WorldWideScience

Sample records for access control communications

  1. Modemless Multiple Access Communications over Powerlines for DC Microgrid Control

    OpenAIRE

    Angjelichinoski, Marko; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    We present a communication solution tailored specifically for DC microgrids (MGs) that exploits: (i) the communication potential residing in power electronic converters interfacing distributed generators to powerlines and (ii) the multiple access nature of the communication channel presented by powerlines. The communication is achieved by modulating the parameters of the primary control loop implemented by the converters, fostering execution of the upper layer control applications. We present...

  2. Secure Communication and Access Control for Mobile Web Service Provisioning

    CERN Document Server

    Srirama, Satish Narayana

    2010-01-01

    It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welcoming, the ability to provide secure and reliable communication in the vulnerable and volatile mobile ad-hoc topologies is vastly becoming necessary. The paper mainly addresses the details and issues in providing secured communication and access control for the mobile web service provisioning domain. While the basic message-level security can be provided, providing proper access control mechanisms for the Mobile Host still poses a great challenge. This paper discusses details of secure communication and proposes the distributed semantics-based authorization mechanism.

  3. The effects of hands free communication devices on clinical communication: balancing communication access needs with user control.

    Science.gov (United States)

    Richardson, Joshua E; Richardson, Joshua Edwin; Ash, Joan S; Ash, Joan

    2008-01-01

    Hands Free Communication Device (HFCD) systems are a relatively new information and communication technology. HFCD systems enable clinicians to directly contact and communicate with one another using wearable, voice-controlled badges that are VoIP-based (voice-over IP) and are linked to one another over a wireless local area network (WLAN). This qualitative study utilized a grounded theory, multiple perspectives approach to understand how the use of HFCDs affected communication in the hospitals that implemented them. The study generated five themes revolving around HFCDs impact on communication. This paper specifically focuses on two of those themes: Communication Access and Control. PMID:18999046

  4. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  5. In-home Power Line Communication Media Access Control Protocol Based on Collision Resolution

    Institute of Scientific and Technical Information of China (English)

    WANG Bo; HUANG Pei-wei; ZHONG You-ping; QI Ying-hao

    2009-01-01

    Most existing media access control (MAC) protocols in power line communication (PLC) networks just discard the colliding data packets when collision occurs. The collision deteriorates throughput and delay performance of system under high traffic conditions. This article presents a novel media access scheme with fast collision resolution for in-home power line networks. It works by first recognizing the colliding stations through detecting the inserted unique ID sequence ahead of data packets, then the source nodes retransmitting their packets immediately after the collision slot. The proposed protocol maintains the benefits of ALOHA systems. It needs no scheduling overhead and is suitable for bursty sources, such as multimedia data packets. Computer simulations have demonstrated that this approach can achieve high throughput due to its ability of resolving collisions.

  6. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  7. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 3: Software and Hardware. Rehab/Education Technology ResourceBook Series.

    Science.gov (United States)

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for the disabled or the elderly, the book focuses on hardware and software. The guide's 13 chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  8. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 4: Update to Books 1, 2, and 3.

    Science.gov (United States)

    Borden, Peter A., Ed.; Vanderheiden, Gregg C., Ed.

    This update to the three-volume first edition of the "Rehab/Education ResourceBook Series" describes special software and products pertaining to communication, control, and computer access, designed specifically for the needs of disabled and elderly people. The 22 chapters cover: speech aids; pointing and typing aids; training and communication…

  9. Detection and response to unauthorized access to a communication device

    Science.gov (United States)

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  10. Digital autonomous terminal access communications

    Science.gov (United States)

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  11. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  12. Open access scholarly communication in Malaysia

    OpenAIRE

    Rhiza, Adni

    2011-01-01

    This paper reports on Open Access Scholarly Communication in Malaysia, investigating their use of open access repositories, advocacy undertaken, and reasons for contribution to global scholarship. The outcome wills very much in line with the stipulations willing Scholarly on Open access that will preserve and disseminate digital materials created by, or associated with the university.

  13. Information, communication, travel behaviour and accessibility.

    NARCIS (Netherlands)

    Wee, van B.; Chorus, C.; Geurs, K.T.

    2013-01-01

    Over the past two decades many papers have been published on the impact of Information and Communication Technologies (ICT) on travel behavior, but the literature focusing on the impact of ICT on accessibility is relatively scarce. In this paper we give an overview of the impact of ICT on four compo

  14. Digital Autonomous Terminal Access Communication (DATAC) system

    Science.gov (United States)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  15. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    OpenAIRE

    Desmedt, Yvo; Shaghaghi, Arash

    2016-01-01

    Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the failure of access control. Access control models derived from access control matrix encompass three ...

  16. Physical Access Control Database

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  17. Code-Expanded Random Access for Machine-Type Communications

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir;

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose...... a novel approach that is able to sustain a wide random access load range, while preserving the physical layer unchanged and incurring minor changes in the medium access control layer. The proposed scheme increases the amount of available contention resources, without resorting to the increase of system...... resources, such as contention sub-frames and preambles. This increase is accomplished by expanding the contention space to the code domain, through the creation of random access codewords. Specifically, in the proposed scheme, users perform random access by transmitting one or none of the available LTE...

  18. Adaptive Access Class Barring Method for Machine Generated Communications

    Directory of Open Access Journals (Sweden)

    Jaesung Park

    2016-01-01

    Full Text Available Cellular network is provisioned to serve traffic demands generated by human being. The random access channel used for nodes to compete for a connection with an eNB is limited. Even though machines generate very small amount of data traffic, the signaling channel of a network becomes overloaded and collisions occur to fail the access if too many MTC (Machine Type Communication devices attempt to access network. To tackle the issue, 3GPP specifies an access class barring but leaves a specific algorithm as an implementation issue. In this paper, we propose an adaptive access barring method. Generally, an eNB does not know the number of MTC devices in its coverage area. Thus, it is difficult to control the barring factor by predicting the number of MTC devices in a service area of a cell. On the contrary, we control the barring factor based on the prediction of access intensity which can be measured at an eNB. Simulation results show that since the proposed method can manipulate the barring factor autonomously according to the access intensity, it is superior to the original method in terms of the access success probability and the collision probability.

  19. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...

  20. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  1. Studying Media Access andControl Protocols

    OpenAIRE

    Mohammed, Alalelddin Fuad Yousif

    2010-01-01

    This thesis project’s goal is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The thesis fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) re...

  2. Robust access control framework for mobile cloud computing network

    OpenAIRE

    Li, F; Rahulamathavan, Y.; Conti, M.; Rajarajan, M.

    2015-01-01

    Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of unified communications, employees exploit the advantages of smart devices and 4G wireless technology to access the data from anywhere and anytime. Security protocols such as access control designed for traditional setup are not su...

  3. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  4. 水声通信网络媒介访问控制协议的研究%Research on Media Access Control Protocol for Underwater Acoustic Communication Network

    Institute of Scientific and Technical Information of China (English)

    匡锐

    2014-01-01

    Media access control protocol is the most important part of data link layer protocol, which plays a decisive significance to the distribution of channels. This paper designs a media access control protocol that com-bines normal access mode and MACAW access mode respectively modeling of channel and underwater communi-cation equipment, simulating the normal access mode and MACAW access mode in throughput, bit error rate and transmission delay.%媒介访问控制协议是数据链路层协议中最重要的部分,对信道的分配起着决定性的作用。本文设计了一种普通访问模式和MACAW访问模式相结合的媒介访问控制协议,分别对信道和水下通信设备进行建模,对普通访问模式和MACAW访问模式在吞吐量、误码率和传输延迟进行了仿真。

  5. Communication access to businesses and organizations for people with complex communication needs.

    Science.gov (United States)

    Collier, Barbara; Blackstone, Sarah W; Taylor, Andrew

    2012-12-01

    Human rights legislation and anti-discrimination and accessibility laws exist in many countries and through international conventions and treaties. To varying degrees, these laws protect the rights of people with disabilities to full and equal access to goods and services. Yet, the accessibility requirements of people with complex communication needs (CCN) are not well represented in the existing accessibility literature. This article describes the results of surveys completed by disability service providers and individuals with CCN due to cerebral palsy, developmental delay, and acquired disabilities. It identifies accessibility requirements for people with CCN for face-to-face communication; comprehension of spoken language; telephone communication; text and print-based communication; Internet, email, and social media interactions; and written communication. Recommendations are made for communication accessibility accommodations in regulations, guidelines, and practices.

