication, and a Virtual Port Service protocol enables resource addressing. The end-devices in the heterogeneous network are made accessible on...... a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It...

  6. Type-Based Access Control in Data-Centric Systems

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  7. Access Control with RFID in the Internet of Things

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  8. A supervisory control policy over an acoustic communication network

    Farhadi, Alireza; Dumon, Jonathan; Canudas-De-Wit, Carlos

    2014-01-01

    International audience This paper presents a supervisory multi-agent control policy over an acoustic communication network subject to imperfections (packet dropout and transmission delay) for localization of an underwater flow source (e.g., source of chemical pollution, fresh water, etc.) with an unknown location at the bottom of the ocean. A two-loop control policy combined with a coding strategy for reliable communication is presented to perform the above task. A simulator is developed a...

  9. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Drew P. Cingel

    2014-06-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive com-munication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  10. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Drew P. Cingel

    2014-01-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive communication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  11. Integrating CERN e-groups into TWiki access control.

    Jones, PL; Hoymr, N; CERN. Geneva. IT Department

    2010-01-01

    Wikis allow for easy collaborative editing of documents on the web for users located in different buildings, cities or even countries. TWiki culture lends to open free form editing and most pages are world readable and editable by CERN authenticated users, however access control is possible and is used to protect sensitive documents. This note discusses the integration of E-groups for authorisation purposes at CERN.

  12. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever...... three key properties of EH-WSNs: adaptability of energy consumption, distributed energy-aware load balancing and support for different application-specific requirements....

  13. Achieving Fine-grained Access Control in Virtual Organisations

    Zhang, Nien Fan; Yao, L.; Nenadic, A.; Chin, J.; Goble, C.; Rector, A.; Chadwick, David W; Otenko, Sassa; Shi, Q.

    2007-01-01

    In a virtual organization environment, where services and data are provided and shared amongorganizations from different administrative domains and protected with dissimilar security policies and measures, there is a need for a flexible authentication framework that supports the use of various authentication methods and tokens. The authentication strengths derived from the authentication methods and tokens should be incorporated into an access-control decision-making process, so that more sen...

  14. Access and control of resources: Lessons from the SANREM CRSP

    Flora, Cornelia B.

    2001-01-01

    Metadata only record Developing sustainability in an agricultural ecosystem requires that attention be given to inequities within communities. The experiences of SANREM CRSP revealed that gender inequality was a significant factor in the access and control of resources that were critical for the projects reaching their goals. Among the resources of financial, manufactured, human, environmental, and social capital, enhancing social capital among women was a crucial component of plans for in...

  15. THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

    S. R. KODITUWAKKU

    2010-01-01

    The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Object oriented design patterns facilitate small scale and large scale design reuse. This paper presents an object oriented design pattern, Administrator Object, to address the User-Role assignment problem in Role Based Access Control (RBAC). Two alternative solutions are proposed. The pattern is presented according to the Gang of Four template.

  16. THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

    S. R. KODITUWAKKU

    2010-12-01

    Full Text Available The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Object oriented design patterns facilitate small scale and large scale design reuse. This paper presents an object oriented design pattern, Administrator Object, to address the User-Role assignment problem in Role Based Access Control (RBAC. Two alternative solutions are proposed. The pattern is presented according to the Gang of Four template.

  17. A Model of Workflow-oriented Attributed Based Access Control

    Guoping Zhang; Jing Liu

    2011-01-01

    the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue ...

  18. GSM-Based Wireless Database Access For Food And Drug Administration And Control

    Engr. Prof Hyacinth C. Inyiama; Engr. Mrs Lois Nwobodo; Engr. Dr. Mrs. Christiana C. Okezie; Engr. Mrs. Nkolika O. Nwazor

    2012-01-01

    GSM (Global system for mobile communication) based wireless database access for food and drug administration and control is a system that enables one to send a query to the database using the short messaging system (SMS) for information about a particular food or drug. It works in such a way that a user needs only send an SMS in order to obtain information about a particular drug produced by a pharmaceutical industry. The system then receives the SMS, interprets it and uses its contents to qu...

  19. Material control and surveillance for high frequency access vaults project

    The 'Material Control and Surveillance for High Frequency Access Vaults' project sponsored by United States Department of Energy's Office of Security Policy, Policy Integration and Technical Support Program (SO-20.3) focuses on enhancing nuclear materials control and surveillance in vaults that are frequently accessed. The focus of this effort is to improve materials control and accountability (MC and A) while decreasing the operational impact of these activities. Los Alamos and Y-12 have developed a testbed at the Los Alamos National Laboratory for evaluating and demonstrating integrated technologies for use in enhancing materials control and accountability in active nuclear material storage vaults. An update will be provided on the new systems demonstrated in the test-bed including a 'confirmatory cart' for expediting the performance of inventory and radio-frequency actuated video that demonstrates the concept of automated data entry for materials moving between MBA's. The United States Department of Energy's Office of Security Policy, Policy Integration and Technical Support Program (SO-20.3) has sponsored a project where nuclear material inventory, control and surveillance systems are evaluated, developed, and demonstrated in an effort to provide technologies that reduce risk, increase material assurance, and provide cost-efficient alternatives to manpower-intensive physical inventory and surveillance approaches for working (high-frequency-access) vaults. This Fiscal Year has been largely focused on evaluating and developing components of two sub-systems that could be used either separately in nuclear material vaults or as part of a larger integrated system for nuclear materials accountability, control and surveillance.

  20. State control, access to capital and firm performance

    Oliver Zhen Li; Xijia Su; Zhifeng Yang

    2012-01-01

    We study the effect of state control on capital allocation and investment in China, where the government screens prospective stock issuers. We find that state firms are more likely to obtain government approval to conduct seasoned equity offerings than non-state firms. Further, non-state firms exhibit greater sensitivities of subsequent investment and stock performance to regulatory decisions on stock issuances than state firms. Our work suggests that state control of capital access distorts resource allocation and impedes the growth of non-state firms. We also provide robust evidence that financial constraints cause underinvestment.

  1. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  2. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  3. Design of a control system for self-shielded irradiators with remote access capability

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  4. OJADEAC: An Ontology Based Access Control Model for JADE Platform

    Ban Sharief Mustafa

    2014-06-01

    Full Text Available Java Agent Development Framework (JADE is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA specifications. JADE propose new infrastructure solutions to support the development of useful and convenient distributed applications. Security is one of the most important issues in implementing and deploying such applications. JADE-S security add-ons are one of the most popular security solutions in JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give authorities to perform an action based on a set of permission objects attached to every authenticated user. This service has several drawbacks when implemented in a scalable distributed context aware applications. In this paper, an ontology-based access control model called (OJADEAC is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome the shortcoming of this service. The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules. OJADEAC model is distributed, intelligent, dynamic, context-aware and use reasoning engine to infer access decisions based on ontology knowledge.

  5. Communications for Coordinative Control of Wind Power Systems

    Wei, Mu

    Due to the rapid development of wind energy and the smart grid requirement on modern power systems, data communication technologies in wind power system play an increasingly important role. The objective of the project is to investigate communication system attributes and develop advanced power...... operations to avoid any undesired WTs cutting off. In the studies of communication systems, the attributes of the three levels’ data communication system, covering WAN (Wide Area Network), LAN (Local Area Network) and CAN (Control Area Network), associated with wind power systems, are obtained and analyzed...... technologies point of view. For instance the tolerance time limit of FSWTs’ keeping stability under some disturbances may be achieved by such studies. A simulation platform integrating the communication system and the power system is proposed. This methodology reflects the latency feature in the reliability...

  6. Design of the Wind Tunnel Model Communication Controller Board. Degree awarded by Christopher Newport Univ. on Dec. 1998

    Wilson, William C.

    1999-01-01

    The NASA Langley Research Center's Wind Tunnel Reinvestment project plans to shrink the existing data acquisition electronics to fit inside a wind tunnel model. Space limitations within a model necessitate a distributed system of Application Specific Integrated Circuits (ASICs) rather than a centralized system based on PC boards. This thesis will focus on the design of the prototype of the communication Controller board. A portion of the communication Controller board is to be used as the basis of an ASIC design. The communication Controller board will communicate between the internal model modules and the external data acquisition computer. This board is based around an Field Programmable Gate Array (FPGA), to allow for reconfigurability. In addition to the FPGA, this board contains buffer Random Access Memory (RAM), configuration memory (EEPROM), drivers for the communications ports, and passive components.

  7. Guide to Evaluating Usability, Accessibility and Communicability in Web Applications with User Intervention

    Asnier Góngora R.

    2013-12-01

    Full Text Available The article is associated with the creation of a usability lab where various types of tests performed using static and dynamic tools for evaluating the characteristics of usability, accessibility and Communicability by indicators in the software testing process with the user's presence. It also addresses the current situation in Cuba on the issue of evidence of these characteristics and the impact it could bring to the development teams. In addition, an analysis of the result of applying a tool (check list to multiple Web applications on tests conducted at the National Center for Software Quality Cuba (CALISOFT. We also present a set of best practices that support the development of web applications to suit the user.

  8. Analysis of an FBMC/OQAM scheme for asynchronous access in wireless communications

    Mattera, Davide; Tanda, Mario; Bellanger, Maurice

    2015-12-01

    The OFDM/OQAM transceiver belongs to the filter-bank-based multicarrier (FBMC) family and, unlike OFDM schemes, it is particularly able to meet the requirements of the physical layer of cognitive radio networks such as high level of adjacent channel leakage ratio and asynchronous communications. The paper proposes and analyzes a new implementation structure, named frequency spreading, for the OFDM/OQAM transceiver. On flat channels, it is equivalent to the standard one in terms of input-output relations, though more complex. On multipath channels, it offers a crucial advantage in terms of equalization, which is performed in the frequency domain, leading to high performance and no additional delay. With its flexibility and level of performance, the analyzed scheme has the potential to outperform OFDM in the asynchronous access context and in cognitive radio networks.

  9. Unmanned Aircraft System Control and ATC Communications Bandwidth Requirements

    Henriksen, Steve

    2008-01-01

    There are significant activities taking place to establish the procedures and requirements for safe and routine operation of unmanned aircraft systems (UAS) in the National Airspace System (NAS). Among the barriers to overcome in achieving this goal is the lack of sufficient frequency spectrum necessary for the UAS control and air traffic control (ATC) communications links. This shortcoming is compounded by the fact that the UAS control communications links will likely be required to operate in protected frequency spectrum, just as ATC communications links are, because they relate to "safety and regularity of flight." To support future International Telecommunications Union (ITU) World Radio Conference (WRC) agenda items concerning new frequency allocations for UAS communications links, and to augment the Future Communications Study (FCS) Technology Evaluation Group efforts, NASA Glenn Research Center has sponsored a task to estimate the UAS control and ATC communications bandwidth requirements for safe, reliable, and routine operation of UAS in the NAS. This report describes the process and results of that task. The study focused on long-term bandwidth requirements for UAS approximately through 2030.

  10. A model to reduce complexity and maintain coherence between Access Control and Transmission Control policies

    Bertrand, Yoann; Blay-Fornarino, Mireille; Boudaoud, Karima; Riveill, Michel

    2016-01-01

    In order to protect resources from unauthorized access and data leakage in companies, security experts and administrators can use mechanisms such as Access Control (AC) and Transmission Control (TC). Both AC and TC are based on policies that are defined, modified and revoked by these experts. However, policy management can be a time-consuming and tiresome task, especially when both mechanisms are used on large sets of users and resources. Moreover, contradictions between AC and TC policies ca...

  11. Wireless communication for control of manipulation systems

    Belda, Květoslav; Rychnovský, V.; Píša, P.

    2012-01-01

    Roč. 22, č. 1 (2012), s. 29-41. ISSN 1230-2384 Institutional research plan: CEZ:AV0Z10750506 Keywords : distributed mechatronic system * model-based control * multi-level control * odometry * optical sensors * standard IEEE 802.15.4 * ZigBee protocol Subject RIV: JA - Electronics ; Optoelectronics, Electrical Engineering http://library.utia.cas.cz/separaty/2012/AS/belda-0376476.pdf

  12. Control, Communication, and Knowledge-Building in Asian Call Centers

    Maria Lombard

    2015-02-01

    Full Text Available Communication within international call centers can be significantly complicated by breakdowns that result from multiple layers of corporate language.  This case study explores training sessions and documentation developed and delivered by an American team responsible for training international call center workers located in the Philippines.  Findings show that attempts to standardize and control workplace language can limit meaningful two-way communication, leaving workers to both question what they are told and invent new ways of communicating.  Recommendations are presented in this study for a workplace writing model that can overcome language differences through authentic interaction.

  13. Communications involving the control room of a nuclear power plant

    This study investigated communications within the operations component of a nuclear power plant, with a primary emphasis on control room communications. A structured interview technique was developed following preliminary interviews at the plant, and pretested at AECB headquarters. Patterns were identified from questions asked on communications links, work relationships, miscommunications, procedures, instrumentation and responses to problems. The study was an exploratory one, conducted under a limited budget, to provide background information and to identify areas for further investigation. The report offers recommendations about areas for further research

  14. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  15. Control, Communication, and Knowledge-Building in Asian Call Centers

    Maria Lombard

    2015-01-01

    Communication within international call centers can be significantly complicated by breakdowns that result from multiple layers of corporate language.  This case study explores training sessions and documentation developed and delivered by an American team responsible for training international call center workers located in the Philippines.  Findings show that attempts to standardize and control workplace language can limit meaningful two-way communication, leaving workers to both question w...

  16. Compensating for Unreliable Communication Links in Networked Control Systems

    Henriksson, Erik

    2009-01-01

    Control systems utilizing wireless sensor and actuator networks can be severely affectedby the properties of the communication links. Radio fading and interferencemay cause communication losses and outages in situations when the radio environmentis noisy and low transmission power is desirable. This thesis proposes amethod to compensate for such unpredictable losses of data in the feedback controlloop by introducing a predictive outage compensator (POC). The POC is a filter tobe implemented a...

  17. Controller-Pilot Data Link Communication – (TAXI-CPDLC)

    Jakobi, Jörn

    2010-01-01

    Increasing traffic rates in aviation cause bottlenecks in safety and efficiency, particularly on the ground at major airports. Voice communication radio channels are often overloaded and pilots are less supported to find their way and to avoid other traffic. Controller-Pilot Data Link Communication during taxi (TAXI-CPDLC) is one promising service to bring benefits in terms of unload the radio channel by taking over ‘routine communication’ and to enable the transfer and representation of the ...

  18. Controlled Bidirectional Quantum Direct Communication by Using a GHZ State

    MAN Zhong-Xiao; XIA Yun-Jie

    2006-01-01

    @@ A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger-Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed.

  19. 7 CFR 1726.176 - Communications and control facilities.

    2010-01-01

    ... SERVICE, DEPARTMENT OF AGRICULTURE ELECTRIC SYSTEM CONSTRUCTION POLICIES AND PROCEDURES General Plant... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA... contract for only a power line carrier system, the requirements of paragraph (b) of this section apply....