  6. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  7. Flexible access control for dynamic collaborative environments

    NARCIS (Netherlands)

    Dekker, Mari Antonius Cornelis

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect confident

  8. Accessible information for people with complex communication needs.

    Science.gov (United States)

    Owens, Janet S

    2006-09-01

    Information can be empowering if it is accessible. While a number of known information access barriers have been reported for the broader group of people with disabilities, specific information issues for people with complex communication needs have not been previously reported. In this consumer-focused study, the accessibility of information design and dissemination practices were discussed by 17 people with complex communication needs; by eight parents, advocates, therapists, and agency representatives in focus groups; and by seven individuals in individual interviews. Participants explored issues and made recommendations for content, including language, visual and audio supports; print accessibility; physical access; and human support for information access. Consumer-generated accessibility guidelines were an outcome of this study.

  9. Towards Trusted Network Access Control

    Science.gov (United States)

    Bente, Ingo; von Helden, Josef

    Network Access Control (NAC) solutions promise to significantly increase the security level of modern networks. In short, they allow to measure the integrity state of an endpoint that tries to get access to the network. Based upon the measurement results, which are compared to a defined NAC policy, access to the network can be allowed or denied. One problem of all currently available NAC solutions is referred to as the “lying endpoint” problem. Normally, special software components are responsible for gathering the relevant integrity information on the endpoint. If an attacker modifies those software components, an endpoint can lie about its current integrity state. Therefore, endpoints which are not compliant to the defined NAC policy can get access to the network. Those endpoints must be considered as potential threat. This paper summarizes a possible solution for the lying endpoint problem based upon the specifications of the Trusted Computing Group (TCG) and the results of the two research projects TNC@ FHH and Turaya. The goal is to develop an open source, TNC compatible NAC solution with full TPM support within a new research project: tNAC.

  10. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  11. Open access and scholarly communication, part 4

    CERN Document Server

    Eden, Brad

    2009-01-01

    This fourth e-book on the subject of open access in the academic field includes a Latin American case study on open access penetration, a paper from Germany on the promotion of OA illustrated by a project at the University of Konstanz, and a case study on OA at Bioline International, a non-profit scholarly publications aggregator, distributor, publisher and publishing assistance service.

  12. Medium Access Control of Non Uniformly Distributed Multi Hop Network Communication Node%非均匀分布多跳网络通信节点介质访问控制

    Institute of Scientific and Technical Information of China (English)

    杨志忠

    2015-01-01

    在非均匀分布多跳网络中,需要对通信节点进行介质访问控制设计,提高网络通信节点的吞吐性和安全性.传统方法采用多路复用器输出端口信号检测方法进行非均匀分布多跳网络通信节点的介质访问控制,产生强烈的信道畸变,节点的通信控制性能不好.提出一种基于协同调度的混合协议激振算法的非均匀分布多跳网络通信节点介质访问控制方法.将非均匀分布多跳网络通信节点分簇模型的服务器网络接收端和发送端数据的信息熵作为信道传递向量函数,构建协同调度混合协议服务器模型,求得非均匀分布多跳网络时延扩展与信道特性测量均衡后的频谱,可以有效提高信息传输的保真度.仿真结果表明,采用该算法可以有效提高对多跳网络的通信节点介质访问控制性能,提高了通信节点的吞吐性能,降低重复传输次数,保证非均匀分布多跳网络通信的安全性和保真性.%In the non uniform distribution in multi hop networks, the need for access control design of node communication medium, to increase the throughput and security of network communication node. The traditional method is using the detec-tion method of the multiplexer output port signals are non uniformly distributed multi hop network communication node me-dium access control, produce the channel distortion strongly, node communication control performance is not good. This pa-per proposes a hybrid protocol excitation algorithm based on collaborative scheduling non-uniform distribution of multi hop network communication node medium access control method. Non uniform distribution of multi hop network communication node clustering model information entropy server network receiver and transmitter data as the channel transfer vector func-tion, construction of the collaborative scheduling hybrid protocol server model, obtain the non uniformly distributed multi hop network delay spread and

  13. The Effects of Information and Communication Technologies on Accessibility

    NARCIS (Netherlands)

    Lu, R.

    2015-01-01

    It is expected that information and communication technology (ICT) can have great impacts on traveler’s accessibility. However, understanding of the effects of ICT on accessibility is still limited. Consequently, this thesis aims to increase the understanding of such effects. The thesis develops a g

  14. LTE-advanced random access mechanism for M2M communication: A review

    Science.gov (United States)

    Mustafa, Rashid; Sarowa, Sandeep; Jaglan, Reena Rathee; Khan, Mohammad Junaid; Agrawal, Sunil

    2016-03-01

    Machine Type Communications (MTC) enables one or more self-sufficient machines to communicate directly with one another without human interference. MTC applications include smart grid, security, e-Health and intelligent automation system. To support huge numbers of MTC devices, one of the challenging issues is to provide a competent way for numerous access in the network and to minimize network overload. In this article, the different control mechanisms for overload random access are reviewed to avoid congestion caused by random access channel (RACH) of MTC devices. However, past and present wireless technologies have been engineered for Human-to-Human (H2H) communications, in particular, for transmission of voice. Consequently the Long Term Evolution (LTE) -Advanced is expected to play a central role in communicating Machine to Machine (M2M) and are very optimistic about H2H communications. Distinct and unique characteristics of M2M communications create new challenges from those in H2H communications. In this article, we investigate the impact of massive M2M terminals attempting random access to LTE-Advanced all at once. We discuss and review the solutions to alleviate the overload problem by Third Generation Partnership Project (3GPP). As a result, we evaluate and compare these solutions that can effectively eliminate the congestion on the random access channel for M2M communications without affecting H2H communications.

  15. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  16. A Linux Implementation of Temporal Access Controls

    OpenAIRE

    Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E.

    2007-01-01

    Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval File Protection System (TIFPS), a prototype of the Time Interval Access Control (TIAC) model, has been implemented by modifying Linux extended attributes to include temporal metadata associated both with files and users. The Linux Security Module was used to provide hooks fo...

  17. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  18. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  19. Random Access Game and Medium Access Control Design

    OpenAIRE

    Chen, Lijun; Low, Steven H.; Doyle, John C.

    2010-01-01

    Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (strategy evolutions) to achieve Nash equilibria. This provides a general analytical framework that is capable of modeling a large class of system-wide quality-of-service (QoS) models via the specification of per-node util...

  20. Congestion Control Strategy of Random Access Channel in Machine Type Communication%机器类型通信中随机接入信道的拥塞控制策略

    Institute of Scientific and Technical Information of China (English)

    周伟; 谭小彬; 季海波

    2015-01-01

    在基于3GPP长期演进技术的机器类型通信( MTC)应用背景下,针对无线接入网络中随机接入信道的拥塞问题,提出一种改进的拥塞控制策略,MTC器件利用基站广播信息自适应调整各自的接入时间,避免由于大量MTC器件同时发起随机接入而引起接入碰撞的问题,实现基站的负载均衡及信道资源的合理分配。基于最大熵原理证明各MTC器件接入时间的均匀分布是最优分布。仿真实验结果表明,与接入类别限制策略相比,该策略可缓解随机接入信道的拥塞状况,提高MTC器件的随机接入成功率,降低接入时延,从而提升网络整体性能及服务质量。%This paper proposes an improved congestion control strategy to alleviate the congestion of random access channel in radio access network of Machine Type Communication(MTC) based on 3GPP-Long Term Evolution(LTE). In order to reach the base-station’ s load balancing in the time interval and allocate the channel resources rationally,it schedules the access time of MTC devices through the base-station’ s broadcasted information,and thereby avoids access collisions caused by massive number of MTC devices access the base-station simultaneously. It also proofs that uniform distribution of the access time is the optimal choice by maximum entropy principle. Simulation experimental results show that the strategy can alleviate the channel congestion significantly and increase the random access success rate of MTC devices,reduce the delay,and thus improve the network’ s performance and guarantee the network’ s Quality of Service ( QoS) compared with Access Class Barring( ACB) strategy.

  1. User Behavior Trust Based Cloud Computing Access Control Model

    OpenAIRE

    Jiangcheng, Qin

    2016-01-01

    Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud...

  2. Demonstration of IP based control and management for a reconfigurable photonic access network

    NARCIS (Netherlands)

    Teune, Ronald; Roy, Rajeev; Etten, van Wim

    2008-01-01

    An implementation of control and management for a reconfigurable photonic access network is presented. An out of band control channel is used on which an IP communication is established to communicate with remote elements. A Headend based master controller communicates with a far end embedded proces

  3. Use of action requests to control communications

    International Nuclear Information System (INIS)

    This paper discusses the Plant Information Management System (PIMS) that is implemented at Pacific Gas and Electric Company's (PG and E) Diablo Canyon Power Plant (DCPP). PIMS is implemented on IBM mainframes located at the plant, is on-line and interactive, and is accessed via a computer communication system that supports more than 450 IBM 3270 PC workstations. This paper discusses the role of the ACTION REQUEST module of PIMS and how it is used to control plant sensitive communications. The ACTION REQUEST module of PIMS can be accessed from any workstation and during the first year of Commercial Operation of DCPP replaced numerous and redundant forms of manual communication mechanisms. Also in this first year, users at the plant generated approximately 25,000 Action Requests which were controlled through review and approval cycles by PIMS. Each organization assigned action were immediately notified of their responsibilities so that action could be taken in a timely manner. The Diablo Canyon Power Plant broke Westinghouse world-wide operating records for the first year of operation (over 90% availability) due to a well built and reliable plant and due to a responsive Operations organization, which was well informed and controlled

  4. An electronically controlled automatic security access gate

    OpenAIRE

    Jonathan A. Enokela; Michael N. TYOWUAH

    2014-01-01

    The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF) transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is ...

  5. Evaluation of file access control implementations

    OpenAIRE

    Madar, Fatima Ali

    2005-01-01

    This thesis discusses two implementations of file access controls: the UNIX Permissions (UP) and the Access Control List (ACL). We will evaluate advantages and weaknesses in these two implementations. The criteria of evaluation are usefulness, security and manageability. The level of usefulness of systems was measured by evaluating user-surveys. The level of security was measured by comparing the implementations against well-established file access control models concerning privacy, inte...

  6. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  7. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  8. Human Rights and Access to Information and Communication Technologies

    Directory of Open Access Journals (Sweden)

    Nnenna Ifeanyi-Ajufo

    2013-08-01

    Full Text Available The world is going through a profound change where advances in Information and Communications Technologies (ICTs have tied nation states into an increasingly complex web of development, thus prompting the extreme importance of access to ICTs. Article 27 of the Universal Declaration on Human Rights (UDHR provides that ‘everyone has the right to participate, enjoy and share in scientific advancement and its benefits’. Though, billions of people the world over are presently excluded from access to ICTs necessitating the submission yet those who lack access to ICTs are extremely marginalised from present day development. This article critically weighs the immense importance of ICTs to everyday living and global development, the relationship between access to ICTs, law and human rights and recommends the adoption of a human rights-based approach towards bridging the ICTs or digital divide.

  9. Channel Coding in Random Access Communication over Compound Channels

    CERN Document Server

    Wang, Zheng

    2011-01-01

    Due to the short and bursty incoming messages, channel access activities in a wireless random access system are often fractional. The lack of frequent data support consequently makes it difficult for the receiver to estimate and track the time varying channel states with high precision. This paper investigates random multiple access communication over a compound wireless channel where channel realization is known neither at the transmitters nor at the receiver. An achievable rate and error probability tradeoff bound is derived under the non-asymptotic assumption of a finite codeword length. The results are then extended to the random multiple access system where the receiver is only interested in decoding messages from a user subset.

  10. Control with a random access protocol and packet dropouts

    Science.gov (United States)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  11. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  12. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  13. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  14. Formal Description of Trust-based Access Control

    Science.gov (United States)

    Xiaoning, Ma

    Different from traditional access control technologies, such as discretionary access control, mandatory access control, role-based access control, trust-based access control can solve the problem of uncertainty, risk and vulnerability coming from authorization. In this paper, strict definition and formal description of trust-based access control is defined.

  15. Privacy Preservation in Role-based Access Control Model

    Directory of Open Access Journals (Sweden)

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  16. Disk access controller for Multi 8 computer

    International Nuclear Information System (INIS)

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  17. Modelling Access Control For Healthcare Information Systems

    OpenAIRE

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  18. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  19. Communication access in the library for individuals who use augmentative and alternative communication.

    Science.gov (United States)

    Shepherd, Tracy A; McDougall, Stacy

    2008-12-01

    Libraries for All is a community-based program that aims to enhance communication access to the library for individuals who use augmentative and alternative communication (AAC), by providing resources and instruction. The goals are to (a) provide communication boards, (b) complete facilitator training, and (c) promote the program. To accomplish these goals, four communication boards were created and provided to all public libraries in London, Ontario. A train-the-trainer model was employed to ensure that all members of the library staff were familiar with the boards and aware of strategies to communicate more effectively with individuals who use AAC. Marketing materials were sent to potential stakeholders. The success of the program in meeting these three goals is highlighted. PMID:19023753

  20. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  1. Making the innovation case in Open Access scholary communication

    CERN Document Server

    CERN. Geneva

    2005-01-01

    It seems almost unnecessary to have to elaborate additional reasons for the adoption of Open Access scholarly communication (OA sc) as manifested through Open Access journals and self-archiving practices. To those active within the OA arena, the case has been convincingly made, and current arguments merely need to be disseminated beyond the Library and Information Science (LIS) sphere. However, it is my contention that a convincing argument for OA sc needs to be launched from the Science Policy perspective if any government mandated pro-OA policy changes are to be effected. This paper, then, is an attempt at taking the OA discussion beyond the LIS arena and into the realm of Science and Innovation Policy. Using Innovation Theory as its theoretical framework, it is argued that Open Access scholarly communication can only serve to bolster Innovation Systems, be they national, regional, or sectoral. The case of South Africa is taken as an illustrative example, though the case can and will be generalised to beyon...

  2. Access control issues in social networks

    OpenAIRE

    Carreras Coch, Anna; Rodríguez Luna, Eva; Delgado Mercè, Jaime; Maroñas Borras, Xavier

    2010-01-01

    Social Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies in Social Networks. Subsequently, two main issues are addressed: the interoperability amongst systems using different policy languages and the lack of elements in the existing policy languages when trying to express Social Networks’ access control. In part...

  3. Distributed Access Control Policies for Spectrum Sharing

    OpenAIRE

    Baldini, Gianmarco; NAI-FOVINO Igor; Trombetta, Alberto; Braghin, Stefano

    2012-01-01

    Cognitive Radio (CR) is a novel wireless communication technology that allows for adaptive configuration of the reception parameters of a terminal, based on the information collected from the environment. Cognitive radio (CR) technology can be used in innovative spectrum management approaches like spectrum sharing, where radio frequency spectral bands can be shared among various users through a dynamic exclusive-use spectrum access model. Spectrum sharing can be applied to various...

  4. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  5. [Ethics in pediatric emergencies: Care access, communication, and confidentiality].

    Science.gov (United States)

    Benoit, J; Berdah, L; Carlier-Gonod, A; Guillou, T; Kouche, C; Patte, M; Schneider, M; Talcone, S; Chappuy, H

    2015-05-01

    Children suffer most from today's increasing precariousness. In France, access to care is available for all children through various structures and existing measures. The support for foreign children is overseen by specific legislation often unfamiliar to caregivers. Pediatric emergencies, their location, organization, actors, and patient flow are a particular environment that is not always suitable to communication and may lead to situations of abuse. Communication should not be forgotten because of the urgency of the situation. The place of the child in the dialogue is often forgotten. Considering the triangular relationship, listening to the child and involving the parents in care are the basis for a good therapeutic alliance. Privacy and medical confidentiality in pediatric emergencies are governed by law. However, changes in treatments and medical practices along with the variety of actors involved imply both individual and collective limitations, to the detriment of medical confidentiality.