  20. Minimizing communication cost among distributed controllers in software defined networks

    Arlimatti, Shivaleela; Elbreiki, Walid; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Software Defined Networking (SDN) is a new paradigm to increase the flexibility of today's network by promising for a programmable network. The fundamental idea behind this new architecture is to simplify network complexity by decoupling control plane and data plane of the network devices, and by making the control plane centralized. Recently controllers have distributed to solve the problem of single point of failure, and to increase scalability and flexibility during workload distribution. Even though, controllers are flexible and scalable to accommodate more number of network switches, yet the problem of intercommunication cost between distributed controllers is still challenging issue in the Software Defined Network environment. This paper, aims to fill the gap by proposing a new mechanism, which minimizes intercommunication cost with graph partitioning algorithm, an NP hard problem. The methodology proposed in this paper is, swapping of network elements between controller domains to minimize communication cost by calculating communication gain. The swapping of elements minimizes inter and intra communication cost among network domains. We validate our work with the OMNeT++ simulation environment tool. Simulation results show that the proposed mechanism minimizes the inter domain communication cost among controllers compared to traditional distributed controllers.

  1. Controlled Quantum N-Party Simultaneous Direct Communication

    XIA Yun-Jie; MAN Zhong-Xiao

    2007-01-01

    In this paper, we propose a controlled quantum N-party simultaneous direct communication protocol with single-qubit measurements. Many users can simultaneously exchange their secret messages in a set of devices with the control of a supervisor. The eavesdropper's commonly used attacks can be detected through two security checking processes.

  2. A supervisory control policy over an acoustic communication network

    Farhadi, Alireza; Dumon, Jonathan; Canudas-de-Wit, Carlos

    2015-05-01

    This paper presents a supervisory multi-agent control policy over an acoustic communication network subject to imperfections (packet dropout and transmission delay) for localisation of an underwater flow source (e.g., source of chemical pollution, fresh water, etc.) with an unknown location at the bottom of the ocean. A two-loop control policy combined with a coding strategy for reliable communication is presented to perform the above task. A simulator is developed and used to evaluate the trade-offs between quality of communication, transmission delay and control for a fleet of autonomous underwater vehicles supervised over a noisy acoustic communication network by an autonomous surface vessel. It is illustrated that without compensation of the effects of severe random packet dropout, localisation of an unknown underwater flow source is not possible for the condition simulated just by implementing a two-loop control policy. But a two-loop control policy combined with a strategy for reliable communication locates the unknown location of flow source.

  3. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  4. Rotational Scanning Electron Micrographs (rSEM): A novel and accessible tool to visualize and communicate complex morphology

    David Koon-Bong Cheung; Adam Brunke; Nesrine Akkari; Carina Mara de Souza; Thomas Pape

    2013-01-01

    Abstract An accessible workflow is presented to create interactive, rotational scanning electron micrographs (rSEM). These information-rich animations facilitate the study and communication of complex morphological structures exemplified here by male arthropod genitalia. Methods are outlined for the publication of rSEMs on the web or in journal articles as SWF files. Image components of rSEMs were archived in MorphBank to ensure future data access. rSEM represents a promising new addition to ...

  5. Echolocation calls and communication calls are controlled differentially in the brainstem of the bat Phyllostomus discolor

    Schuller Gerd

    2005-08-01

    Full Text Available Abstract Background Echolocating bats emit vocalizations that can be classified either as echolocation calls or communication calls. Neural control of both types of calls must govern the same pool of motoneurons responsible for vocalizations. Electrical microstimulation in the periaqueductal gray matter (PAG elicits both communication and echolocation calls, whereas stimulation of the paralemniscal area (PLA induces only echolocation calls. In both the PAG and the PLA, the current thresholds for triggering natural vocalizations do not habituate to stimuli and remain low even for long stimulation periods, indicating that these structures have relative direct access to the final common pathway for vocalization. This study intended to clarify whether echolocation calls and communication calls are controlled differentially below the level of the PAG via separate vocal pathways before converging on the motoneurons used in vocalization. Results Both structures were probed simultaneously in a single experimental approach. Two stimulation electrodes were chronically implanted within the PAG in order to elicit either echolocation or communication calls. Blockade of the ipsilateral PLA site with iontophoretically application of the glutamate antagonist kynurenic acid did not impede either echolocation or communication calls elicited from the PAG. However, blockade of the contralateral PLA suppresses PAG-elicited echolocation calls but not communication calls. In both cases the blockade was reversible. Conclusion The neural control of echolocation and communication calls seems to be differentially organized below the level of the PAG. The PLA is an essential functional unit for echolocation call control before the descending pathways share again the final common pathway for vocalization.

  6. The development of access control system in Fukushima No.2 nuclear power station

    Ookubo, S.; Nakai, Y.; Oohira, N.; Kishishita, S. [Tokyo Electric power Co., Tokyo (Japan); Kobayashi, H.; Sano, F. [Fuji Electric Co., Tokyo (Japan); Masuda, M.; Tajima, T.; Oohira, K. [Toshiba Corporation, Tokyo (Japan)

    2002-07-01

    A new radiation work control system has been developed for controlling the entrance and exit of workers from the radiation controlled area in a nuclear power station and has been run in the Fukushima No. 2 Nuclear Power Station of Tokyo Electric Power Co., Inc. since October, 1999. The system is designed to reduce workers burden by simplifying the operation of each equipment that controls access to radiation controlled areas, and to minimize radiation exposure by automatically acquiring dose data during each access and each task. The new system adopted electronic personal dosimeters (gamma radiation EPD) which permit data collection by radio communication, thus improving the conventional alarm-equipped personal dosimeter (EPD) and increasing reliability as primary dosimeters. Furthermore, additional electronic personal dosimeters capable of measuring beta radiation (gamma and beta radiations EPD) were also utilized in specific tasks in October 2001. After a six-month test run of these EPDs, the film badges were discontinued in April 2002 and replaced solely with the EPDs. EPDs are now used as the primary dosimetry for radiation workers.

  7. Data communications and computer communications network

    This textbook is composed of twelve chapters, which are communication network introduction, foundation of data communication, data link control, circuit switching system, packet switching system, multiple access communication system, protocol and architecture, LAN, MAN communication network, integrated service digital network, internet and Asymmetric digital subscriber Line and Wireless Local Loop. Each chapter has the introduction of the technique, structure, function and practice problems. It also has the appendix on electricity and communication standards organization, characteristic table and glossary.

  8. 2011 International Conference in Electrics, Communication and Automatic Control Proceedings

    2012-01-01

    This two-volume set contains the very latest, cutting-edge material in electrics, communication and automatic control. As a vital field of research that is highly relevant to current developments in a number of technological domains, the subjects it covers include micro-electronics and integrated circuit control, signal processing technology, next-generation network infrastructure, wireless communication and scientific instruments. The aim of the International Conference in Electrics, Communication and Automatic Control, held in Chongqing, China, in June 2011 was to provide a valuable inclusive platform for researchers, engineers, academicians and industrial professionals from all over the world to share their research results with fellow scientists in the sector. The call for papers netted well over 600 submissions, of which 224 were selected for presentation. This fully peer-reviewed collection of papers from the conference can be viewed as a single-source compendium of the latest trends and techniques in t...

  9. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  10. Exploring Bridge-Engine Control Room Collaborative Team Communication

    Aditi Kataria

    2015-06-01

    Full Text Available The EC funded CyClaDes research project is designed to promote the increased impact of the human element in shipping across the design and operational lifecycle. It addresses the design and operation of ships and ship systems. One of the CyClaDes’ tasks is to create a crew-centered design case-study examination of the information that is shared between the Bridge and Engine Control Room that helps the crew co-ordinate to ensure understanding and complete interconnected tasks. This information can be provided in various ways, including communication devices or obtained from a common database, display, or even the ship environment (e.g., the roll of the ship. A series of semi-structured interviews were conducted with seafarers of diverse ranks to get a better idea of what communication does, or should, take place and any problems or challenges existing in current operations, as seen from both the bridge and ECR operators’ perspectives. Included in the interview were both the standard communications and information shared during planning and executing a voyage, as well as special situations such as safety/casualty tasks or heavy weather. The results were analyzed in terms of the goals of the communication, the primary situations of interest for communication and collaboration, the communication media used, the information that is shared, and the problems experienced. The results of seafarer interviews are presented in the paper to explore on-board inter-departmental communication.

  11. The equipment access software for a distributed UNIX-based accelerator control system

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  12. Advent of Biometric Sensors in Field of Access Control

    Ali Anas

    2015-09-01

    Full Text Available Biometrics is the science of measuring and analyzing biological data. It is used to uniquely identify individuals by their physical characteristics or personal behavior traits.The results from scrutiny of various themes including unimodal, multimodal, physiological, behavioural bio-metrics. Bio-metrics, Physiological and behavioural are compared in the review. The article addresses a particular aspect of utilizing biometrics for authentication, identification and access control. The use of systems like fingerprint, face recognition, hand geometry, Palm print, DNA analysis, iris recognition, retina and odour/scent will be dealt with herewith. This study deals with various applications of this technology, like surveillance, employee identification, device access etc with mentions respective of hardware used. The influence of such features is yet to be documented properly, but it is safe to say that it has been a huge step towards better information security and identification control.Over the course of this text, we will try to bring to light our analysis of the subject and provide an in-depth examination of contemporary and futuristic technologies pertaining to this field.

  13. THE USAGE OF HRU SEGMENT MATRIX ACCESS IN THE ANALYSIS OF INFORMATION SECURITY SYSTEMS WHICH MAKE MANDATORY ACCESS CONTROL

    Korolev I. D.

    2014-09-01

    Full Text Available In this article we consider the usage of HRU access matrix changing system allowing for information security system which makes mandatory access control in case of information security analysis by using an automatic classification of formalized documents in the system of electronic document management

  14. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  15. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  16. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-01-17

    ...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10 a.m.-4..., Airport Security Access Control Systems. The agenda will include the following: February 9, 2012...

  17. Teaching Automatic Linear Scanning for Computer Access: A Case Study of a Preschooler with Severe Physical and Communication Disabilities.

    Light, Janice

    1993-01-01

    This case study documents the successful use of a cognitive development-based instructional protocol to teach automatic linear scanning for computer access to a young child with severe physical and communication disabilities (cerebral palsy). The instructional program is discussed in terms of cognitive/developmental theory, educational…

  18. Cancer control and the communication innovation in South Korea: implications for cancer disparities.

    Jung, Minsoo

    2013-01-01

    Over the last 10 years, the number of cancer survivors in South Korea has reached nearly one million with a survival rate of 49.4%. However, integrated supportive care for cancer survivors is lagging. One area in which the current cancer control policy needs updating is in the utilization of information and communication technology (ICT). The remarkable progress in the field of ICT over the past 10 years presents exciting new opportunities for health promotion. Recent communication innovations are conducive to the exchange of meta-information, giving rise to a new service area and transforming patients into active medical consumers. Consequently, such innovations encourage active participation in the mutual utilization and sharing of high-quality information. However, these benefits from new ICTs will almost certainly not be equally available to all, leading to so-called communication inequalities where cancer survivors from lower socioeconomic classes will likely have more limited access to the best means of making use of the health information. Therefore, most essentially, emphasis must be placed on helping cancer survivors and their caregivers utilize such advances in ICT to create a more efficient flow of health information, thereby reducing communication inequalities and expanding social support. Once we enhance access to health information and better manage the quality of information, as a matter of fact, we can expect an alleviation of the health inequalities faced by cancer survivors. PMID:23886120

  19. Development of access control system in Fukushima No.2 nuclear power station

    A new radiation work control system has been developed for controlling the entrance and exit of workers from the radiation controlled area in a nuclear power station and has been run in the Fukushima No.2 Nuclear Power Station of Tokyo Electric Power Co. Inc., since October, 1999. The newly developed system uses an access control device (ACD) for automatically lending an alarm-equipped personal dosimeter (APD) to each worker, and also radio communication for gathering dose data while contamination is measured by a body surface monitor upon exit, to reduce the workload for workers. The APD accurately measures both x-rays and γ-rays and sounds an alarm if the set dose level is reached. The ACD incorporates a charging function for 150 dosimeters in addition to the identification (ID) card reading and entrance/exit qualification judgment functions that are available with conventional entrance/exit control devices. Also, at the time of entrance, the ID number and alarm setpoint are written into an APD, which is then lent automatically, thereby making entry quicker and easier for workers. After returning the APD, it can be recharged rapidly and trend data during work can be automatically collected. The body surface monitor system is designed as follows. While contamination of the body surface is being measured at the time of exit, the data of the APD and ID card is read to perform an exit check. After completion of contamination measurement, the results of the exit check and dose data are printed out and collected by the tested person. Radio communication is used to transmit and receive the APD data, and to ensure precise radio communication during body surface monitoring two antennas are used, one for transmission and one for reception, so data can be read during contamination measurement. The developed system reduces workers' burden and improves functionality and reliability. (Suetake, M.)

  20. Trust-based Access Control in Virtual Learning Community

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  1. Outbreaks: Sources of Epidemiological Knowledge in Communicable Disease Control

    P.L.J.M. Mertens (Paulus Leonardus Johannes Marie)

    2008-01-01

    textabstractPublic health has been defined as the science and art of disease prevention, prolonging life, and promoting health and well-being through organized community effort for the sanitation of the environment, the control of communicable infections, the organization of medical and nursing serv

  2. A Semantic Context-Based Model for MobileWeb Services Access Control

    Haibo Shen; Yu Cheng

    2011-01-01

    As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic context-based access control model (called SCBAC) to be applied in mobile web services environment by combining ...

  3. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  4. Control and Non-Payload Communications Generation 1 Prototype Radio Flight Test Report

    Shalkhauser, Kurt A.; Young, Daniel P.; Bretmersky, Steven C.; Ishac, Joseph A.; Walker, Steven H.; Griner, James H.; Kachmar, Brian A.

    2014-01-01

    Unmanned aircraft (UA) represent a new capability that will provide a variety of services in the Government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized because of the lack of a common understanding of what is required to safely operate Unmanned Aircraft Systems in the National Airspace System (UAS in the NAS). The desire and ability to fly UA is of increasing urgency. The application of UA to perform national security, defense, scientific, and emergency management are driving the critical need for less restrictive access by UA to the NAS. Existing Federal Aviation Regulations, procedures, and technologies do not allow routine UA access to the NAS. Access to the NAS is hampered by challenges such as the lack of an onboard pilot to see and avoid other aircraft; the ability of a single pilot or operator to control multiple UA; the reliance on command and control (C2) links; the altitudes, speeds, and duration at which the aircraft fly; and the wide variation in UA size and performance. NASA is working with other Government agencies to provide solutions that reduce technical barriers and make access to the NAS routine. This goal will be accomplished through system-level integration of key concepts, technologies, or procedures and through demonstrations of these integrated capabilities in an operationally relevant environment. This project provides an opportunity to transition the acquired empirical data and knowledge to the Federal Aviation Administration and other stakeholders to help them define the requirements for routine UA access to the NAS.Radio communications channels for UA are currently managed through exceptions and use either Department of Defense frequencies for line-of-sight (LOS) and satellite-based communications links, low-power LOS links in amateur bands, or unlicensed Industrial/Scientific/Medical (ISM) frequencies. None of these frequency bands are designated for safety and

  5. Technical Communication of Automation Control System in Water Treatment Plant

    Irfan Jamil; Rehan Jamil; Rizwan Jamil; Zhao Jinquan; Abdus Samee

    2013-01-01

    This paper presents technical communication of automation industry which describes the technical issues of automation control system in operation development, improving management level and high efficiency process in water treatment system. Today's water treatment plants are applied for water conservancy projects, emerged by the technology of automation control system is to ensure safe, continues, high quality water supply to municipal and for multi-purpose usage. Along with automation techno...