  6. Non-Orthogonal Multiple Access for Visible Light Communications

    Science.gov (United States)

    Marshoud, Hanaa; Kapinas, Vasileios M.; Karagiannidis, George K.; Muhaidat, Sami

    2016-01-01

    The main limitation of visible light communication (VLC) is the narrow modulation bandwidth, which reduces the achievable data rates. In this paper, we apply the non-orthogonal multiple access (NOMA) scheme to enhance the achievable throughput in high-rate VLC downlink networks. We first propose a novel gain ratio power allocation (GRPA) strategy that takes into account the users' channel conditions to ensure efficient and fair power allocation. Our results indicate that GRPA significantly enhances system performance compared to the static power allocation. We also study the effect of tuning the transmission angles of the light emitting diodes (LEDs) and the field of views (FOVs) of the receivers, and demonstrate that these parameters can offer new degrees of freedom to boost NOMA performance. Simulation results reveal that NOMA is a promising multiple access scheme for the downlink of VLC networks.

  7. OVERSAMPLED CHAOTIC BINARY SEQUENCES FOR MULTGIPLE ACCESS COMMUNICATION

    Institute of Scientific and Technical Information of China (English)

    ZhongHongtao; WangHuiyun; 等

    2002-01-01

    Noise interference and multiple access interference are the main impairment to the performance of DS/CDMA communication system.This letter presents that OverSampled Chaotic Map(OSCM)binary sequences are secure as spreading sequences,and based on the optimal quantizing method,the BER performance of the system has been derived in detail,the internal relationships among the number of users,the power of noise and the lengh of code chips are revealed in mathematical formulae.The performance of the system can be improved by employing these formulae.Numerical results conform the efficiency of discussion in this letter.

  8. OVERSAMPLED CHAOTIC BINARY SEQUENCES FOR MULTIPLE ACCESS COMMUNICATION

    Institute of Scientific and Technical Information of China (English)

    Zhang Hongtao; Wang Huiyun; Ding Runtao

    2002-01-01

    Noise interference and multiple access interference are the main impairment to the performance of DS/CDMA communication system. This letter presents that OverSampled Chaotic Map (OSCM) binary sequences are secure as spreading sequences, and based on the optimal quantizing method, the BER performance of the system has been derived in detail, the internal relationships among the number of users, the power of noise and the length of code chips are revealed in mathematical formulae. The performance of the system can be improved by employing these formulae. Numerical results conform the efficiency of discussion in this letter.

  9. Communicable Diseases and Outbreak Control.

    Science.gov (United States)

    Ameli, Jonathan

    2015-10-01

    Infectious disease during an emergency condition can raise the death rate 60 times in comparison to other causes including trauma. An epidemic, or outbreak, can occur when several aspects of the agent (pathogen), population (hosts), and the environment create an ideal situation for spread. Overcrowding, poor regional design and hygiene due to poverty, dirty drinking water, rapid climate changes, and natural disasters, can lead to conditions that allow easier transmission of disease. Once it has been established that an emergency condition exists, there must be a prompt and thorough response for communicable disease control. A camp should be created, and the disease managed rapidly. The overall goals are rapid assessment, prevention, surveillance, outbreak control, and disease management. PMID:27437528

  10. Promotion of access to essential medicines for non-communicable diseases : practical implications of the UN political declaration

    NARCIS (Netherlands)

    Hogerzeil, Hans V.; Liberman, Jonathan; Wirtz, Veronika J.; Kishore, Sandeep P.; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N.; von Schoen-Angerer, Tido

    2013-01-01

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and v

  11. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  12. Towards Communication and Information Access for Deaf People

    Directory of Open Access Journals (Sweden)

    Edwin Blake

    2014-10-01

    Full Text Available In tightly circumscribed communication situations an interactive system resident on a mobile device can assist Deaf people with their communication and information needs. The Deaf users considered here use South African Sign Language and information is conveyed by a collection of pre-recorded video clips and images. The system was developed according to our method of community-based co-design. We present several stages of the development as a series of case studies and highlight our experience. The first stage involved ethnographically inspired methods such as cultural probes. In the next stage we co-designed a medical consultation system that was ultimately dropped for technical reasons. A smaller system was developed for pharmaceutical dispensing and successfully implemented and tested. It now awaits deployment in an actual pharmacy. We also developed a preliminary authoring tool to tackle the problem of content generation for interactive computer literacy training. We are also working on another medical health information tool. We intend that a generic authoring tool be able to generate mobile applications for all of these scenarios. These mobile applications bridge communication gaps for Deaf people via accessible and affordable assistive technology.

  13. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Directory of Open Access Journals (Sweden)

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  14. Performance estimates for personnel access control systems

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  15. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  16. An Access Definition and Query Language : Towards a Unified Access Control Model

    OpenAIRE

    Sonnenbichler, Andreas

    2013-01-01

    In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of rights, ego-centered roles, and decentralized administration. The suggested meta access control model is named \\'\\'Access Definition and Query Language\\'\\' (ADQL). ADQL is represented by a formal, context-free grammar allowing to express the targeted access control model, policies, facts, and access queries as a formal language.

  17. Role-based access control in retrospect

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Wieringa, Roel

    2012-01-01

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of R

  18. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  19. Atom-Role-Based Access Control Model

    Science.gov (United States)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  20. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming;

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...

  1. A QUANTUM MULTIPLE ACCESS COMMUNICATIONS SCHEME USING ORBITAL ANGULAR MOMENTUM

    Institute of Scientific and Technical Information of China (English)

    Dong Xiaoliang; Zhao Shengmei; Zheng Baoyu

    2013-01-01

    We propose a quantum multiple access communications scheme using Orbital Angular Momentum (OAM) sector states in the paper.In the scheme,each user has an individual modified Poincare Bloch sphere and encodes his information with his own corresponding sector OAM states.A prepared entangled photon pairs are separated at transmitter and receiver.At the transmitter,each user encodes his information with the sector OAM states on the photons and the superposition of the different sector OAM states is carried by the photons.Then the photons are transmitted through quantum noiseless channel to the receiver.At the receiver,each user could retrieve his information by coincidently measuring the transmitted photons with the receiver side photons which are modulated by a special prepared measurement basis.The theoretical analysis and the numerical simulations show that each user could get his information from the superposition state without error.It seems that this scheme provides a novel method for quantum multiple users communications.

  2. Communication for command and control systems

    CERN Document Server

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  3. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    Directory of Open Access Journals (Sweden)

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  4. Tag Content Access Control with Identity-based Key Exchange

    Science.gov (United States)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  5. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  6. Cross-layer rate control, medium access control and routing design in cooperative VANET

    OpenAIRE

    Zhou, Liang; Zheng, Baoyu; Geller, Benoit; Wei, Anne; Xu, Shan; Li, Yajun

    2008-01-01

    In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-layer design. At first, we introduce the cooperative communication conception to VANET, and propose an opportunistic cooperation strategy to improve the system performance. And then, we develop a cross-layer solution which consists of the link capacity detection with adjusting persistence probability at the MAC Layer, th...

  7. Measurement Based Self-Optimization in Random Access Communications

    CERN Document Server

    Giovanidis, Anastasios; Stanczak, Slawomir

    2011-01-01

    This work considers a single-cell random access channel in cellular wireless networks and provides an algorithmic approach to the problem of optimal coordination of user actions. In the scenario considered, an access effort is successful if (a) the signal is detected at the receiver and (b) no collision occurs. The first event is controlled by the user transmission power while the second one by the choice of access (back-off) probability. These constitute the user action pair. The algorithm aims at exploiting information from measurements and user reports, in order to estimate current values of the system situation. Based on these estimates, two optimization problems can be formulated and solved for the so called contention level and transmission power level at the base station side. The methodology to find the optimal values is based on minimization of a drift function. The two values are broadcast in order to help the users update their actions ``almost optimally``. In this way the wireless cell can achieve...

  8. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  9. Communication and control for networked complex systems

    CERN Document Server

    Peng, Chen; Han, Qing-Long

    2015-01-01

    This book reports on the latest advances in the study of Networked Control Systems (NCSs). It highlights novel research concepts on NCSs; the analysis and synthesis of NCSs with special attention to their networked character; self- and event-triggered communication schemes for conserving limited network resources; and communication and control co-design for improving the efficiency of NCSs. The book will be of interest to university researchers, control and network engineers, and graduate students in the control engineering, communication and network sciences interested in learning the core principles, methods, algorithms and applications of NCSs.

  10. External access to ALICE controls conditions data

    Science.gov (United States)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  11. An Access Control Model of Virtual Machine Security

    Directory of Open Access Journals (Sweden)

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  12. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  13. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  14. An Enhanced Multiple Random Access Scheme for Satellite Communications

    CERN Document Server

    Bui, Huyen-Chi; Boucheret, Marie-Laure

    2011-01-01

    In this paper, we introduce Multi-Slots Coded ALOHA (MuSCA) as a multiple random access method for satellite communications. This scheme can be considered as a generalization of the Contention Resolution Diversity Slotted Aloha (CRDSA) mechanism. Instead of transmitting replicas, this system replaces them by several parts of a single word of an error correcting code. It is also different from Coded Slotted ALOHA (CSA) as the assumption of destructive collisions is not adopted. In MuSCA, the entity in charge of the decoding mechanism collects all bursts of the same user (including the interfered slots) before decoding and implements a successive interference cancellation (SIC) process to remove successfully decoded signals. Simulations show that for a frame of 100 slots, the achievable total normalized throughput is greater than 1.25 and 1.4 for a frame of 500 slots, resulting in a gain of 80% and 75% with respect to CRDSA and CSA respectively. This paper is a first analysis of the proposed scheme and opens se...

  15. Internal communications for the control centres

    Science.gov (United States)

    Leroy, Jean-Marie

    1990-10-01

    The control centers' internal communication requirements are reviewed, outlining the types of messages and further defining the internal communication functions to be performed. A brief local area network (LAN) tradeoff analysis is performed, concluding that most of the communication services can be covered by a modern high speed LAN (HSLN) or broadband metropolitan area network (MAN), such as the emerging fiber distributed data interface (FDDI-2) or the queued packet synchronous switch/distributed queue dual bus (QPSX/DQDB).

  16. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  17. 47 CFR 1.1805 - Federal Communications Commission Section 504 Programs and Activities Accessibility Handbook.

    Science.gov (United States)

    2010-10-01

    ... Communications Commission Section 504 Programs and Activities Accessibility Handbook. The Consumer & Governmental... 47 Telecommunication 1 2010-10-01 2010-10-01 false Federal Communications Commission Section 504 Programs and Activities Accessibility Handbook. 1.1805 Section 1.1805 Telecommunication...

  18. Fulfilling the Promise of Scholarly Communication – a Comparison Between Old and New Access Models

    OpenAIRE

    David C. Prosser

    2005-01-01

    The convergence of dissatisfaction with traditional, subscription-based business model for scholarly communications and the development of new, digital technologies allow us to look consider the claims of new models. This paper describes the requirements of a scholarly communication system and investigates which model – subscription-based access or open access – best satisfies these requirements.

  19. Promotion of access to essential medicines for Non-Communicable Diseases: Practical implications of the UN Political Declaration

    OpenAIRE

    Hogerzeil, Hans V; Liberman, Jonathan; Wirtz, Veronika J.; Kishore, Sandeep P; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N; von Schoen-Angerer, Tido

    2013-01-01

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and vaccines for such diseases. 30 years of experience with policies for essential medicines and 10 years of scaling up of HIV treatment have provided the knowledge needed to address barriers to long-te...

  20. Willingness to Communicate and Action Control

    Science.gov (United States)

    MacIntyre, Peter D.; Doucette, Jesslyn

    2010-01-01

    Being willing to communicate is part of becoming fluent in a second language, which often is the ultimate goal of L2 learners. Julius Kuhl's theory of action control is introduced as an expansion of the conceptual framework for the study of Willingness to Communicate. Kuhl proposed three key concepts, preoccupation, volatility, and hesitation,…

  1. Open Access in the Natural and Social Sciences: The Correspondence of Innovative Moves to Enhance Access, Inclusion and Impact in Scholarly Communication

    Science.gov (United States)

    Armbruster, Chris

    2008-01-01

    Online, open access is the superior model for scholarly communication. A variety of scientific communities in physics, the life sciences and economics have gone furthest in innovating their scholarly communication through open access, enhancing accessibility for scientists, students and the interested public. Open access enjoys a comparative…

  2. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  3. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com- plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an im......Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com- plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged...

  4. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  5. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  6. WP EMPLACEMENT CONTROL AND COMMUNICATION EQUIPMENT DESCRIPTIONS

    Energy Technology Data Exchange (ETDEWEB)

    N.T. Raczka

    1997-10-02

    The objective and scope of this document are to list and briefly describe the major control and communication equipment necessary for waste package emplacement at the proposed nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the required equipment are explained and summarized in the individual subsections of this document. This task was evaluated in accordance with QAP-2-0 and found not to be quality affecting. Therefore, this document was prepared in accordance with NAP-MG-012. The following control and communication equipment are addressed in this document: (1) Programmable Logic Controllers (PLC's); (2) Leaky Feeder Radio Frequency Communication Equipment; (3) Slotted Microwave guide Communication Equipment; (4) Vision Systems; (5) Radio Control Equipment; and (6) Enclosure Cooling Systems.

  7. Viewpoints on control of military satellite communications

    Science.gov (United States)

    Heppe, S. B.

    1983-07-01

    The three main factors are system management, communication protocols, and the control system architecture. Each of these is analyzed here in terms of a model. The model for system management is the definition of system control of the Defense Communications System, referred to as DCS syscon. The model for communication protocols is referred to as the ISO model of OSI, ISO denoting the International Standards Organization and OSI denoting open systems interconnection. The model of the control system architecture is an elemental model. The interplay between the models is highlighted. Examples are presented from the Defense Satellite Communications System and from MILSTAR. Prospects for the future are considered in view of the integration expected as systems become more capable and sophisticated. It is expected that many of the real-time control functions performed at the worldwide and theater levels will be automated on the satellite.

  8. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  9. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova;

    2015-01-01

    is connected via a communication network to the sensors and actuators on the asset. Such a distributed control scheme may be implemented over a communication network that introduces delay and possibly also message loss. In this paper, we look at the impact of such an imperfect communication network on a wind...... farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance...

  10. Advances in Control and Communication

    CERN Document Server

    2012-01-01

    With success of ICEEE 2010 in Wuhan, China, and December 4 to 5, 2010, the second International Conference of Electrical and Electronics Engineering (ICEEE 2011) will be held in Macau, China, and December 1 to 2, 2011. ICEEE is an annual conference to call together researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Electrical and Electronics Engineering along with Computer Science and Technology, Communication Technology, Artificial Intelligence, Information Technology, etc.   This year ICEEE is sponsored by International Industrial Electronics Center, Hong Kong. And based on the deserved reputation, more than 750 papers have been submitted to ICEEE 2011, from which 92 high quality original papers have been selected for the conference presentation and inclusion in the “Future Information Technology and Computer Engineering” book based on the referees’ comments from peer-refereed.     We expec...

  11. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area...

  12. NOVANET: communications network for a control system

    International Nuclear Information System (INIS)

    NOVANET is a control system oriented fiber optic local area network that was designed to meet the unique and often conflicting requirements of the Nova laser control system which will begin operation in 1984. The computers and data acquisition devices that form the distributed control system for a large laser fusion research facility need reliable, high speed communications. Both control/status messages and experimental data must be handled. A subset of NOVANET is currently operating on the two beam Novette laser system

  13. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  14. Communication for Inquiry and Access: Teaching Techniques from Discourse Research

    Science.gov (United States)

    Staats, Susan; Duranczyk, Irene; Moore, Randy; Hatch, Jay; Jensen, Murray; Somdahl, Charles

    2006-01-01

    Adopting inquiry-based science and mathematics pedagogies changes traditional classroom communication patterns. Linguistic research in science and mathematics classrooms has identified communication techniques that help teachers manage classroom discussions to increase student interaction and a sense of student responsibility for learning. These…

  15. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, J.; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the secur

  16. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.;

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  17. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  18. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  19. Smart Grid Control and Communication

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Pedersen, Rasmus; Kristensen, Thomas le Fevre;

    2015-01-01

    ) and the quality of the power may become costly. In this light, Smart Grids may provide an answer towards a more active and efficient electrical network. The EU project SmartC2Net aims to enable smart grid operations over imperfect, heterogeneous general purpose networks, which poses a significant challenge...... to the reliability due to the stochastic behavior found in such networks. Therefore, key concepts are presented in this paper targeting the support of proper smart grid control in these network environments and its Real-Time Hardware-In-the Loop (HIL) verification. An overview on the required Information......The expected growth in distributed generation will significantly affect the operation and control of today's distribution grids. Being confronted with fast fluctuating power from distributed generations, the assurance of a reliable service (grid stability, avoidance of energy losses...