  6. Security controls in the Stockpoint Logistics Integrated Communications Environment (SPLICE)

    Arseneault, D. S.

    1985-03-01

    This thesis examines security controls specified and implemented in the Stock Point Logistics Integrated Communications Environment (SPLICE) project. Controls provided by the Defense Data Network and the Tandem operating system are reviewed. Alternatives from current literature in areas of authentication, encryption, and dial-port protection are reviewed for the purpose of suggesting enhancements. Issues discussed apply to most interactive/decentralized systems in operation today and include administrative as well as technical recommendations.

  7. Access to digital representations of color images: a copyright and communications law perspective

    Lyons, Patrice A.

    1996-03-01

    There has been work going forward on the development of a frame of reference for locating and invoking digital information services and objects over communications systems and pathways having computational capabilities. An important concept in this context is the notion of a `digital object' as a set of sequences of bits, including a unique identifier for the object called a `handle.' A digital object may incorporate digital works and other representations of digital information in which copyright, patent, trade secret or other rights or interest are claimed, although this need not always be the case. For commercial enterprise to take full advantage of the global information infrastructure, it is helpful to develop a flexible terminology for thinking about digital information from a copyright perspective; in this regard, the concept of `digital work' will be suggested. Clearance of rights and interests in connection with the contents of digital objects should be treated separately from compliance with procedures for accessing digital objects viewed as entities that incorporate and identify contents. A suggested legal framework will be discussed.

  8. Instrumentation bus systems and communication methods for DNBPS fast controller

    Diagnostics Neutral Beam (DNB) injector requires different type of controllable power supplies, to be operated in predefined sequence; hence demands for a complex control system. Instrumentation and control (I and C) is to be opted considering design feasibility and maintainability over a long life span of experiment. One of the most important standards for I and C is the computer bus, which is needed for the selection of input and output (I/O) devices, CPU boards and other components. This paper summarizes the various I/O bus and communication methods among interconnected sub systems with reference to DNB power supply control system. (author)

  9. Safety systems and access control in the National Ignition Facility.

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  10. Nuclear and related techniques in the control of communicable diseases

    The IAEA has a programme component entitled ''Nuclear Techniques in Communicable Diseases'', the aims of which are to encourage research in the development of new methods of controlling communicable diseases and to transfer the technology to institutes in endemic regions. Implementation of the programme component includes information exchange through publications, symposiums and seminars. The two most recent seminars were held in Bombay in November 1988 and Belo Horizonte in November 1989, and a selection of the papers presented have been published in this Technical Document. Refs, figs and tabs

  11. A fiber instrumentation and control communications scheme for Ontario Power Generation's universal delivery machine

    A general-purpose delivery machine has been designed to allow station outage teams to deploy maintenance and diagnostic tooling into reactor channels at a much reduced cycle time, thereby substantially reducing reactor outage periods. This Universal Delivery Machine (UDM), designed and manufactured by GE Canada Nuclear Products under contract to OPG Fuel Channel Inspection and Maintenance Department, is equipped with many axes of motion to provide the multitude of functions required to home and lock onto channels, remove closure and shield plugs, and deliver into and remove from the fuel channels the various probes and tools required for safe, timely and cost-effective reactor maintenance. All of these motion axes, as well as the myriad of process measurement and control devices on the machine require accurate and speedy access by the machine controller in order to ensure safe and effective control. Such access is achieved by means of a system of high-speed fiber optic serial communications networks connecting the machine to the control system. This paper examines the implementation of these fiber optic communications networks. (author)

  12. Nonverbal social communication and gesture control in schizophrenia.

    Walther, Sebastian; Stegmayer, Katharina; Sulzbacher, Jeanne; Vanbellingen, Tim; Müri, René; Strik, Werner; Bohlhalter, Stephan

    2015-03-01

    Schizophrenia patients are severely impaired in nonverbal communication, including social perception and gesture production. However, the impact of nonverbal social perception on gestural behavior remains unknown, as is the contribution of negative symptoms, working memory, and abnormal motor behavior. Thus, the study tested whether poor nonverbal social perception was related to impaired gesture performance, gestural knowledge, or motor abnormalities. Forty-six patients with schizophrenia (80%), schizophreniform (15%), or schizoaffective disorder (5%) and 44 healthy controls matched for age, gender, and education were included. Participants completed 4 tasks on nonverbal communication including nonverbal social perception, gesture performance, gesture recognition, and tool use. In addition, they underwent comprehensive clinical and motor assessments. Patients presented impaired nonverbal communication in all tasks compared with controls. Furthermore, in contrast to controls, performance in patients was highly correlated between tasks, not explained by supramodal cognitive deficits such as working memory. Schizophrenia patients with impaired gesture performance also demonstrated poor nonverbal social perception, gestural knowledge, and tool use. Importantly, motor/frontal abnormalities negatively mediated the strong association between nonverbal social perception and gesture performance. The factors negative symptoms and antipsychotic dosage were unrelated to the nonverbal tasks. The study confirmed a generalized nonverbal communication deficit in schizophrenia. Specifically, the findings suggested that nonverbal social perception in schizophrenia has a relevant impact on gestural impairment beyond the negative influence of motor/frontal abnormalities. PMID:25646526

  13. Current Hale ROA Voice and Control Communication Practices and Performance: White Paper

    2007-01-01

    The objective of this white paper is to help achieve the ACCESS 5 goal by sharing the UNITE members knowledge of current HALE ROA communication systems with other ACCESS 5 participants so that all interested parties start from a common understanding as we begin the clarification of requirements for voice and C2 communication. This white paper is also intended to describe the point of departure for any future developments that need to be realized to achieve the long term ACCESS 5 goal. Although this white paper describes the current systems, the functional and performance requirements that are also being developed under ACCESS 5 may not require the same levels of functionality and performance as currently exist. The paper addresses the following: 1) A description of a typical current HALE ROA communications system, 2) HALE ROA communications systems performance metrics, 3) HALE ROA communications systems performance, and 5) A comparison of current HALE ROA communications systems with current regulations.

  14. Designing communication and remote controlling of virtual instrument network system

    In this paper, a virtual instrument network through the LAN and finally remote control of virtual instruments is realized based on virtual instrument and LabWindows/CVI software platform. The virtual instrument network system is made up of three subsystems. There are server subsystem, telnet client subsystem and local instrument control subsystem. This paper introduced virtual instrument network structure in detail based on LabWindows. Application procedure design of virtual instrument network communication, the Client/the programming mode of the server, remote PC and server communication far realizing, the control power of the workstation is transmitted, server program and so on essential technical were introduced. And virtual instruments network may connect to entire Internet on. Above-mentioned technology, through measuring the application in the electronic measurement virtual instrument network that is already built up, has verified the actual using value of the technology. Experiment and application validate that this design is resultful

  15. Vibration-induced jitter control in satellite optical communication

    Xue, Zheng-yan; Qi, Bo; Ren, Ge

    2013-08-01

    Laser satellite communication has become especially attractive in recent years. However, because the laser beam is very narrow and there is a long distance between satellites, the laser communication channel is very sensitive to vibrations of the optical platform. These vibrations cause optical jitter, leading to the reduction of received signals and bit-error rate degradation. Consequently, optical jitter control with PAT (pointing acquisition and tracking) subsystems is a critical problem in laser satellite communication. To compensate for the platform vibration effectively in realtime, in this paper, an adaptive feedback control technique based on Youla-parameterization is presented, which can adapt to the current disturbance acting on the laser beam by adjusting its parameters in realtime to maintain optimal performance. The main idea is to use the well-known Youla parameterization formula to construct a feedback control scheme with the guaranteed closed loop stability, and the feedback controller is a function of plant coprime factors and a free parameter Q. For adaptive disturbance estimation, the free parameter Q is set to an adaptive finite impulse response (FIR) filter, the coefficients of which are updated by a recursive least-squares (RLS) algorithm in realtime. It is shown in experiment that the adaptive feedback control technique based on Youla-parameterization can reject the optical jitter caused by satellite platform vibration effectively and improve the performance of the system.

  16. Complex systems relationships between control, communications and computing

    2016-01-01

    This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity an...

  17. 卫星通信终端话音接入车通的分析%Analysis on Voice Access from Satellite Communication Terminals to Vehicular Communication System

    薛晓飞; 白雪杨

    2012-01-01

    Aiming at application requirements of satellite voice communication on moving vehicles, great influence of vehicle movement on satellite communication voice effect and the disadvantage that the voice can not be shared by multi-members,this paper analyzes the voice of satellite communication terminals and the category and characteristics of vehicular communication system, and provides two methods, one is to access two-line and four-line analog voice to different vehicular communication systems, the other is to access IP voice to digital vehicular communication system,so as to provide references to practical engineering application.%根据车辆运动中对卫星话音通信的应用需求,针对车辆运动噪音对卫星通信话音效果影响大,以及卫星通信话音不能供多个乘员共享使用的缺点,对卫星通信终端的话音和车通的种类、特点进行了分析;提出了通过话音接入装置将卫星通信终端二线和四线模拟话音接入到各种车通的方法,以及通过必要的协议转换将IP话音接入到数字车通的方法,可以为实际的工程应用提供参考。

  18. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel;

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not...... complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...... emergency response scenario which highlights the novel challenges that arise when enforcing access control in an environment with moving subjects and objects. To address a realistic application scenario, we consider movement on road networks, and we identify complex access control decisions relevant to such...

  19. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long‐distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  20. A novel distributed algorithm for media access control address assignment in wireless sensor networks

    TIAN Ye; SHENG Min; LI Jiandong

    2007-01-01

    This Paper presents a novel distributed media access control(MAC)address assignment algorithm,namely virtual grid spatial reusing(VGSR),for wireless sensor networks,which reduces the size of the MAC address efficiently on the basis of both the spatial reuse of MAC address and the mapping of geographical position.By adjusting the communication range of sensor nodes,VGSR algorithm can minimize the size of MAC address and meanwhile guarantee the connectivity of the sensor network.Theoretical analysis and experimental results show that VGSR algorithm is not only of low energy cost,but also scales well with the network ize,with its performance superior to that of other existing algorithms.

  1. A Trusted Host's Authentication Access and Control Model Faced on User Action

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  2. 基于XACML的EPCIS访问控制模型%Access Control Model for EPCIS Based on XACML

    李景峰; 李云鹏

    2013-01-01

    根据供应链系统对EPC信息服务(EPCIS)提出的访问控制需求,设计一种基于可扩展访问控制标记语言(XACML)的EPCIS访问控制模型.模型中的访问控制执行接口利用方法拦截技术实现对访问请求的拦截,并生成决策上下文对象.访问控制服务组件基于决策上下文对象中包含的用户、资源、环境和动作属性实现对访问请求的动态评估.安全通信组件利用安全性断言标记语言,结合缓存机制实现XACML授权请求/响应的实时传输.访问控制流程表明,该模型能够实现灵活的访问控制策略部署和管理,具有供应链产品信息访问控制的动态性、异构性等特点.%The special access control requirements of EPC Information Service(EPCIS) in the supply chains are analyzed,and an EPCIS access control model based on Extensible Access Control Markup Language(XACML) is presented.The access control execution interface in the model can intercept the access requests by using the method intercepting technology,and produce the corresponding judgment context.Based on the user property,resource property,environment property and action property,which are included into the judgment context,the access control service component can dynamically assess the access requests.The secure communication component can effectively provide the real-time transmission for XACML authorization request/response messages,by combining the Security Assertion Markup Language(SAML) and the caching mechanism.The access control workflow indicates that the model can implement the flexible and variable deployment and management of the access control strategies,which is well fit for implement highly dynamic and heterogeneous access control function for the product information in the supply chains.

  3. Implementing portable channel access server software in the KEKB accelerator control system

    KEKB (KEK B-factory) accelerators are under construction and the control computer system for them is also in the last phase of installation. KEKB accelerators are composed of two storage rings, namely, HER (High Energy Ring for electrons of 8 GeV) and LER (Low Energy Ring for positrons of 3.5 GeV). These rings are placed in the underground tunnel in which former TRISTAN electron-positron colliding accelerator was. We have been constructing control system for KEKB from the scratch based on EPICS (Experimental Physics and Industrial Control Systems). But, for the injector linac, its control computer system was rejuvenated just a few years ago and it is not an EPICS based system but an original one. To operate KEKB accelerators, tuning of the linac as the injector for the KEKB rings is thought to be very essential. Ideally, KEKB control system can control both KEKB rings and linac. And both operators at linac control room and at KEKB control room should be able to monitor and adjust equipment of the other accelerators. For that purpose, we have to develop suitable method in between two systems to communicate with each other. In the EPICS collaborations, there is a Portable CA (Channel Access) Server for EPICS developed at Los Alamos National Laboratory for SUN workstations. We decided to modify it for our purposes and have been implementing it to KEKB control system step by step. And now, we can monitor and set magnetic field of Q-magnets in the linac, control beam transport magnets in the linac beam line, control klystrons, and measure beam positions by strip-line monitors through EPICS. In the near future, other equipment of the linac will be added to the CA server before the commissioning of the KEKB rings. (author)

  4. Security analysis and improvements of authentication and access control in the Internet of Things.

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  5. OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITYBASED ENCRYPTION WITH ANONYMOUS KEY ISSUING

    Xu Lingling; Zhang Fangguo; Wen Yamin

    2011-01-01

    In ACM'CCS 2009,Camenisch,et al.proposed the Obhvious Transfer with Access Control (AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the simplified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption (IBE) with Anonymous Key Issuing (AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.

  6. I/O Standard Based Thermal/Energy Efficient Green Communication For Wi-Fi Protected Access on FPGA

    Kumar, Tanesh; Pandey, Bishwajeet; Das, Teerath;

    2014-01-01

    In this paper, we analyzed how does life and reliability of an integrated circuit is affected when it is operated in different regions under different temperatures. We have taken Fibonacci generator as our target circuit and LVCMOS as I/O standards. WPA and WPA2 (Wi-Fi Protected Access) key can...... be generated with Fibonacci generator. Here, thermal efficient green Fibonacci Generator is used to generate key for Wi-Fi Protected Access in order to make green communication possible under different room temperature. By analysis it is observed that at standard normal temperature (21degrees C), LVCMOS12 have...

  7. High-speed narrowband PLC - High-performance Access Powerline Communication structures in smart grid; High-Speed Narrowband PLC. Leistungsfaehige Access-Powerline-Kommunikationsstrukturen im Smart Grid

    Offner, Georg [devolo AG, Aachen (Germany)

    2012-07-01

    The smart grid provides a stable operation of a decentralized power system which is fed more and more by small providers by means of solar technology and wind power technology. Furthermore, commercial and private clients profit from the smart grid, as they may capture information about their current consumption in real time or can obtain these data from the Internet. The author of the contribution under consideration presents new approaches to access powerline communications that enable efficient communication between IPv6 based household meter and network station. The contribution under consideration describes the technologies used as well as practical experiences and initial results from field tests. Here insights from the integration of G3-PLC are in the foreground.

  8. Access Control Mechanisms for Semantic Web services-A Discussion on Requirements & Future Directions

    Gondara, Mandeep Kaur

    2011-01-01

    Semantic Web is an open, distributed, and dynamic environment where access to resources cannot be controlled in a safe manner unless the access decision takes into account during discovery of web services. Security becomes the crucial factor for the adoption of the semantic based web services. An access control means that the users must fulfill certain conditions in order to gain access over web services. Access control is important in both perspectives i.e. legal and security point of view. This paper discusses important requirements for effective access control in semantic web services which have been extracted from the literature surveyed. I have also discussed open research issues in this context, focusing on access control policies and models in this paper.

  9. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  10. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  11. Residential Noise Control Requirements for Powerline Communications Channel

    Guillen, Edward; Lopez, Julian; Padilla, Daniel

    2010-01-01

    Noises on powerline communication channels such as coloured noise, narrow band noise, periodic impulsive noise and asynchronous impulsive noise affect PLC network throughput. However, these noises can be successfully controlled by band-pass and bandstop filters installed on strategic PLC network connection points. It's necessary to establish a model to probe if the noise measurements on this work can be applied on industrial environments and if the noise can affect PLC networks installed on n...

  12. Introduction to Command, Control, and Communications: a primer

    Eidson, Edward H.

    1995-01-01

    This thesis is a primer for students in the Introduction to Command, Control, and Communications Courses at the Naval Postgraduate School. This document provide students a consolidated reference that emphasizes key concepts and ideas presented by the course instructor and required readings. Its organization closely parallels the course outline used for in-class instruction. It supports course objectives by providing an executive overview of a wide variety of C2 topics. These topics include: C...

  13. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  14. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  15. Gender, sex and sexuality in two open access communication journals published in Portugal: a critical overview of current discursive practices

    Pinto-Coelho, Zara; Mota-Ribeiro, Silvana

    2016-01-01

    The links between gender, sex and sexuality and their relevance are theoretically and politically problematic (Richardson, 2007). One of the difficulties in understanding their interconnections is that these terms are often used differently and ambiguously by different authors (and even by the same authors). This article reports the results of an analysis of the articles published in open access communication journals with known impact factor, edited in Portugal and publishe...

  16. VCSEL-based gigabit IR-UWB link for converged communication and sensing applications in optical metro-access networks

    Pham, Tien Thang; Gibbon, Timothy Braidwood; Tafur Monroy, Idelfonso

    2012-01-01

    We report on experimental demonstration of an impulse radio ultrawideband (IR-UWB) based converged communication and sensing system. A 1550-nm VCSEL-generated IR-UWB signal is used for 2-Gbps wireless data distribution over 800-m and 50-km single mode fiber links which present short-range in...... sensing application, paving the way forward for the development and deployment of converged UWB VCSEL-based technologies in access and in-building networks of the future....

  17. Collaboration Policies: Access Control Management in Decentralized Heterogeneous Workflows

    Mine Altunay

    2006-07-01

    Full Text Available Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the service oriented framework, provide the necessary tools to harness services in order to tackle complicated problems. As a result, a service is no longer exposed to a small pre-determined homogeneous pool of users; instead it has a large, undefined, and heterogeneous pool of users. This paradigm shift in computing results in increased service exposure. The interactions among the services of a workflow must be carefully evaluated against the security risks associated with them. Classical security problems, such as delegation of rights, conflict of interest, and access control in general, become more complicated due to multiple autonomous security domains and the absence of pre- established trust relationships among the domains. Our work tackles these problems in two aspects: it provides a service owner with the necessary means to express and evaluate its trust requirements from a workflow (collaboration policies, and it incorporates these trust requirements into the workflow-planning framework (workflow authorization framework. Our policy-based framework allows bilateral peer-level trust evaluations that are based on each peer’s collaboration policies, and incorporates the outcome of these evaluations into the workflow planning logic. As a result, our work provides the necessary tools for promoting multi-party ad-hoc collaborations, and aims to reduce the reluctance and hesitation towards these collaborations by attacking the security risks associated with them.

  18. Concurrency control and recovery on lightweight directory access protocol

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  19. Communication Security for Control Systems in Smart Grid

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  20. Security Encryption Scheme for Communication of Web Based Control Systems

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  1. Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Adebukola Onashoga

    2014-02-01

    Full Text Available Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as it relates to access control, a Role based Examination System (RBES was designed, developed and evaluated. RBES attempted to solve the security issue by the combination of two authentication techniques: text-based authentication and graphical password authentication. The Text-based authentication utilizes two text-based parameters namely the username and password. The graphical password authentication makes use of a finite set of controls (RBES chooses radio buttons which are identified by numbers. These numbers constitute the password used for graphical authentication. To improve on resource sharing among users in the examination system, RBES proposes role management (role creation, role update, role removal and user management (user creation, user update and user removal. The developed system made use of asp.net, C#, IIS server, WAMP server, Mysql and other tools for its development. RBES was tested by some legitimate and illegitimate users and the performance of the system was found to be satisfactory, hence RBES shows an efficient and reliable scheme that can be deployed in any examination or e-learning system. Finally the potential threats to the system were modeled and the use of weak passwords was found to be the most likely threat the system could be vulnerable to.

  2. Enhanced Communication Network Solution for Positive Train Control Implementation

    Fatehi, M. T.; Simon, J.; Chang, W.; Chow, E. T.; Burleigh, S. C.

    2011-01-01

    The commuter and freight railroad industry is required to implement Positive Train Control (PTC) by 2015 (2012 for Metrolink), a challenging network communications problem. This paper will discuss present technologies developed by the National Aeronautics and Space Administration (NASA) to overcome comparable communication challenges encountered in deep space mission operations. PTC will be based on a new cellular wireless packet Internet Protocol (IP) network. However, ensuring reliability in such a network is difficult due to the "dead zones" and transient disruptions we commonly experience when we lose calls in commercial cellular networks. These disruptions make it difficult to meet PTC s stringent reliability (99.999%) and safety requirements, deployment deadlines, and budget. This paper proposes innovative solutions based on space-proven technologies that would help meet these challenges: (1) Delay Tolerant Networking (DTN) technology, designed for use in resource-constrained, embedded systems and currently in use on the International Space Station, enables reliable communication over networks in which timely data acknowledgments might not be possible due to transient link outages. (2) Policy-Based Management (PBM) provides dynamic management capabilities, allowing vital data to be exchanged selectively (with priority) by utilizing alternative communication resources. The resulting network may help railroads implement PTC faster, cheaper, and more reliably.

  3. Display For Command, Control, Communication and Intelligence System

    S. Prabhu

    1998-04-01

    Full Text Available Display subsystem is an important part of command, control, communication and intelligence(C31 system. The display used in C31 system for air defence should provide a panoramic view of thecomplete air segment under its command and control in real-time. The necessary information requiredfor taking a quick decision should be available to the commander in easily understandable graphicformat This paper describes salient features of the display known as synthetic radar situation display(SRSD developed by the Defence Electronics Research Laboratory (DLRL, Hyderabad, for such applications

  4. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  5. A 4D-Role Based Access Control Model for Multitenancy Cloud Platform

    Jiangfeng Li; Zhenyu Liao; Chenxi Zhang; Yang Shi

    2016-01-01

    Since more and more applications and services have been transferred from servers in the B/S architecture to cloud, user access control has become a significant part in a multitenancy cloud platform. Role based access control model makes users participate in an enterprise system as particular identities. However, in a multitenancy cloud environment, it has a high probability that the information of tenants has been leaked by using existing role based access control (RBAC) model. Moreover, mana...

  6. NASA Unmanned Aircraft (UA) Control and Non-Payload Communication (CNPC) System Waveform Trade Studies

    Chavez, Carlos; Hammel, Bruce; Hammel, Allan; Moore, John R.

    2014-01-01

    Unmanned Aircraft Systems (UAS) represent a new capability that will provide a variety of services in the government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized due to the lack of a common understanding of what is required to safely operate UAS in the National Airspace System (NAS). To address this deficiency, NASA has established a project called UAS Integration in the NAS (UAS in the NAS), under the Integrated Systems Research Program (ISRP) of the Aeronautics Research Mission Directorate (ARMD). This project provides an opportunity to transition concepts, technology, algorithms, and knowledge to the Federal Aviation Administration (FAA) and other stakeholders to help them define the requirements, regulations, and issues for routine UAS access to the NAS. The safe, routine, and efficient integration of UAS into the NAS requires new radio frequency (RF) spectrum allocations and a new data communications system which is both secure and scalable with increasing UAS traffic without adversely impacting the Air Traffic Control (ATC) communication system. These data communications, referred to as Control and Non-Payload Communications (CNPC), whose purpose is to exchange information between the unmanned aircraft and the ground control station to ensure safe, reliable, and effective unmanned aircraft flight operation. A Communications Subproject within the UAS in the NAS Project has been established to address issues related to CNPC development, certification and fielding. The focus of the Communications Subproject is on validating and allocating new RF spectrum and data link communications to enable civil UAS integration into the NAS. The goal is to validate secure, robust data links within the allocated frequency spectrum for UAS. A vision, architectural concepts, and seed requirements for the future commercial UAS CNPC system have been developed by RTCA Special Committee 203 (SC-203) in the process

  7. Communications and control for electric power systems: Final report

    Kirkham, H.

    1998-04-01

    This report is a summary of some of the work done on the Communications and Control project, with particular emphasis on the achievements during the years 1986--1996. During those years, the project moved away from concern with dispersed storage and generation and its impact on power system operation (the team was responsible for studies in this area, and for making a power system simulator that included DSG), and became involved in more concrete work aimed at applying high-tech solutions to problems of power system communications and control. This report covers work done at JPL on the following topics: (1) the measurement of electric and magnetic fields, both ac and dc; (2) the use of optical power to supply low-power electronics; (3) the design of a fault-tolerant communication system designed for distribution automation; and (4) a digital phase locked loop that allows the use of low-power transmitting electronics to recreate a good-quality signal at the receiver. In a report of this kind, only the results and highlights of the work are described.

  8. THE COMMUNICATION OF INTERNAL CONTROL SYSTEM WEAKNESSES - NECESSITY AND RESPONSIBILITY

    Mariana, NEDELCU (BUNEA

    2014-11-01

    Full Text Available In terms of its mission, the control is an inherent part of management, being a specifically human activity, especially useful serving both the management, business partners, public institutions and public. Especially in the last period, amid the economic and financial crisis manifested in recent years, the control has evolved and evolving both by the improvement of organization and management systems and by the response to continuous development of the environment in which it operates. The control activities are an integral part of the management process by which the entity aims to achieve their objectives. The research methodology consists essentially in a literature review and recent regulations in the analyzed field.The objective of this study is to highlight the way in which shall be communicated the deficiencies of internal control systems, to the persons responsible for their governance, inclusively in the banking system.

  9. Enhancing risk communication for more effective epidemic control in Taiwan.

    Ou, Shih-Ming; Liu, Li-Ling; Chin, Ko-Chien

    2014-01-01

    This article investigates how to more effectively conduct risk communication to increase the probability of successful control of an epidemic in Taiwan. The epidemic control of H1N1 in Taiwan in 2010 was studied. We used factor analysis and Decision-Making Trial and Evaluation Laboratory (DEMATEL) to obtain the total influence for each factor and to determine the critical factors among them. After being processed using proposed operational procedures, we obtained the critical factors and found that the government plays the key role in successful epidemic control. To reduce the resistance to efforts that seek to prevent pandemic crises, some necessary intervention activities, such as fairly and honorably exploring the complete relevant information and revealing the side effects of vaccines in a manner that is easily understood, were recommended. These could lead to an increase in immunizations among Taiwanese people by gaining their trust and commitment, thus achieving control of this epidemic. PMID:23239748

  10. Broadband passive optical network media access control protocols

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  11. An integrated command control and communications center for first responders

    Messner, Richard A.; Hludik, Frank; Vidacic, Dragan; Melnyk, Pavlo

    2005-05-01

    First responders to a major incident include many different agencies. These may include law enforcement officers, multiple fire departments, paramedics, HAZMAT response teams, and possibly even federal personnel such as FBI and FEMA. Often times multiple jurisdictions respond to the incident which causes interoperability issues with respect to communication and dissemination of time critical information. Accurate information from all responding sources needs to be rapidly collected and made available to the current on site responders as well as the follow-on responders who may just be arriving on scene. The creation of a common central database with a simple easy to use interface that is dynamically updated in real time would allow prompt and efficient information distribution between different jurisdictions. Such a system is paramount to the success of any response to a major incident. First responders typically arrive in mobile vehicles that are equipped with communications equipment. Although the first responders may make reports back to their specific home based command centers, the details of those reports are not typically available to other first responders who are not a part of that agencies infrastructure. Furthermore, the collection of information often occurs outside of the first responder vehicle and the details of the scene are normally either radioed from the field or written down and then disseminated after significant delay. Since first responders are not usually on the same communications channels, and the fact that there is normally a considerable amount of confusion during the first few hours on scene, it would be beneficial if there were a centralized location for the repository of time critical information which could be accessed by all the first responders in a common fashion without having to redesign or add significantly to each first responders hardware/software systems. Each first responder would then be able to provide information

  12. Role-based access control through on-demand classification of electronic health record.

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  13. Fundamentals of Medium Access Control Design for Millimeter Wave Networks

    Shokri, Hossein

    2015-01-01

    In current wireless communication systems, demands for extremely high data rates, along with spectrum scarcity at the microwave bands, make the millimeter wave (mmWave) band very appealing to provide these extremely high data rates even for a massive number of wireless devices. MmWave communications exhibit severe attenuation, vulnerability to obstacles (called blockage), and sparse-scattering environments. Moreover, mmWave signals have small wavelengths that allow the incorporation of many a...

  14. Designing a Secure E-commerce with Credential Purpose-based Access Control

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  15. Task-and-role-based access-control model for computational grid

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  16. Wi-Fi Networks Security and Accessing Control

    Tarek S. Sobh

    2013-06-01

    Full Text Available As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

  17. An access control architecture for metropolitan area wireless networks

    Friday, Adrian; Wu, Maomao; Schmid, Stefan; Finney, Joseph; Cheverst, Keith; Davies, Nigel

    2001-01-01

    This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale areas. In addition, once deployed, this network will allow ordinary citizens secure, accountable and convenient access to the Internet from their local city and campus environments. The proposed architecture is based on an approach utilising a modified Mobile IPv6 protocol stack that uses packet marking and network leve...

  18. Communication Apprehension. Focused Access to Selected Topics (FAST) Bibliography No. 15.

    Shermis, Michael

    This annotated bibliography contains 31 references of articles and papers in the ERIC database that deal with communication apprehension (CA). The first section provides strategies for instructors and students to alleviate communication apprehension, speech anxiety, stage fright, and other problems people have with public speaking. The second…

  19. Containment control of multi-agent systems with unbounded communication delays

    Shen, Jun; Lam, James

    2016-07-01

    In this paper, we address the containment control problem for multi-agent systems under heterogeneous unbounded communication delays with emphasis on the convergence rate analysis. Different from most works on multi-agent systems, we resort to a viewpoint from the area of positive delay systems. We first cast the containment control problem into the stability analysis of an associated error system. In order to capture the convergence rate, we introduce a nondecreasing positive function whose reciprocal represents the decay rate of the associated error system. Under the assumption that each follower has access to at least one leader and some mild hypotheses on the communication delays, an explicit condition is given to characterise the decay rate of the associated error system in terms of linear programming. In addition, we provide several special cases when the communication delays are restricted by linear, sublinear and logarithmic growth rates, respectively. Finally, through numerical examples, it is shown that the convergence rate is dominated by the delays being the highest order infinitely large quantity.