  20. THE INFLUENCE OF FORMAL COMMUNICATION IN THE PROCESS OF ACCESSING EUROPEAN FUNDS

    Directory of Open Access Journals (Sweden)

    Luminita Zait

    2014-07-01

    Full Text Available Present article aims, based on direct research, to identify of main sources of information in the process of accessing European funds. Performed within Trotus Valley, Bacau, the proposed research provides pertinent information from the perspective of the main sources of influence on the manifestation of interest in accessing funding and in terms of highlighting the influence of various socio-demographic variables on such information sources. According to the Romanian experience of accessing European funds, apparently formal communication efforts prove ineffective, being less reliable and stimulating compared to the informal interpersonal communication. Because most of the potential beneficiaries of EU funds precept this process as one dominated by sinuous and powerful bureaucracy, we tend to believe that in the expressions of interest in accessing EU funds, formal communication only meet the cognitive structure of attitude, affective and conative entering under the influence of informal communication.

  1. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  2. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.;

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  3. Future Computer, Communication, Control and Automation

    CERN Document Server

    2011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume topics covered include wireless communications, advances in wireless video, wireless sensors networking, security in wireless networks, network measurement and management, hybrid and discrete-event systems, internet analytics and automation, robotic system and applications, reconfigurable automation systems, machine vision in automation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  4. Verifying Resource Access Control on Mobile Interactive Devices

    OpenAIRE

    Besson, Frédéric; Dufay, Guillaume; Jensen, Thomas; Pichardie, David

    2010-01-01

    A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operation...

  5. 76 FR 21741 - Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town...

    Science.gov (United States)

    2011-04-18

    ... COMMISSION Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town... Programming Accessibility Act (the Act or CVAA) hosted by the California State University at Northridge (CSUN... and video programming changes required by the Act. DATES: The Town Hall meeting was held on...

  6. A Group-oriented Access Control Scheme for P2P Networks

    OpenAIRE

    Wang Xiaoming; Cheng Fan

    2011-01-01

    A group-oriented access control scheme is proposed for P2P (peer to peer) networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can...

  7. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon

    OpenAIRE

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with o...

  8. Adaptive quality control for multimedia communications

    Directory of Open Access Journals (Sweden)

    Santichai Chuaywong

    2008-01-01

    Full Text Available Multimedia communications are communications with several types of media, such as audio, video and data. The current Internet has some levels of capability to support multimedia communications, unfortunately, the QoS (Quality of Service is still challenging. A large number of QoS mechanisms has been proposed; however, the main concern is for low levels, e.g. layer 2 (Data Link or 3 (Transport. In this paper, mechanisms for control the quality of audio and video are proposed. G.723.1 and MPEG-4 are used as the audio and video codec respectively. The proposed algorithm for adaptive quality control of audio communication is based on forward error correction (FEC. In the case of video communication, the proposed algorithm adapts the value of key frame interval, which is an encoding parameter of MPEG-4. We evaluated our proposed algorithms by computer simulation. We have shown that, in most cases, the proposed scheme gained a higher throughput compared to other schemes.

  9. p-BioSPRE-an information and communication technology framework for transnational biomaterial sharing and access.

    Science.gov (United States)

    Weiler, Gabriele; Schröder, Christina; Schera, Fatima; Dobkowicz, Matthias; Kiefer, Stephan; Heidtke, Karsten R; Hänold, Stefanie; Nwankwo, Iheanyi; Forgó, Nikolaus; Stanulla, Martin; Eckert, Cornelia; Graf, Norbert

    2014-01-01

    Biobanks represent key resources for clinico-genomic research and are needed to pave the way to personalised medicine. To achieve this goal, it is crucial that scientists can securely access and share high-quality biomaterial and related data. Therefore, there is a growing interest in integrating biobanks into larger biomedical information and communication technology (ICT) infrastructures. The European project p-medicine is currently building an innovative ICT infrastructure to meet this need. This platform provides tools and services for conducting research and clinical trials in personalised medicine. In this paper, we describe one of its main components, the biobank access framework p-BioSPRE (p-medicine Biospecimen Search and Project Request Engine). This generic framework enables and simplifies access to existing biobanks, but also to offer own biomaterial collections to research communities, and to manage biobank specimens and related clinical data over the ObTiMA Trial Biomaterial Manager. p-BioSPRE takes into consideration all relevant ethical and legal standards, e.g., safeguarding donors' personal rights and enabling biobanks to keep control over the donated material and related data. The framework thus enables secure sharing of biomaterial within open and closed research communities, while flexibly integrating related clinical and omics data. Although the development of the framework is mainly driven by user scenarios from the cancer domain, in this case, acute lymphoblastic leukaemia and Wilms tumour, it can be extended to further disease entities. PMID:24567758

  10. Communicating the Open Access Message: A Case Study from Ireland

    Science.gov (United States)

    Lawton, Aoife

    2016-01-01

    Since 2009, Open Access (OA) Week has been celebrated worldwide in October each year. It is an opportunity for librarians to engage with the research community and demonstrate the value that they bring to their organisations in the area of disseminating scholarly output. Although thousands of events have been held since the inception of OA Week, a…

  11. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  12. 47 CFR 90.465 - Control of systems of communication.

    Science.gov (United States)

    2010-10-01

    ... communication or control by the mobile station operator of the licensee. (b) In internal systems, as defined in... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control of systems of communication. 90.465... communication. (a) Depending on design considerations, control of a system of communication may be exercised...

  13. A Formal Model of Access Control for Mobile Interactive Devices

    OpenAIRE

    Besson, Frédéric; Dufay, Guillaume; Jensen, Thomas

    2006-01-01

    This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Javaenabled mobile telephones. We consider access control permissions with multiplicities in order to allow to use a permission a certain number of times. An operational semantics of the model and a formal definition of what it means for...

  14. Networked Control Systems: The Communication Basics and Control Methodologies

    Directory of Open Access Journals (Sweden)

    Yun-Bo Zhao

    2015-01-01

    Full Text Available As an emerging research field, networked control systems have shown the increasing importance and attracted more and more attention in the recent years. The integration of control and communication in networked control systems has made the design and analysis of such systems a great theoretical challenge for conventional control theory. Such an integration also makes the implementation of networked control systems a necessary intermediate step towards the final convergence of control, communication, and computation. We here introduce the basics of networked control systems and then describe the state-of-the-art research in this field. We hope such a brief tutorial can be useful to inspire further development of networked control systems in both theory and potential applications.

  15. Recursive estimation algorithms for power controls of wireless communication networks

    Institute of Scientific and Technical Information of China (English)

    Gang George YIN; Chin-An TAN; Le Yi WANG; Chengzhong XU

    2008-01-01

    Power control problems for wireless communication networks are investigated in direct-sequence codedivision multiple-access(DS/CDMA)channels.It is shown that the underlying problem can be formulated as a constrained optimization problem in a stochastic framework.For effective solutions to this optimization problem in real time,recursive algorithms of stochastic approximation type are developed that can solve the problem with unknown system components.Under broad conditions,convergence of the algorithms is established by using weak convergence methods.

  16. Science and society: the communications revolution and cancer control.

    Science.gov (United States)

    Viswanath, K

    2005-10-01

    Advances in communications technology, particularly with regards to computer-based media, have opened up exciting possibilities to intervene and influence the trajectory of cancer control, from disease prevention to survivorship, and to reduce the cancer burden. The resulting explosion in cancer information in the mass media and on the Internet, however, also offers challenges in terms of equality in access to information and the ability to act on it, as well as in making sure that it is accurate, readily available and easy to use. PMID:16195753

  17. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    The electrical power infrastructure is facing a transition from a largely centralised distribution infrastructure with a few large power plants to an increasingly distributed infrastructure that must incorporate privately owned and operated power generation units based on fuel cells or sustainable...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...

  18. Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access

    NARCIS (Netherlands)

    Pawelczak, P.; Pollin, S.; So, H.-S.W.; Bahai, A.R.S.; Prasad, R.V.; Hekmat, R.