  20. Decentralized supervisory control with communicating supervisors based on top-down coordination control

    Komenda, Jan; Masopust, Tomáš

    Los Angeles : IEEE, 2014, s. 5149-5155. ISBN 978-1-4673-6088-3. - (Catalog Number: CFP14CDC-CDR). [The 53rd IEEE Conference on Decision and Control (CDC 2014). Los Angeles (US), 15.12.2014-17.12.2014] R&D Projects: GA MŠk LH13012 Institutional support: RVO:67985840 Keywords : supervisory control * decentralized control with communication * coordination control Subject RIV: BA - General Mathematics http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7040194

  1. Remote Access to Wireless Communications Systems Laboratory--New Technology Approach

    Kafadarova, Nadezhda; Sotirov, Sotir; Milev, Mihail

    2012-01-01

    Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable students to use expensive laboratory equipment, which is not usually available to students. In…

  2. An effective access control approach to support mobility in IPv6 networks

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  3. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a

  4. On the Decidability of the Safety Problem for Access Control Policies

    Kleiner, Eldar; Newcomb, Tom

    2006-01-01

    An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is not obvious via human inspection; there is, therefore, a need for automated verification techniques that can check whether a policy does indeed implement some desired security requirement. Thirty years ago, a formalisation of access control presented a model and a safety specification for which satisfaction is undecida...

  5. Improving the communication and control of operational risk profiles

    Eliesen, Anders

    2012-01-01

    This thesis takes a hard look on the present techniques and methods that are used for communicating and controlling risk profile to find improvements. The popular term “risk appetite” is dismissed and replaced with a new concept; RiskPAT. RiskPAT is a tool that is based on the principle to help an organization gain benefits by making it state three values; risk preference, risk acceptance and risk tolerance. By stating a risk of preference and its allowed volatility (respectively, risk pre...

  6. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  7. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class...... Barring solution. We then provide a brief overview of the Load Control solutions provided by the Enhanced Packet Core (EPC) Network and how they intertwine with the Extended Access Barring at the Enhanced Universal Terrestrial Radio Access Network (E-UTRAN). We also provide an outlook on the current 3GPP...... efforts in regards to MTC related load control issues....

  8. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  9. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  10. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-11-30

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13, 2012... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security...

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-07-22

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security...

  12. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-10-23

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15, 2012... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security...

  13. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-03-18

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from 9... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security...

  14. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  15. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  16. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-09-11

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28, 2012... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security...

  17. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  18. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-04-12

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10, 2013... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security...

  19. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    2010-01-26

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... market access to customers or other persons, to implement risk management controls and supervisory.... 40354 (August 24, 1998), 63 FR 46264 (August 31, 1998) (NASD NTM-98-66). Certain market participants...

  20. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Rulemaking Proceeding The Digital Millennium Copyright Act, Public Law 105-304 (1998), amended title 17...

  1. Multi-Gigabits Millimetre Wave Wireless Communications for 5G: From Fixed Access to Cellular Networks

    Wang, Peng; Li, Yonghui; Song, Lingyang; Vucetic, Branka

    2014-01-01

    With the formidable growth of various booming wireless communication services that require ever-increasing data throughputs, the conventional microwave band below 10 GHz, which is currently used by almost all mobile communication systems, is going to reach its saturation point within just a few years. Therefore, the attention of radio system designers has been pushed towards ever-higher segments of the frequency spectrum in a quest for capacity increase. In this article, we investigate the fe...

  2. Modeling the Impact of Communication Loss on the Power Grid under Emergency Control

    Parandehgheibi, Marzieh; Turitsyn, Konstantin; Modiano, Eytan

    2015-01-01

    We study the interaction between the power grid and the communication network used for its control. We design a centralized emergency control scheme under both full and partial communication support, to improve the performance of the power grid. We use our emergency control scheme to model the impact of communication loss on the grid. We show that unlike previous models used in the literature, the loss of communication does not necessarily lead to the failure of the correspondent power nodes;...

  3. A dynamic access control method based on QoS requirement

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  4. The Study of Access Control for Service-Oriented Computing in Internet of Things

    Guoping Zhang

    2012-06-01

    Full Text Available In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC, and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  5. Access to communication technologies in a sample of cancer patients: an urban and rural survey

    Perkins Anthony; Butler Donna; Kroenke Kurt; Theobald Dale E; Abdullah Ma'n; Edgerton Sara; Dugan William M

    2005-01-01

    Abstract Background There is a growing awareness among providers of the symptom burden experienced by cancer patients. Systematic symptom screening is difficult. Our plan was to evaluate a technology-based symptom screening process using touch-tone telephone and Internet in our rural outreach cancer program in Indiana. Would rural patients have adequate access to technologies for home-based symptom reporting? Objectives 1) To determine access to touch-tone telephone service and Internet for p...

  6. Open Access, Open Data: Paradigm Shifts in the Changing Scholarly Communication Scenario

    Giglia, Elena

    2011-01-01

    The Open Access Open Data conference was held December 13 -14, 2010 in Cologne, Germany. The purpose of the conference was to examine the development of the Open Access movement during the last five years, how it is expected to change within the next five to ten years, and to further investigate the "Open Data Movement" that is rapidly growing in international importance. This report discusses some of the key ideas that emerged from the workshop discussion and debate.

  7. Remote Control for Robotic Systems Using CORBA as Communication Architecture

    2002-01-01

    This paper proposes a novel method to implement network connections among a client and remoterobotic systems using CORBA for developing telecare system to aid the aged or disabled. The proposed methodmakes system have low cost and wide availability, high scaling and inter-operating ability to allow the clients andserver objects, written in different languages, run in different operating system, and connected in different net-work to inter-operate. It also makes system easy to be extended and integrated with the other technologies andapplications distributed over the Internet. Using CORBA as a communication architecture, we developed hard-ware base, task-level robot arm control server, live image feedback server and mobile robot control server,which can provide some basic care services to aid the aged and disabled.

  8. Man-machine communication in reactor control using AI methods

    In the last years the interest in process control has expecially focused on problems of man-machine communication. It depends on its great importance to process performance and user acceptance. Advanced computerized operator aids, e.g. in nuclear power plants, are as well as their man-machine interface. In the Central Institute for Nuclear Research in Rossendorf a computerized operator support system for nuclear power plants is designed, which is involved in a decentralized process automation system. A similar but simpler system, the Hierarchical Informational System (HIS) at the Rossendorf Research Reactor, works with a computer controlled man-machine interface, based on menu. In the special case of the disturbance analysis program SAAP-2, which is included in the HIS, the limits of menu techniques are obviously. Therefore it seems to be necessary and with extended hard- and software possible to realize an user controlled natural language interface using Artificial Intelligence (AI) methods. The draft of such a system is described. It should be able to learn during a teaching phase all phrases and their meanings. The system will work on the basis of a self-organizing, associative data structure. It is used to recognize a great amount of words which are used in language analysis. Error recognition and, if possible, correction is done by means of a distance function in the word set. Language analysis should be carried out with a simplified word class controlled functional analysis. With this interface it is supposed to get experience in intelligent man-machine communication to enhance operational safety in future. (author)

  9. Access to the ophthalmic artery by retrograde approach through the posterior communicating artery for intra-arterial chemotherapy of retinoblastoma

    Pham, Chi-Tuan; Blanc, Raphael; Pistocchi, Silvia; Bartolini, Bruno; Piotin, Michel [Fondation Rothschild Hospital, Department of Interventional Neuroradiology, Paris (France); Lumbroso-Le Rouic, Livia [Institut Curie, Department of Ocular Oncology, Paris (France)

    2012-08-15

    Intra-arterial infusion of chemotherapy into the ophthalmic artery for treatment of retinoblastoma has been realized after catheterization of the internal carotid and temporary balloon occlusion beyond the orifice of the ophthalmic artery, or more recently after superselective canulation of the ophthalmic artery by a microcatheter. The superselective catheterization of the ophthalmic artery could be cumbersome because of the implantation of the ostium on the carotid siphon or because of the tortuosity of the carotid siphon. We report our experience of using a retrograde approach through the posterior communicating artery that allows a more direct angle of access to the origin of the ophthalmic artery. (orig.)

  10. Access to the ophthalmic artery by retrograde approach through the posterior communicating artery for intra-arterial chemotherapy of retinoblastoma

    Intra-arterial infusion of chemotherapy into the ophthalmic artery for treatment of retinoblastoma has been realized after catheterization of the internal carotid and temporary balloon occlusion beyond the orifice of the ophthalmic artery, or more recently after superselective canulation of the ophthalmic artery by a microcatheter. The superselective catheterization of the ophthalmic artery could be cumbersome because of the implantation of the ostium on the carotid siphon or because of the tortuosity of the carotid siphon. We report our experience of using a retrograde approach through the posterior communicating artery that allows a more direct angle of access to the origin of the ophthalmic artery. (orig.)

  11. HIERARCHICAL ACCESS CONTROL IN DYNAMIC PEER GROUPS USING SYMMETRIC POLYNOMIAL AND TREE BASED GROUP ELLIPTIC CURVE DIFFIE HELLMAN SCHEME

    Nafeesa Begum Jeddy

    2014-01-01

    Full Text Available Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inherently has hierarchical structures for functioning, where providing security by efficient group key management is a big challenging issue. While preserving centralized methods for hierarchical access control, it is difficult to achieve efficiency as a single membership change will result in lot of changes which are difficult to maintain. So, using distributed key agreement techniques is more appropriate for this scenario. This study explore on novel group key agreement approach, which combines both the symmetric polynomial scheme and Tree Based Group elliptic Curve key exchange. Also, it yields a secure protocol suite that is good in fault-tolerant and simple. The efficiency of SP-TGECDH is better than many other schemes. Using TGECDH makes the scheme suitable small Low powered devices.

  12. Advanced Data Communications for Downhole Data Logging and Control Applications in the Oil Industry

    We present details of 'Mercury', a high-speed downhole communications system that utilizes the (metallic) wall of a gas or oil pipeline or a drill 'string' as the communications 'channel' to control or monitor equipment or sensors used in the oil industry. Conventional downhole communication systems typically use 'mud pulse' telemetry for 'Measurement While Drilling' (MWD) operations. Current mud pulse telemetry technology offers bandwidths of up to 40 bit/s. However the data rate drops with increasing length of the wellbore and is typically as low as 1.5 bit/s – 3.0 bit/s at a depth of 35,000 ft. – 40,000 ft. The system described, by contrast, offers data rates of several megabits per second over distances of many kilometres and uses Orthogonal Frequency Division Multiplexing (OFDM) coupled with Wideband Frequency Division Multiple Access (W-CDMA). This paper presents details of our system; results of several trials undertaken on actual gas pipelines in the UK will be presented at the Conference

  13. Dependability analysis of the data communication system in train control system

    XU TanHua; TANG Tao; GAO ChunHai; CAI BaiGen

    2009-01-01

    Communication based train control (CBTC) system is based on mobile communication and overcomes fixed blocks in order to increase track utilization and train safety. The data communication system (DCS) between trains and wayside equipment is a crucial factor for the safe and efficient operation of CBTC system. The dependability under various transmission conditions needs to be modeled and evaluated. In this paper, a stochastic reward net (SRN) model for DCS based IEEE 802.11 standard was developed, which captures all relevant failure and failure recovery behavior system aspects in a concise way. We compared the reliability, availability for DCS with and without access point (AP) and antenna redundant configuration. We also quantitatively evaluated and compared the frame loss probability for three DCS configurations with different train velocities and train numbers in one radio cell. Fixed-point iteration was adopted to simplify the analysis. Numerical results showed the significant improvement of the reliability, availability and the frame loss probability index for the full redundant configuration.

  14. Dependability analysis of the data communication system in train control system

    2009-01-01

    Communication based train control (CBTC) system is based on mobile communication and overcomes fixed blocks in order to increase track utilization and train safety. The data communication system (DCS) between trains and wayside equipment is a crucial factor for the safe and efficient operation of CBTC system. The dependability under various transmission conditions needs to be modeled and evaluated. In this paper,a stochastic reward net (SRN) model for DCS based IEEE 802.11 standard was developed,which captures all relevant failure and failure recovery behavior system aspects in a concise way. We compared the reliability,availability for DCS with and without access point (AP) and antenna redundant configuration. We also quantitatively evaluated and compared the frame loss probability for three DCS configurations with different train velocities and train numbers in one radio cell. Fixed-point iteration was adopted to simplify the analysis. Numerical results showed the significant improvement of the reliability,availability and the frame loss probability index for the full redundant configuration.

  15. Role mining in business taming role-based access control administration

    Colantonio, Alessandro; Ocello, Alberto

    2012-01-01

    With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) - a policy-neutral access control model that serves as a bridge between academia and industry - is probably the most suitable security model for commercial applications. Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of a

  16. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  17. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  18. A General Attribute and Rule Based Role-Based Access Control Model

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  19. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    Mahmood Rajpoot, Qasim

    Use of video surveillance has significantly increased in the last few decades. Modern video surveillance systems are equipped with techniques that automatically extract information about the objects and events from the video streams and allow traversal of data in an effective and efficient manner...... that is suitable for video surveillance systems as well as other domains sharing similar requirements. As the currently dominant access control models – the role-based access control (RBAC) and the attribute-based access control (ABAC) – suffer from limitations while offering features complementary to each other......, their integration has become an important area of research. Our access control model combines the two models in a novel way in order to unify their benefits while avoiding their limitations. Our approach provides a mechanism that not only takes information about the current circumstances into account during access...

  20. Improvement The Transmission Efficiency For Wireless Packet Communication Systems Using Automatic Control for power And Time Slot Width Of Slotted Non persistent ISMA Protocol

    Saad Meshhen Hardan

    2013-01-01

    In packed communication systems which use a protocol, the protocol should perform the allocation of channels such that the transmission channel is used efficiently. Efficiency is usually measured in terms of channel throughput and the average transmission  delay. The Slotted Nonpersistent ISMA protocol is one of random access protocols used in packed communication systems. In this research a Slotted Nonpersistent ISMA protocol Model with automatic control for power and time slot is proposed. ...

  1. Secure Remote Access Issues in a Control Center Environment

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  2. An entity access control model for network services management

    Dias, Bruno

    2005-01-01

    The Network Services Management Framework tries to overcome the most important limitations of present network management frameworks, namely the most widely supported framework – the Internet Network Management Framework – by defining a management framework using a network services management distributed architecture that provides services management functions with any desired level of functionality. This document introduces one of the most important parts of this framework, the Entity Access ...

  3. Workflow management systems, their security and access control mechanisms

    Chehrazi, Golriz

    2007-01-01

    This paper gives an overview of workflow management systems (WfMSs) and their security requirements with focus on access mechanisms. It is a descriptive paper in which we examine the state of the art of workflow systems, describe what security risks affect WfMSs in particular, and how these can be diminiuished. WfMSs manage, illustrate and support business processes. They contribute to the performance, automation and optimization of processes, which is important in the global economy today. ...

  4. A View-Based Access Control Model for SPARQL

    Gabillon, Alban; Letouzey, Léo

    2010-01-01

    Existing security models for RDF use RDF patterns for defining the security policy. This approach leads to a number of security rules which rapidly tends to be unmanageable. In this paper we define a new security model which follows the traditional approach of creating security views, which has long been used by SQL database administrators. Our model first logically distributes RDF data into SPARQL views and then it defines security rules regulating SPARQL access to views. Moreover our model ...