    2009-01-01

    In this paper, different control channel (CC) implementations for multichannel medium access control (MAC) algorithms are compared and analyzed in the context of opportunistic spectrum access (OSA) as a function of spectrum-sensing performance and licensed user activity. The analysis is based on a d

  19. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  20. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  1. Advances in Computer, Communication, Control and Automation

    CERN Document Server

    011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume  topics covered include signal and Image processing, speech and audio Processing, video processing and analysis, artificial intelligence, computing and intelligent systems, machine learning, sensor and neural networks, knowledge discovery and data mining, fuzzy mathematics and Applications, knowledge-based systems, hybrid systems modeling and design, risk analysis and management, system modeling and simulation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  2. Law-Aware Access Control and its Information Model

    CERN Document Server

    Stieghahn, Michael

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  3. Privacy Enhanced Access Control by Means of Policy Blinding

    NARCIS (Netherlands)

    Sedghi, Saeed; Hartel, Pieter; Jonker, Willem; Nikova, Svetla; Bao, Feng; Weng, Jian

    2011-01-01

    Traditional techniques of enforcing an access control policy rely on an honest reference monitor to enforce the policy. However, for applications where the resources are sensitive, the access control policy might also be sensitive. As a result, an honest-but-curious reference monitor would glean som

  4. Dynamic User Role Assignment in Remote Access Control

    NARCIS (Netherlands)

    Saffarian, Mohsen; Tang, Qiang; Jonker, Willem; Hartel, Pieter

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  5. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  6. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  7. Optoelectronic Receiver For Communication And Control

    Science.gov (United States)

    Kunath, Richard; Bendett, Mark; Mactaggart, I. Ross

    1994-01-01

    Many operational and diagnostic features integrated into circuit chip. GaAs-based integrated circuit designed to serve as optoelectronic interface in phased-array antenna. Intended function to receive digital control signals transmitted on optical fiber and to convert signals to electronic control signals, which then applied to monolithic microwave integrated circuit (MMIC). Also used in reception of high-rate optical digital communications within computers, between computers, and in signal-distribution systems in aircraft, automobiles, and ships. Interface circuit represents significant improvement over preexisting interface circuits in that its clock-signal-recovery subcircuit requires little or no preamble for immediate synchronization.

  8. A Model of Workflow-oriented Attributed Based Access Control

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2011-02-01

    Full Text Available the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC, and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  9. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  10. Control and estimation methods over communication networks

    CERN Document Server

    Mahmoud, Magdi S

    2014-01-01

    This book provides a rigorous framework in which to study problems in the analysis, stability and design of networked control systems. Four dominant sources of difficulty are considered: packet dropouts, communication bandwidth constraints, parametric uncertainty, and time delays. Past methods and results are reviewed from a contemporary perspective, present trends are examined, and future possibilities proposed. Emphasis is placed on robust and reliable design methods. New control strategies for improving the efficiency of sensor data processing and reducing associated time delay are presented. The coverage provided features: ·        an overall assessment of recent and current fault-tolerant control algorithms; ·        treatment of several issues arising at the junction of control and communications; ·        key concepts followed by their proofs and efficient computational methods for their implementation; and ·        simulation examples (including TrueTime simulations) to...

  11. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    Science.gov (United States)

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources.

  12. Communication Timing Control with Interference Detection for Wireless Sensor Networks

    OpenAIRE

    Kokuke Sekiyama; Yuki Kubo

    2006-01-01

    This paper deals with a novel communication timing control for wireless networks and radio interference problem. Communication timing control is based on the mutual synchronization of coupled phase oscillatory dynamics with a stochastic adaptation, according to the history of collision frequency in communication nodes. Through local and fully distributed interactions in the communication network, the coupled phase dynamics self-organizes collision-free communication. In wireless communicatio...

  13. Efficient Controlled Quantum Secure Direct Communication Protocols

    Science.gov (United States)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  14. Random Access for Machine-Type Communication based on Bloom Filtering

    DEFF Research Database (Denmark)

    Pratas, Nuno; Stefanovic, Cedomir; Madueño, Germán Corrales;

    2016-01-01

    We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a signature during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity...... utilizes the system resources more efficiently and achieves similar or lower latency of connection establishment in case of synchronous arrivals, compared to the variant of the LTE-A access protocol that is optimized for MTC traffic. A dividend of the proposed method is that allows the base station (BS...

  15. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  16. Studying the Feasibility and Importance of Optical Access Network Strategies in the Information and Communication Environment

    Directory of Open Access Journals (Sweden)

    Dr.S.S.Riaz Ahamed

    2010-05-01

    Full Text Available The access network has consistently been regarded as a bottleneck in the provisioning of data communication services. This is primarily because the bandwidth available has lagged behind that provided within local-area networks (LANs and in the upper echelons of the network (in metropolitan and core networks, for example, where concentration factors and economies of scale have allowed optical fiber to unleash significant bandwidth capacity. The optical access network is that part of the access network implemented using optical fiber. Optical access offers the promise of greatly increased access-network bandwidth by up to several gigabits per second (Gbps—and most likely more, as technology advances. This bandwidth availability opens up new architectural possibilities for the provisioning of high-bandwidth services.

  17. Access to Scholarly Communication in Higher Education in India: Trends in Usage Statistics via INFLIBNET

    Science.gov (United States)

    Chand, Prem; Arora, Jagdish

    2008-01-01

    Purpose: The purpose of this paper is to describe the initiative of the University Grants Commission of India in setting up the Infonet Digital Library Consortium (The Information and Library Network) in order to provide access to scholarly communication to the academic community in India. Design/methodology/approach: The context of higher…

  18. An Ecological Perspective on U.S. Latinos' Health Communication Behaviors, Access, and Outcomes

    Science.gov (United States)

    Katz, Vikki S.; Ang, Alfonso; Suro, Roberto

    2012-01-01

    U.S. Latinos experience constrained access to formal health care resources, contributing to higher incidence of preventable diseases and chronic health conditions than the general population. The authors explore whether a rich set of informal health communication connections--to friends, family, radio, television, Internet, newspapers, magazines,…

  19. Institutional Repositories, Open Access, and Scholarly Communication: A Study of Conflicting Paradigms

    Science.gov (United States)

    Cullen, Rowena; Chawner, Brenda

    2011-01-01

    The Open Access movement of the past decade, and institutional repositories developed by universities and academic libraries as a part of that movement, have openly challenged the traditional scholarly communication system. This article examines the growth of repositories around the world, and summarizes a growing body of evidence of the response…

  20. Videophone Technology and Students with Deaf-Blindness: A Method for Increasing Access and Communication

    Science.gov (United States)

    Emerson, Judith; Bishop, John

    2012-01-01

    Introduction: Seeing the Possibilities with Videophone Technology began as research project funded by the National Center for Technology Innovation. The project implemented a face-to-face social networking program for students with deaf-blindness to investigate the potential for increasing access and communication using videophone technology.…

  1. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  2. A new access control system by fingerprint for radioisotope facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  3. Access control management for e-Healthcare in cloud environment

    Directory of Open Access Journals (Sweden)

    Lili Sun

    2014-03-01

    Full Text Available Data outsourcing is a major component for cloud computing that allows data owners to distribute resources to external services for users and organizations who can apply the resources. A crucial problem for owners is how to make sure their sensitive information accessed by legitimate users only using the trusted services but not authorized to read the actual information. With the increased development of cloud computing, it brings challenges for data security and access control when outsourcing users’ data and sharing sensitive data in cloud environment since it is not within the same trusted domain as data owners’. Access control policies have become an important issue in the security filed in cloud computing. Semantic web technologies represent much richer forms of relationships among users, resources and actions among different web applications such as clouding computing. However, Semantic web applications pose new requirements for security mechanisms especially in the access control models. This paper addresses existing access control methods and presents a semantic based access control model which considers semantic relations among different entities in cloud computing environment. We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system. This work shows how the semantic web technology provides efficient solutions for the management of complex and distributed data in heterogeneous systems, and it can be used in the medical information systems as well.

  4. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  5. Space-division multiple access for CDMA multiuser underwater acoustic communications

    Institute of Scientific and Technical Information of China (English)

    Jingwei Yin; Pengyu Du; Guang Yang; Huanling Zhou

    2015-01-01

    Time reversal mirror (TRM) can use the physical cha-racteristics of the underwater acoustic (UWA) channel to focus on the desired user in multi-user UWA communication. The active average sound intensity (AASI) detector can estimate al azimuths of users with the same frequency band at the same time in or-der to achieve directional communication by vector combination. Space-division multiple access (SDMA) based on TRM combined with the AASI detector is proposed in this paper, which can make the capacity of the code division multiple access (CDMA) UWA system significantly increase. The simulation and lake test results show that the 7-user UWA multi-user system can achieve low bit error communication.