  5. Open access and the future of scholarly communication policy and infrastructure

    Smith, Kevin L

    2016-01-01

    It is impossible to imagine the future of academic libraries without an extensive consideration of open access the removal of price and permission barriers from scholarly research online. As textbook and journal subscription prices continue to rise, improvements in technology make online dissemination of scholarship less expensive, and faculty recognize the practical and philosophical appeal of making their work available to wider audiences. As a consequences, libraries have begun to consider a wide variety of open access flavors and business models. These new possibilities have significant impact on both library services and collection policies, and the call for new skills within library staffing. Volume 9 of the series Creating the 21st-Century Academic Library is the first of two addressing the topic of open access in academic libraries and focuses on policy and infrastructure for libraries that wish to provide leadership on their campus in the transition to more open forms of scholarship. Chapters in the ...

  6. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  7. The Crisis in Scholarly Communication, Open Access, and Open Data Policies: The Libraries' Perspective

    Besara, Rachel

    2015-03-01

    For years the cost of STEM databases have exceeded the rate of inflation. Libraries have reallocated funds for years to continue to provide support to their scientific communities, but they are reaching a point at many institutions where they are no longer able to provide access to many databases considered standard to support research. A possible or partial alleviation to this problem is the federal open access mandate. However, this shift challenges the current model of publishing and data management in the sciences. This talk will discuss these topics from the perspective of research libraries supporting physics and the STEM disciplines.

  8. Communicating with limited English proficiency (LEP) patients: question of health-care access.

    Murphy, Stephen

    2004-01-01

    In the United States, the ability to understand English plays an essential role in how well patients and health-care providers communicate. This article highlights the concerns of providers, differential health-care outcomes, and risk management concerns of providing health care in an increasingly diverse and polyglot population. PMID:15500018

  9. Institutional Repositories and Open Access Initiatives in Bangladesh: A New Paradigm of Scholarly Communication

    Md. Anwarul Islam

    2013-06-01

    Full Text Available Nowadays, open access (OA in its diverse forms constitutes the most interesting and promising model for the research output of an academic or research institution. The purpose of the present study is to discuss the situation of OA in the developing world, with a focus on Bangladesh. The study also addresses why OA is important for developing countries and which initiatives have been taken in Bangladesh. Finally, we discuss some challenging issues of OA and suggestions on how to overcome these issues. It is rather obvious that developing countries have always faced a lack of research information and were unable to afford sufficient subscriptions to journals. The other side of the picture is the poor dissemination of the research outcome in the developing world. In Bangladesh, only three organizations have their institutional repository and have a reasonable number of local OA journals. We will identify some problems that impede the process of building open access IR, or more generally an OA environment in Bangladesh. We are convinced, however, that we will witness in the near future a sustainable growth of open access initiatives, with more open access literature and digital repositories.

  10. A Novel Robust Communication Algorithm for Distributed Secondary Control of Islanded MicroGrids

    Shafiee, Qobad; Dragicevic, Tomislav; Vasquez, Juan Carlos; Josep M. Guerrero; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    Distributed secondary control (DSC) is a new approach for MicroGrids (MGs) such that frequency, voltage and power regulation is made in each unit locally to avoid using a central controller. Due to the constrained traffic pattern required by the secondary control, it is viable to implement dedicated local area communication functionality among the local controllers. This paper presents a new, wireless-based robust communication algorithm for DSC of MGs designed to avoid communication bottlene...

  11. An Access Control Metamodel for Web Service-Oriented Architecture

    Emig, Christian; Brandt, Frank; Abeck, Sebastian; Biermann, Jürgen; Klarl, Heiko

    2008-01-01

    With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web service-oriented architecture (WSOA) has been established. Considering the momentum observable by the growing number of specifications in the web service domain for the indispensable cross-cutting concern of identity management (IdM) it is still an open issue how a WSOA-aware IdM architecture is built and how it is link...

  12. Demand management through centralized control system using power line communication for existing buildings

    Highlights: • A pilot system was developed for demand management of equipment in buildings. • The networking was based on LonWorks platform and power line communication. • Demand strategies led to load reductions up to 74% and energy savings up to 25%. • The peak load reduction is expected to reach 3.44 GW by the year 2030. - Abstract: Managing peak demand efficiently is vital for maintaining uninterrupted supply of electrical power by utility providers. In this work, a pilot system was developed for managing and controlling the demand of major power consuming equipment in buildings from a central server, while relying mostly on existing infrastructure and maintaining consumer comfort. The system was successfully demonstrated on a selected group of buildings using the LonWorks networking platform. At the building level, the system utilized power line and twisted pair communication to control the thermostats of air-conditioning (A/C) units. The higher level communication was executed through extensible markup language (XML) and simple object access protocol (SOAP). The system provided control capabilities based on A/C unit priority, thermostat temperature, building type and geographic location. The development and execution of demand management strategies for selected buildings led to peak load reductions up to 74%, in addition to energy savings up to 25%. Implementing such a system at a national level in Kuwait is estimated to reduce peak demand by 3.44 GW, amounting to capital savings of $4.13 billion. The use of existing infrastructure reduced the cost and installation time of the system. Based on the successful testing of this pilot system, a larger-scale system is being developed

  13. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Abdul Razaque

    2014-03-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2 and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC, advertisement-based MAC (A-MAC, Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC, and low-power real-time medium access control (LPR-MAC. The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  14. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Razaque, Abdul; Elleithy, Khaled M

    2014-01-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  15. Assessment of current practices in creating and using passwords as a control mechanism for information access

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  16. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  17. A Semantic Context-Based Model for MobileWeb Services Access Control

    Haibo Shen

    2011-02-01

    Full Text Available As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic context-based access control model (called SCBAC to be applied in mobile web services environment by combining semantic web technologies with context-based access control mechanism. The proposed model is a context-centric access control solutions, context is the first-class principle that explicitly guides both policy specification and enforcement process. In order to handle context information in the model, this paper proposes a context ontology to represent contextual information and employ it in the inference engine. As well as, this paper specifies access control policies as rules over ontologies representing the concepts introduced in the SCBAC model, and uses semantic web rule language (SWRL to form policy rule and infer those rules by JESS inference engine. The proposed model can also be applied to context-aware applications.

  18. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  19. Inter-Vehicle Communication System Utilizing Autonomous Distributed Transmit Power Control

    Hamada, Yuji; Sawa, Yoshitsugu; Goto, Yukio; Kumazawa, Hiroyuki

    In ad-hoc network such as inter-vehicle communication (IVC) system, safety applications that vehicles broadcast the information such as car velocity, position and so on periodically are considered. In these applications, if there are many vehicles broadcast data in a communication area, congestion incurs a problem decreasing communication reliability. We propose autonomous distributed transmit power control method to keep high communication reliability. In this method, each vehicle controls its transmit power using feed back control. Furthermore, we design a communication protocol to realize the proposed method, and we evaluate the effectiveness of proposed method using computer simulation.

  20. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Bruce Ndibanje

    2014-08-01

    Full Text Available Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. According to our analysis, Jing et al.’s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  1. Technology and Development: Universalizing Access to and Protection of Information and Communication Technology

    Qerim Qerimi

    2012-01-01

    As many features of modern digital information and online communications are transcending and transforming the traditional modes of interaction and identity, so is transformed the need for addressing these new features in ways that conform to pertinent realities. A great deal of human events and experiences are likely to occur in ways different from those seen in the pre-digital era. Having witnessed a number of such events and experiences, the next stage is action and understanding. As the p...

  2. Building a Dynamic Spectrum Access Smart Radio With Application to Public Safety Disaster Communications

    Silvius, Mark D.

    2009-01-01

    Recent disasters, including the 9/11 terrorist attacks, Hurricane Katrina, the London subway bombings, and the California wildfires, have all highlighted the limitations of current mobile communication systems for public safety first responders. First, in a point-to-point configuration, legacy radio systems used by first responders from differing agencies are often made by competing manufacturers and may use incompatible waveforms or channels. In addition, first responder radio systems, whi...

  3. Efficient LTE Access with Collision Resolution for Massive M2M Communications

    Madueño, Germán Corrales; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    LTE random access procedure performs satisfactorily in case of asynchronous, uncorrelated traffic arrivals. However, when the arrivals are correlated and arrive synchronously, the performance of the random access channel (RACH) is drastically reduced, causing a large number of devices to experience...... outage. In this work we propose a LTE RACH scheme tailored for delay-sensitive M2M services with synchronous traffic arrivals. The key idea is, upon detection of a RACH overload, to apply a collision resolution algorithm based on splitting trees. The solution is implemented on top of the existing LTE...... preamble transmissions and delay of 1.2 seconds, under a realistic probability of transmissions error both in the downlink and in the uplink....

  4. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services. PMID:27240842

  5. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Bing Du; Jun Zhang

    2010-01-01

    A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC) model, a common compact model in hierarchical wireless sensor networks (WSNs). The scheme uses Low-Density Parity-Check (LDPC) as the ...

  6. Institutional Repositories and Open Access Initiatives in Bangladesh: A New Paradigm of Scholarly Communication

    2013-01-01

    Nowadays, open access (OA) in its diverse forms constitutes the most interesting and promising model for the research output of an academic or research institution. The purpose of the present study is to discuss the situation of OA in the developing world, with a focus on Bangladesh. The study also addresses why OA is important for developing countries and which initiatives have been taken in Bangladesh. Finally, we discuss some challenging issues of OA and suggestions on how to overcome thes...

  7. The Smart Card concept applied to access control

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described

  8. Purpose engineering for Contextual Role-Based Access Control (C-RBAC

    Muhammad Nabeel Tahir

    2008-09-01

    Full Text Available Distributed and ubiquitous computing environments have brought enormous efficiency to the collection, manipulation and distribution of information and services. Although this efficiency has revolutionized countless organizations but it has also increased the threats to individual’s privacy because the information stored within the collection of heterogeneous distributed components is sensitive and requires some form of access control. The way to protect privacy in this age of information technology requires such access control system that can accommodate organization requirements to protect privacy of individuals with ease in management and administration of resources. Among those requirements, purpose inference is one of the major problems as the total access control decision mainly relies on the user intentions/purposed. This work in this paper is an attempt to provide purpose engineering semantics that we use for the proposed contextual role-based access control model (C-RBAC in order to comply with HIPAA.

  9. Human engineering considerations in designing a computerized controlled access security system

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  10. Modelling and Analysing Access Control Policies in XACML 3.0

    Ramli, Carroline Dewi Puspa Kencana

    XACML (eXtensible Access Control Markup Language) is a prominent access control language that is widely adopted both in industry and academia. XACML is an international standard in the field of information security. The problem with XACML is that its specification is described in natural language...... (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0. The...... main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...

  11. Distributed communications and control network for robotic mining

    Schiffbauer, William H.

    1989-01-01

    The application of robotics to coal mining machines is one approach pursued to increase productivity while providing enhanced safety for the coal miner. Toward that end, a network composed of microcontrollers, computers, expert systems, real time operating systems, and a variety of program languages are being integrated that will act as the backbone for intelligent machine operation. Actual mining machines, including a few customized ones, have been given telerobotic semiautonomous capabilities by applying the described network. Control devices, intelligent sensors and computers onboard these machines are showing promise of achieving improved mining productivity and safety benefits. Current research using these machines involves navigation, multiple machine interaction, machine diagnostics, mineral detection, and graphical machine representation. Guidance sensors and systems employed include: sonar, laser rangers, gyroscopes, magnetometers, clinometers, and accelerometers. Information on the network of hardware/software and its implementation on mining machines are presented. Anticipated coal production operations using the network are discussed. A parallelism is also drawn between the direction of present day underground coal mining research to how the lunar soil (regolith) may be mined. A conceptual lunar mining operation that employs a distributed communication and control network is detailed.

  12. Interprocess communication within the DIII-D plasma control system

    The DIII-D tokamak fusion research experiment's real-time digital plasma control system (PCS) is a complex and ever evolving system. During a plasma experiment, it is tasked with some of the most crucial functions at DIII-D. Key responsibilities of the PCS involve sub-system control, data acquisition/storage, and user interface. To accomplish these functions, the PCS is broken down into individual components (both software and hardware), each capable of handling a specific duty set. Constant interaction between these components is necessary prior, during and after a standard plasma cycle. Complicating the matter even more is that some components, mostly those which deal with user interaction, may exist remotely, that is to say they are not part of the immediate hardware which makes up the bulk of the PCS. The four main objectives of this paper are to (1) present a brief outline of the PCS hardware/software and how they relate to each other; (2) present a brief overview of a standard DIII-D plasma cycle (a shot); (3) using three sets of PCS sub-systems, describe in more detail the communication processes; and (4) evaluate the benefits and drawbacks of said systems

  13. Online Verification of Control Parameter Calculations in Communication Based Train Control System

    Bu, Lei; Wang, Linzhang; Li, Xuandong

    2011-01-01

    Communication Based Train Control (CBTC) system is the state-of-the-art train control system. In a CBTC system, to guarantee the safety of train operation, trains communicate with each other intensively and adjust their control modes autonomously by computing critical control parameters, e.g. velocity range, according to the information they get. As the correctness of the control parameters generated are critical to the safety of the system, a method to verify these parameters is a strong desire in the area of train control system. In this paper, we present our ideas of how to model and verify the control parameter calculations in a CBTC system efficiently. - As the behavior of the system is highly nondeterministic, it is difficult to build and verify the complete behavior space model of the system online in advance. Thus, we propose to model the system according to the ongoing behavior model induced by the control parameters. - As the parameters are generated online and updated very quickly, the verification...

  14. The RFID smart card management application for the hotel access control

    Kreslin, Robert

    2011-01-01

    In this thesis we wanted to present the project that was made for a smaller hotel in Nova Gorica. The goal was to create an application for managing access control according to customer's wishes as well as to introduce the system into the existent infrastructure. The first step was to define what access control actually means. In broad terms it is divided into RFID – radio-frequency identification and biometric identification. Both have their strengths and their weaknesses. Next step was choo...

  15. ConXsense - Automated Context Classification for Context-Aware Access Control

    Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N.

    2013-01-01

    We present ConXsense, the first framework for context-aware access control on mobile devices based on context classification. Previous context-aware access control systems often require users to laboriously specify detailed policies or they rely on pre-defined policies not adequately reflecting the true preferences of users. We present the design and implementation of a context-aware framework that uses a probabilistic approach to overcome these deficiencies. The framework utilizes context se...

  16. Finding Security Bugs in Web Applications using a Catalog of Access Control Patterns

    Near, Joseph Paul; Jackson, Daniel

    2016-01-01

    We propose a specification-free technique for finding missing security checks in web applications using a catalog of access control patterns in which each pattern models a common access control use case. Our implementation, Space, checks that every data exposure allowed by an application's code matches an allowed exposure from a security pattern in our catalog. The only user-provided input is a mapping from application types to the types of the catalog; the rest of the process is entirely au...

  17. Grid-based access control for Unix environments, Filesystems and Web Sites

    McNab, A.

    2003-01-01

    The EU DataGrid has deployed a grid testbed at approximately 20 sites across Europe, with several hundred registered users. This paper describes authorisation systems produced by GridPP and currently used on the EU DataGrid Testbed, including local Unix pool accounts and fine-grained access control with Access Control Lists and Grid-aware filesystems, fileservers and web developement environments.

  18. A New Access Control Scheme for Facebook-style Social Networks

    Pang, Jun; Zhang, Yang

    2013-01-01

    The popularity of online social networks (OSNs) makes the protection of users' private information an important but scientifically challenging problem. In the literature, relationship-based access control schemes have been proposed to address this problem. However, with the dynamic developments of OSNs, we identify new access control requirements which cannot be fully captured by the current schemes. In this paper, we focus on public information in OSNs and treat it as a new dimension which u...

  19. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  20. The access control and radiation monitoring system for the Austin Hospital PET Centre

    A Positron Emission Tomography Centre is being established at the Austin Hospital, Melbourne. The cyclotron vault and hotcell laboratories have been categorized according to the National Council on Radiation Protection and Measurements guidelines for access control to radiation areas. An access control system incorporating visual alarm systems, signs, barriers and interlocks has been designed for the safe operation of the Centre. These features are briefly described. 6 refs., 1 fig

  1. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare

    Xuan Hung Le; Murad Khalid; Ravi Sankar; Sungyoung Lee

    2011-01-01

    Wireless sensor networks (WSNs) will play an active role in the 21th Century Healthcare IT to reduce the healthcare cost and improve the quality of care. The protection of data confidentiality and patient privacy are the most critical requirements for the ubiquitous use of WSNs in healthcare environments. This requires a secure and lightweight user authentication and access control. Symmetric key - based access control is not suitable for WSNs in healthcare due to dynamic network topology, mo...

  2. Social responsibility and educational communication in communities accessed by the works: a case study. IEGA - enterprise implementations for gasene

    Campos, Elisangela Assis de; Farias, Aline Marianne Magalhaes [LP Empreendimentos, Rio de janeiro, RJ (Brazil); Marques, Yanna Oliveira [Cia. Nacional de Dutos (Conduto S/A), Duque de Caxias, RJ (Brazil); Penido, Rita de Cassia [Sinopec Brasil, Rio de Janeiro, RJ (Brazil)

    2009-12-19

    Construction and assembly in a gas pipeline project is a constant study of realities and in some cases situations which involve interferences in communities, the company's interests must be wholly integrated with the primary need of the project which is to construct with Social-Environmental Responsibility, establish a good relationship, respect the communities values in which the project passes through and around and surround itself with measures guaranteeing safety, information about the activities and cause minimal impact in the day to day lives of the residents. At Spread 2A of the Pipeline project Cacimbas-Catu, the necessity to develop a specific project for the communities surrounding the access areas was elaborated principally because the topography only permitted the transportation of pipes, equipment and personnel to pass through these areas. This unique situation was drafted based on the transit of vehicles and heavy machinery, through communities with a low IDH (Human Development Index), dangerous living conditions and a high demographic density. Preventive and pacifying actions for Communities and Social responsibility were drafted and developed, involving a multidisciplinary collective effort with other sectors of the project, applying a global theme to ensure safety for the residents around the access areas, also to divulge information in regards to project activities, establish ethical and transparent communication and implement measures that assist in building a solid relationship between the enterprise and community, anticipating risky situations and possible conflicts. This Case Study has as an objective to present projects that were developed in the area of Communication and Social Responsibility in the Access Communities and that, proved effective, became standard within the entire work force's Trainings and Daily Safety, Environmental, and Occupational Health Dialoguing. During the development of the Project 'Street of Leisure

  3. On the Impact of information access delays on remote control of a wind turbine

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova;

    2015-01-01

    on a wind farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies...... useable by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance......It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...

  4. Database application research in real-time data access of accelerator control system

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  5. Multi-model-based Access Control in Construction Projects

    Hilbert, Frank; Araujo, Larissa; 10.4204/EPTCS.83.1

    2012-01-01

    During the execution of large scale construction projects performed by Virtual Organizations (VO), relatively complex technical models have to be exchanged between the VO members. For linking the trade and transfer of these models, a so-called multi-model container format was developed. Considering the different skills and tasks of the involved partners, it is not necessary for them to know all the models in every technical detailing. Furthermore, the model size can lead to a delay in communication. In this paper an approach is presented for defining model cut-outs according to the current project context. Dynamic dependencies to the project context as well as static dependencies on the organizational structure are mapped in a context-sensitive rule. As a result, an approach for dynamic filtering of multi-models is obtained which ensures, together with a filtering service, that the involved VO members get a simplified view of complex multi-models as well as sufficient permissions depending on their tasks.

  6. Multi-model-based Access Control in Construction Projects

    Frank Hilbert

    2012-04-01

    Full Text Available During the execution of large scale construction projects performed by Virtual Organizations (VO, relatively complex technical models have to be exchanged between the VO members. For linking the trade and transfer of these models, a so-called multi-model container format was developed. Considering the different skills and tasks of the involved partners, it is not necessary for them to know all the models in every technical detailing. Furthermore, the model size can lead to a delay in communication. In this paper an approach is presented for defining model cut-outs according to the current project context. Dynamic dependencies to the project context as well as static dependencies on the organizational structure are mapped in a context-sensitive rule. As a result, an approach for dynamic filtering of multi-models is obtained which ensures, together with a filtering service, that the involved VO members get a simplified view of complex multi-models as well as sufficient permissions depending on their tasks.

  7. Access Control in the ATLAS TDAQ Online Cluster

    Leahu, Marius Constantin; Stoichescu, D A; Lehmann Miotto, G

    ATLAS (A Toroidal LHC Apparatus) is a general-purpose detector for studying high-energy particle interactions: it is the largest particle detector experiment at CERN and it is built around one of the interaction points of the proton beams accelerated by the Large Hadron Collider (LHC). The detector generates an impressive amount of raw data: 64 TB per second as a result of 40 MHz proton-proton collision rate with 1.6 MB data for each such event. The handling of such data rate is managed by a three levels Trigger and Data Acquisition (TDAQ) system, which filters out the events not relevant from physics research point of view and selects in the end in the order of 1000 events per second to be stored for offline analyses. This system comprises a significant number of hardware devices, software applications and human personnel to supervise the experiment operation. Their protection against damages as a result of misuse and their optimized exploitation by avoiding the conflicting accesses to resources are key requ...

  8. Distributed Medium Access Control with SDMA Support for WLANs

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  9. 面向协作通信的忙音信道接入机制%A channel accessing scheme based on busy tone for cooperative communication

    谢鲲; 谢可欣; 吉刚; 何施茗

    2014-01-01

    Compared with traditional wireless communication , although relay nodes in cooperative communication can help to increase the performance of a wireless network,relay nodes may cause the serious competition for wire-less channel accessing ,which makes the channel access problem in cooperative communication challenging .To solve the problem,a novel MAC ( media access control) scheme by concurrently considering RTS/CTS ( Request To Send/Clear To Send) and busy tone is proposed in the paper.In the scheme,three busy tones are proposed to iden-tify the state of channel occupation and solve the hidden terminal and exposed terminal problems in cooperative communication.Based on the busy tone,this paper also proposes a bandwidth efficient relay selection algorithm.The source can choose the best relay in a distributed way by sensing the busy tone .The theory and simulation results demonstrate that the proposed scheme can efficiently improve the channel utilization and solve the hidden terminal and exposed terminal problems in cooperative communication .The blocking time ratio of the proposed MAC scheme is less than 10% when the data packet size surpasses 3500B.%与传统无线传输相比,虽然协作中继节点的参与可以大大提高无线网络性能,然而协作中继会带来严重的信道竞争问题,这给协作通信环境中的信道访问控制带来挑战。为了解决这个问题,提出一种RTS/CTS(Request To Send/Clear To Send)与忙音结合的MAC(media access control)信道接入方案。该方案使用3个忙音来标识信道的使用状态,并解决协作通信中的隐藏终端和暴露终端问题。基于忙音信号,还提出了一种带宽节俭的协作节点选择算法。通过侦听忙音信号,源节点可分布式地选择最优的协作节点。理论分析和仿真实验表明所提方案能有效地提高协作通信中的信道利用率,很好地解决了协作通信中的隐藏终端暴露终端问

  10. Integrated Antenna/Solar Array Cell (IA/SAC) System for Flexible Access Communications

    Lee, Ricard Q.; Clark, Eric B.; Pal, Anna Maria T.; Wilt, David M.; Mueller, Carl H.

    2004-01-01

    Present satellite communications systems normally use separate solar cells and antennas. Since solar cells generally account for the largest surface area of the spacecraft, co-locating the antenna and solar cells on the same substrate opens the possibility for a number of data-rate-enhancing communications link architecture that would have minimal impact on spacecraft weight and size. The idea of integrating printed planar antenna and solar array cells on the same surface has been reported in the literature. The early work merely attempted to demonstrate the feasibility by placing commercial solar cells besides a patch antenna. Recently, Integrating multiple antenna elements and solar cell arrays on the same surface was reported for both space and terrestrial applications. The application of photovoltaic solar cell in a planar antenna structure where the radiating patch antenna is replaced by a Si solar cell has been demonstrated in wireless communication systems (C. Bendel, J. Kirchhof and N. Henze, 3rd Would Photovotaic Congress, Osaka, Japan, May 2003). Based on a hybrid approach, a 6x1 slot array with circularly polarized crossdipole elements co-located on the same surface of the solar cells array has been demonstrated (S. Vaccaro, J. R. Mosig and P. de Maagt, IEEE Trans. Ant. and Propag., Vol. 5 1, No. 8, Aug. 2003). Amorphous silicon solar cells with about 5-10% efficiency were used in these demonstrations. This paper describes recent effort to integrate advanced solar cells with printed planar antennas. Compared to prior art, the proposed WSAC concept is unique in the following ways: 1) Active antenna element will be used to achieve dynamic beam steering; 2) High efficiency (30%) GaAs multi-junction solar cells will be used instead of Si, which has an efficiency of about 15%; 3) Antenna and solar cells are integrated on a common GaAs substrate; and 4) Higher data rate capability. The IA/SAC is designed to operate at X-band (8-12 GH) and higher frequencies

  11. A Security Architecture for Data Aggregation and Access Control in Smart Grids

    Ruj, Sushmita; Stojmenovic, Ivan

    2011-01-01

    We propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. We use homomorphic encryption technique to achieve this. The consumer data that is collected is sent to the substations where it is monitored by remote terminal units (RTU). The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. Users can be maintenance units, utility centers, pricing estimator units or analyzing and prediction groups. We solve this problem of access control using cryptographic technique of attribute-based encryption. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The ac...

  12. [Access, use and preferences of Information and Communication Technologies by physicians in a general hospital in Peru].

    Vásquez-Silva, Luis; Ticse, Ray; Alfaro-Carballido, Luz; Guerra-Castañon, Felix

    2015-01-01

    We assessed the access, use and preferences of information and communication technology (ICT) by physicians who practice at Cayetano Heredia National Hospital. The questionnaire explored the availability and skills of ICT, time, educational activities, search engines and technological applications most used as well as ICT preferences in education.211 physicians were surveyed; laptop use was 93%, tablet and smartphone use was 66% and 88%.68% have mobile Internet. Differences were evident in the frequency of use of ICT in 25-34 year old age group as well as a higher level of skills (pICT is common among doctors in this hospital and there is positive interest in its use in education. PMID:26338389

  13. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  14. Placement of Base Stations in Broadband Power Line Communications Access Networks by Means of Multi-criteria Optimization

    Haidine, Abdelfatteh; Lehnert, Ralf

    Broadband Power Line Communications (B-PLC) technology is an alternative for broadband access networks, allowing bit rates up to currently 200Mbps. This technique uses the wiring of the low-voltage grid in order to offer to the users the telecommunications services, such as Internet, VoIP, VoD, etc. The B-PLC design process is sub-divided into two parts: the Generalized Base Station Placement (GBSP) problem and the PLC Channel Allocation Problem (P-CAP). This paper focuses on GBSP that is modeled as multi-criteria combinatorial optimization problem. Based on our published mathematical modeling, this paper supplies more numerical experiments for the evaluation of Multi-Objective Evolutionary Algorithms (MOEAs) in solving GBSP. Their performance is compared with the single-objective optimization.

  15. A Universal Communication Framework and Navigation Control Software for Mobile Prototyping Platforms

    Andreas Mitschele-Thiel

    2010-09-01

    Full Text Available In our contribution we would like to describe two new aspects of our low-cost mobile prototyping platform concept: a new hardware communication framework as well as new software features for navigation and control of our mobile platform. The paper is an extension of the ideas proposed in REV2009 [1] and is based on the therein used hardware platform and the monitoring and management software. This platform is based on the Quadrocopter concept – autonomous flying helicopter-style robots – and includes additional off-the-shelf parts. This leads to a universal mobile prototyping platform for communication tasks providing both mobile phone and WiFi access. However, the platform can provide these functions far more quickly than a technician on the ground might be able to. We will show that with our concept we can easily adapt the platform to the individual needs of the user, which leads to a very flexible and semi-autonomous system.

  16. Investigating levels of ICT access and confidence by Wheat Planters in Hamedan Province for (Eurygaster integriceps) Sunn Pest Management and Control

    Heshmatullah Saadi

    2006-01-01

    Varying forms of ICT is used nowadays to disseminate information and innovations among farmers. The present study investigates the level of access and confidence in various information and communication technologies with respect to pest control (e.g. Sunn Pest). A survey was performed over wheat farmers in Hamedan Province. 203 farmers where selected using multi-level, multi-step sampling. The required data was collected using a questionnaire composed of 35 open and two closed questions. Fin...

  17. Advanced Communication and Control Solutions of Distributed Energy Resources (DER)

    Asgeirsson, Haukur; Seguin, Richard; Sherding, Cameron; de Bruet, Andre, G.; Broadwater, Robert; Dilek, Murat

    2007-01-10

    This report covers work performed in Phase II of a two phase project whose objective was to demonstrate the aggregation of multiple Distributed Energy Resources (DERs) and to offer them into the energy market. The Phase I work (DE-FC36-03CH11161) created an integrated, but distributed, system and procedures to monitor and control multiple DERs from numerous manufacturers connected to the electric distribution system. Procedures were created which protect the distribution network and personnel that may be working on the network. Using the web as the communication medium for control and monitoring of the DERs, the integration of information and security was accomplished through the use of industry standard protocols such as secure SSL,VPN and ICCP. The primary objective of Phase II was to develop the procedures for marketing the power of the Phase I aggregated DERs in the energy market, increase the number of DER units, and implement the marketing procedures (interface with ISOs) for the DER generated power. The team partnered with the Midwest Independent System Operator (MISO), the local ISO, to address the energy market and demonstrate the economic dispatch of DERs in response to market signals. The selection of standards-based communication technologies offers the ability of the system to be deployed and integrated with other utilities’ resources. With the use of a data historian technology to facilitate the aggregation, the developed algorithms and procedures can be verified, audited, and modified. The team has demonstrated monitoring and control of multiple DERs as outlined in phase I report including procedures to perform these operations in a secure and safe manner. In Phase II, additional DER units were added. We also expanded on our phase I work to enhance communication security and to develop the market model of having DERs, both customer and utility owned, participate in the energy market. We are proposing a two-part DER energy market model--a utility

  18. A New Time-Hopping Multiple Access Communication System Simulator: Application to Ultra-Wideband

    José M. Páez-Borrallo

    2005-03-01

    Full Text Available Time-hopping ultra-wideband technology presents some very attractive features for future indoor wireless systems in terms of achievable transmission rate and multiple access capabilities. This paper develops an algorithm to design time-hopping system simulators specially suitable for ultra-wideband, which takes advantage of some of the specific characteristics of this kind of systems. The algorithm allows an improvement of both the time capabilities and the achievable sampling rate and can be used to research into the influence of different parameters on the performance of the system. An additional result is the validation of a new general performance formula for time-hopping ultra-wideband systems with multipath channels.

  19. ACCESS METHODS CONCERNING THE CONSTITUTIONAL CONTROL OF THE CONSTITUTIONAL COURT

    Gabriela NEMTOI

    2009-01-01

    The study concerning the laws’ constitutionality represents the reason of constitutional warranty on judicial standards, which governs a democratic state. The supremacy of constitution is only a principle, which has to be doubled by establishing a mechanism creating consistency to it. In order to assure the supremacy of constitution, the doctrine and constitutional practice have created efficient judicial institutions, the control of laws’ constitutionality by the competency of Constitutional...

  20. Technical enforcement of european privacy legislation: an access control approach

    Bekara, Kheira; Laurent, Maryline; Nguyen, Than Ha

    2012-01-01

    Until today, the protection of personal data is mainly left to the legislation by means of guidelines. This paper aims to increase the perceived control by users over their data by helping the user's agent to check the service requests conformity to the legislation. To do so, it discusses the main concepts involved in the legislative privacy principles, and deduces a privacy semantic information model. The proposed model focuses on the main concepts involved in legislative privacy principles....

  1. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  2. Communicable disease control in China: From Mao to now

    David Hipgrave

    2011-12-01

    Full Text Available China’s progress on communicable disease control (CDC in the 30 years after establishment of the People’s Republic in 1949 is widely regarded as remarkable. Life expectancy soared by around 30 years, infant mortality plummeted and smallpox, sexually transmitted diseases and many other infections were either eliminated or decreased massively in incidence, largely as a result of CDC. By the mid-1970s, China was already undergoing the epidemiologic transition, years ahead of other nations of similar economic status. These early successes can be attributed initially to population mobilization, mass campaigns and a focus on sanitation, hygiene, clean water and clean delivery, and occurred despite political instability and slow economic progress. The 10-year Cultural Revolution from 1966 brought many hardships, but also clinical care and continuing public health programs to the masses through community-funded medical schemes and the establishment of community-based health workers. These people-focused approaches broke down with China’s market reforms from 1980. Village doctors turned to private practice as community funding ceased, and the attention paid to rural public health declined. CDC relied on vertical programs, some of them successful (such as elimination of lymphatic filariasis and child immunisation, but others (such as control of schistosomiasis and tuberculosis demonstrating only intermittent progress due to failed strategies or reliance on support by the poorest governments and health workers, who could not or would not collaborate. In addition, China’s laissez-faire approach to public health placed it at great risk, as evidenced by the outbreak in 2003 of the Severe Acute Respiratory Syndrome. Since then, major changes to disease reporting, the priority given to CDC including through major new domestic resources and reform of China’s health system offer encouragement for CDC. While decentralized funding and varying quality

  3. Transmission Analysis of Optical Code Division Multiple Access Communication Systems in the Presence of Noise in Local Area Network Applications

    Ahmed Nabih Zaki Rashed

    2013-04-01

    Full Text Available OCDMA is an essential part of the digital communication system now days for long haul, high speed networks. The biggest challenge with Optical CDMA system is to maintain the performance of the system and offer high bandwidth in case of higher number of users at minimum cost. As the number of users increase, the input requirements i.e. transmitted power, bit rate etc start increasing sharply which contribute to the additional cost. It has recently attracted significant research interest because of the advantages it offers in terms of the flexibility in the management of the system resources. We have taken into account the system design parameters are determined such as BER (bit error rate, signal to noise ratio (SNR, transmission bit rates, and optical received power for different code lengths. The Optical CDMA systems suffer from the problem of multiple access interference (MAI.As the number of users increase the BER error rate degrades because the effect of MAI (multiple access interference increases. So, there is a limitation in number of users, as the number of users increase SNR decrease and probability of error increases.

  4. Communications Technology Assessment for the Unmanned Aircraft System (UAS) Control and Non-Payload Communications (CNPC) Link

    Bretmersky, Steven C.; Bishop, William D.; Dailey, Justin E.; Chevalier, Christine T.

    2014-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) is performing communications systems research for the Unmanned Aircraft System (UAS) in the National Airspace System (NAS) Project. One of the goals of the communications element is to select and test a communications technology for the UAS Control and Non-Payload Communications (CNPC) link. The GRC UAS Modeling and Simulation (M/S) Sub Team will evaluate the performance of several potential technologies for the CNPC link through detailed software simulations. In parallel, an industry partner will implement a technology in hardware to be used for flight testing. The task necessitated a technical assessment of existing Radio Frequency (RF) communications technologies to identify the best candidate systems for use as the UAS CNPC link. The assessment provides a basis for selecting the technologies for the M/S effort and the hardware radio design. The process developed for the technical assessments for the Future Communications Study1 (FCS) was used as an initial starting point for this assessment. The FCS is a joint Federal Aviation Administration (FAA) and Eurocontrol study on technologies for use as a future aeronautical communications link. The FCS technology assessment process methodology can be applied to the UAS CNPC link; however the findings of the FCS are not directly applicable because of different requirements between a CNPC link and a general aeronautical data link. Additional technologies were added to the potential technologies list from the State of the Art Unmanned Aircraft System Communication Assessment developed by NASA GRC2. This document investigates the state of the art of communications as related to UAS. A portion of the document examines potential communications systems for a UAS communication architecture. Like the FCS, the state of the art assessment surveyed existing communications technologies. It did not, however, perform a detailed assessment of the

  5. A Scheduling Algorithm Based on Communication Delay for Wireless Network Control System

    Jun Wang

    2012-09-01

    Full Text Available In this study, a scheduling algorithm based on communication delay is proposed. This scheduling algorithm can tolerate delay of periodic communication tasks in wireless network control system. It resolves real-time problem of periodic communication tasks in wireless network control system and partly reduces overtime phenomenon of periodic communication tasks caused by delay in wireless network. At the same time, the nonlinear programming model is built for solving scheduling timetable based on the proposed scheduling algorithm. Finally, the performance of the proposed scheduling algorithm is evaluated by an application example. The statistics results show that it is more effective than traditional scheduling algorithms in wireless network control system.

  6. Disparities in Health Information Access: Results of a County-Wide Survey and Implications for Health Communication.

    Kelley, Megan S; Su, Dejun; Britigan, Denise H

    2016-01-01

    Health knowledge and behavior can be shaped by the extent to which individuals have access to reliable and understandable health information. Based on data from a population-based telephone survey of 1,503 respondents of ages 18 years and older living in Douglas County, Nebraska, in 2013, this study assesses disparities in health information access and their related covariates. The two most frequently reported sources of health information are the Internet and health professionals, followed by print media, peers, and broadcast media. Relative to non-Hispanic Whites, Blacks are more likely to report health professionals as their primary source of health information (odds ratio [OR] = 2.61, p < .001) and less likely to report peers (OR = 0.39, p < .05). A comparison between Whites and Hispanics suggests that Hispanics are less likely to get their health information through the Internet (OR = 0.51, p < .05) and more likely to get it from broadcast media (OR = 4.27, p < .01). Relative to their counterparts, participants with no health insurance had significantly higher odds of reporting no source of health information (OR = 3.46, p < .05). Having no source of health information was also associated with an annual income below $25,000 (OR = 2.78, p < .05 compared to middle income range) and being born outside of the United States (OR = 5.00, p < .05). Access to health information is lowest among society's most vulnerable population groups. Knowledge of the specific outlets through which people are likely to obtain health information can help health program planners utilize the communication channels that are most relevant to the people they intend to reach. PMID:26452300

  7. SpaceOps 2012 Plus 2: Social Tools to Simplify ISS Flight Control Communications and Log Keeping

    Cowart, Hugh S.; Scott, David W.

    2014-01-01

    A paper written for the SpaceOps 2012 Conference (Simplify ISS Flight Control Communications and Log Keeping via Social Tools and Techniques) identified three innovative concepts for real time flight control communications tools based on social mechanisms: a) Console Log Tool (CoLT) - A log keeping application at Marshall Space Flight Center's (MSFC) Payload Operations Integration Center (POIC) that provides "anywhere" access, comment and notifications features similar to those found in Social Networking Systems (SNS), b) Cross-Log Communication via Social Techniques - A concept from Johnsson Space Center's (JSC) Mission Control Center Houston (MCC-H) that would use microblogging's @tag and #tag protocols to make information/requests visible and/or discoverable in logs owned by @Destination addressees, and c) Communications Dashboard (CommDash) - A MSFC concept for a Facebook-like interface to visually integrate and manage basic console log content, text chat streams analogous to voice loops, text chat streams dedicated to particular conversations, generic and position-specific status displays/streams, and a graphically based hailing display. CoLT was deployed operationally at nearly the same time as SpaceOps 2012, the Cross- Log Communications idea is currently waiting for a champion to carry it forward, and CommDash was approved as a NASA Iinformation Technoloby (IT) Labs project. This paper discusses lessons learned from two years of actual CoLT operations, updates CommDash prototype development status, and discusses potential for using Cross-Log Communications in both MCC-H and/or POIC environments, and considers other ways for synergizing console applcations.

  8. Design And Implementation Of Digital Radio Communications Link For Platoon Control

    Li, Wei-Yi

    1995-01-01

    This report discusses the design and implementation of inter-vehicle communication systems used in the longitudinal control platoon experiments conducted by PATH (Partners for Advanced Transit and Highways). In the first section of the report, the inter-vehicle communication links implemented in both the two and four vehicles platoon experiments are examined. Lastly, this report investigates some possible future improvements of the communication link used for platoon control experimentation.

  9. Dual scheduling and quantised control for networked control systems with communication constraints

    Lu, Hui; Zhou, Chuan

    2016-07-01

    A novel integrated design scheme of average dwell time scheduling strategy, dynamic bandwidth allocation policy and quantised control for a collection of networked control systems (NCSs) with time delay and communication constraints is proposed in this paper. A scheduling policy is presented to accommodate the limitation of communication capacity which depends on the convergence rate of closed-loop system and divergence rate of open-loop plant. Linear programming technique is adopted to dynamically allocate bit rate for each node and the strategy is used to make trade-offs between the network utilisation and the control performance which provides an effective way of optimising the quality of control (QoC) and the quality of service (QoS) for NCSs. Mid-tread uniform quantisers update the quantisation rules according to the assignment of the bit rate and convert the quantised state into a kind of input saturation with bounded disturbances. Taking into account the effect of dual scheduling strategy and quantisation, the NCSs are modelled as discrete-time switched systems with bounded disturbances. Furthermore, a scheduling and quantised feedback control co-design procedure is proposed for the simultaneous stabilisation of the collection of networked subsystems. Finally, a simulation example is given to illustrate the effectiveness of the proposed method.

  10. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  11. A novel decentralized hierarchical access control scheme for the medical scenario

    Eskeland, Sigurd; Prasad, Neeli R.

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered to be the...... property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover, the...... hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  12. A novel decentralized hierarchical access control scheme for the medical scenario

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover, the......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered to be the...... hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  13. Steganography-based access control to medical data hidden in electrocardiogram.

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  14. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  15. Controlling satellite communication system unwanted emissions in congested RF spectrum

    Olsen, Donald; Heymann, Roger

    2007-09-01

    The International Telecommunication Union (ITU), a United Nations (UN) agency, is the agency that, under an international treaty, sets radio spectrum usage regulations among member nations. Within the United States of America (USA), the organization that sets regulations, coordinates an application for use, and provides authorization for federal government/agency use of the radio frequency (RF) spectrum is the National Telecommunications and Information Administration (NTIA). In this regard, the NTIA defines which RF spectrum is available for federal government use in the USA, and how it is to be used. The NTIA is a component of the United States (U.S.) Department of Commerce of the federal government. The significance of ITU regulations is that ITU approval is required for U.S. federal government/agency permission to use the RF spectrum outside of U.S. boundaries. All member nations have signed a treaty to do so. U.S. federal regulations for federal use of the RF spectrum are found in the Manual of Regulations and Procedures for Federal Radio Frequency Management, and extracts of the manual are found in what is known as the Table of Frequency Allocations. Nonfederal government and private sector use of the RF spectrum within the U.S. is regulated by the Federal Communications Commission (FCC). There is a need to control "unwanted emissions" (defined to include out-of-band emissions, which are those immediately adjacent to the necessary and allocated bandwidth, plus spurious emissions) to preclude interference to all other authorized users. This paper discusses the causes, effects, and mitigation of unwanted RF emissions to systems in adjacent spectra. Digital modulations are widely used in today's satellite communications. Commercial communications sector standards are covered for the most part worldwide by Digital Video Broadcast - Satellite (DVB-S) and digital satellite news gathering (DSNG) evolutions and the second generation of DVB-S (DVB-S2) standard

  16. Active queue management controller design for TCP communication networks: Variable structure control approach

    On the basis of variable structure control (VSC), an active queue management (AQM) controller is presented for a class of TCP communication networks. In the TCP/IP networks, the packet drop probability is limited between 0 and 1. Therefore, we modeled TCP/AQM as a rate-based non-linear system with a saturated input. The objective of the VSC-based AQM controller is to achieve the desired queue size and to guarantee the asymptotic stability of the closed-loop TCP non-linear system with saturated input. The performance and effectiveness of the proposed control law are then validated for different network scenarios through numerical simulations in both MATLAB and Network Simulator-2 (NS-2). Both sets of simulation results have confirmed that the proposed scheme outperforms other AQM schemes.

  17. Active queue management controller design for TCP communication networks: Variable structure control approach

    Chen, C.-K. [Department of Engineering Science, National Cheng Kung University, Tainan 701, Taiwan (China); Liao, T.-L. [Department of Engineering Science, National Cheng Kung University, Tainan 701, Taiwan (China)], E-mail: tlliao@mail.ncku.edu; Yan, J.-J. [Department of Computer and Communication, Shu-Te University, Kaohsiung 824, Taiwan (China)

    2009-04-15

    On the basis of variable structure control (VSC), an active queue management (AQM) controller is presented for a class of TCP communication networks. In the TCP/IP networks, the packet drop probability is limited between 0 and 1. Therefore, we modeled TCP/AQM as a rate-based non-linear system with a saturated input. The objective of the VSC-based AQM controller is to achieve the desired queue size and to guarantee the asymptotic stability of the closed-loop TCP non-linear system with saturated input. The performance and effectiveness of the proposed control law are then validated for different network scenarios through numerical simulations in both MATLAB and Network Simulator-2 (NS-2). Both sets of simulation results have confirmed that the proposed scheme outperforms other AQM schemes.

  18. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  19. Socio-economic status influences blood pressure control despite equal access to care

    Paulsen, M S; Andersen, M; Munck, A P;

    2012-01-01

    OBJECTIVE: Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general...... Statistics Denmark. The outcome measure was BP control defined as BP...

  20. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    2010-11-15

    ... Exchange Commission 17 CFR Part 240 Risk Management Controls for Brokers or Dealers With Market Access... Regulations#0;#0; ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls... person other than a broker or dealer, to establish, document, and maintain a system of risk...