  6. A New Signaling Architecture THREP with Autonomous Radio-Link Control for Wireless Communications Systems

    Science.gov (United States)

    Hirono, Masahiko; Nojima, Toshio

    This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.

  7. Modeling Access Control Policy of a Social Network

    Directory of Open Access Journals (Sweden)

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  8. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  9. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Energy Technology Data Exchange (ETDEWEB)

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  10. A United Access Control Model for Systems in Collaborative Commerce

    OpenAIRE

    Ruo-Fei Han; Hou-Xiang Wang; Qian Xiao; Xiao-Pei Jing; Hui Li

    2009-01-01

    The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management...

  11. A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2015-01-01

    Full Text Available A digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN. The scheme is founded on the access control scheme on the basis of characteristic expression (named CEB scheme. Data is divided by characteristics and the key for encryption is related to characteristic expression. Only the key matching with characteristic expression can decrypt the data. Meanwhile, three distributed certificate detection methods are designed to prevent the certificate from being misappropriated by hostile anonymous users. When a user starts query, the key access control method can judge whether the query is valid. In this case, the scheme can achieve public certificate of users and effectively protect query privacy as well. The security analysis and experiments show that the proposed scheme is superior in communication overhead, storage overhead, and detection probability.

  12. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  13. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  14. Remote device access in the new accelerator controls middleware

    CERN Document Server

    Baggiolini, V; Jensen, S; Kostro, K; Risso, A; Trofimov, N N; SL

    2001-01-01

    This paper presents the Remote Device Access (RDA) package developed at CERN in the framework of the joint PS/SL Controls Middleware project. The package design reflects the Accelerator Device Model in which devices, named entities in the control system, can be controlled via properties. RDA implements this model in a distributed environment with devices residing in servers that can run anywhere in the controls network. It provides a location-independent and reliable access to the devices from control programs. By invoking the device access methods, clients can read, write and subscribe to device property values. We describe the architecture and design of RDA its API, and CORBA-based implementations in Java and C++. First applications of RDA in the CERN accelerator control systems are described as well.

  15. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  16. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    Science.gov (United States)

    Ha, Tri T.; Pratt, Timothy

    1989-05-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  17. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir;

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated b...... subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems.......The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated...... by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system...

  18. Promotion of access to essential medicines for non-communicable diseases: practical implications of the UN political declaration.

    Science.gov (United States)

    Hogerzeil, Hans V; Liberman, Jonathan; Wirtz, Veronika J; Kishore, Sandeep P; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N; von Schoen-Angerer, Tido

    2013-02-23

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and vaccines for such diseases. 30 years of experience with policies for essential medicines and 10 years of scaling up of HIV treatment have provided the knowledge needed to address barriers to long-term effective treatment and prevention of NCDs. More medicines can be acquired within existing budgets with efficient selection, procurement, and use of generic medicines. Furthermore, low-income and middle-income countries need to increase mobilisation of domestic resources to cater for the many patients with NCDs who do not have access to treatment. Existing initiatives for HIV treatment offer useful lessons that can enhance access to pharmaceutical management of NCDs and improve adherence to long-term treatment of chronic illness; policy makers should also address unacceptable inequities in access to controlled opioid analgesics. In addition to off-patent medicines, governments can promote access to new and future on-patent medicinal products through coherent and equitable health and trade policies, particularly those for intellectual property. Frequent conflicts of interest need to be identified and managed, and indicators and targets for access to NCD medicines should be used to monitor progress. Only with these approaches can a difference be made to the lives of hundreds of millions of current and future patients with NCDs. PMID:23410612

  19. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  20. Face recognition in controlled access points

    OpenAIRE

    Mur Escartín, Olga

    2009-01-01

    The thesis consist in the study and evaluation of different methods for face recognition. The final objective is to select the most suitable techniques for face detection and recognition. Some of these techniques will be intergrated in a real time demontrator which will be a preliminary prototype that will have to work in controlled conditions (for ilumination and pose) and with reduced databases. The demonstrator will be done in Matlab and the main image acquisition rotines and face detectio...

  1. A United Access Control Model for Systems in Collaborative Commerce

    Directory of Open Access Journals (Sweden)

    Ruo-Fei Han

    2009-06-01

    Full Text Available The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management of internal functions is of the same importance as external service management. It is very troublesome to control authorizations merely with attributes and composition of policies introduced from attribute-based access control (ABAC. So, we introduce a united access control model for systems in collaborative commerce, combining the advantages of conventional role-based access control (RBAC, task-based authentication control (TBAC and that of recent ABAC and automated trust negotiation (ATN. Innovational ideas in the model are analyzed, and the implement architecture is discussed. The paper concludes with a summary of the united model’s benefits and future work.

  2. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    Directory of Open Access Journals (Sweden)

    Silvana Rossy de Brito

    Full Text Available This study fills demand for data on access and use of information and communication technologies (ICT in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i with computers and Internet access, (ii with mobile phones, and (iii with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources.

  3. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    Science.gov (United States)

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources. PMID:27035577

  4. Impact of the information age on residency training: communication, access to public information, and clinical care.

    Science.gov (United States)

    Hilty, Donald M; Belitsky, Richard; Cohen, Mitchell B; Cabaniss, Deborah L; Dickstein, Leah J; Bernstein, Carol A; Kaplan, Allan S; Scheiber, Stephen C; Crisp-Han, Holly D; Wrzosek, Marika I; Silberman, Edward K

    2015-02-01

    Access to technology in practice helps physicians manage information, communicate, and research topics; however, those in training receive almost no formal preparation for integrating web-based technologies into practice. One reason for this is that many faculty-aside from junior faculty or those in recent generations-did not grow up using Internet communication, may use it minimally, if at all, in their own practices, and may know little about its forms and varieties. This report presents a case to illustrate how these disparities may play out in the supervisory situation and makes suggestions about helping supervisors integrate technology-awareness into their teaching.

  5. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    Science.gov (United States)

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being...

  6. Optimum feedback strategy for access control mechanism modelled as stochastic differential equation in computer network

    Directory of Open Access Journals (Sweden)

    Ahmed N. U.

    2004-01-01

    Full Text Available We consider optimum feedback control strategy for computer communication network, in particular, the access control mechanism. The dynamic model representing the source and the access control system is described by a system of stochastic differential equations developed in our previous works. Simulated annealing (SA was used to optimize the parameters of the control law based on neural network. This technique was found to be computationally intensive. In this paper, we have proposed to use a more powerful algorithm known as recursive random search (RRS. By using this technique, we have been able to reduce the computation time by a factor of five without compromising the optimality. This is very important for optimization of high-dimensional systems serving a large number of aggregate users. The results show that the proposed control law can improve the network performance by improving throughput, reducing multiplexor and TB losses, and relaxing, not avoiding, congestion.

  7. Low-sampling-rate M-ary multiple access UWB communications in multipath channels

    KAUST Repository

    Alkhodary, Mohammad T.

    2015-08-31

    The desirable characteristics of ultra-wideband (UWB) technology are challenged by formidable sampling frequency, performance degradation in the presence of multi-user interference, and complexity of the receiver due to the channel estimation process. In this paper, a low-rate-sampling technique is used to implement M-ary multiple access UWB communications, in both the detection and channel estimation stages. A novel approach is used for multiple-access-interference (MAI) cancelation for the purpose of channel estimation. Results show reasonable performance of the proposed receiver for different number of users operating many times below Nyquist rate.

  8. Retaking Responsibility for How We Communicate. A Review of Open Access and the Humanities: Contexts, Controversies and the Future

    Directory of Open Access Journals (Sweden)

    James Baker

    2015-06-01

    Full Text Available Since the publication of the Budapest Open Access Initiative statement in 2002, Open Access has grown from an ideal to a reality. Open Access and the Humanities explores scholarly practices, communications, and cultures in light of this change and argues that humanists can and should retake responsibility for how they chose to publish.

  9. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  10. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  11. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links...... are experimentally investigated. Furthermore, this thesis also studies the implementation of bidirectional operations in hybrid optical fiber-wireless systems. In addition, this thesis proposes and demonstrates the seamless translation of both fiber wavelength division multiplexing (WDM) and polarization...

  12. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    Science.gov (United States)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  13. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  14. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  15. Public information: control, secret and right of access

    OpenAIRE

    Carmem Lúcia Batista

    2012-01-01

    Recently, in November 2011, it was published the law on access to public information, legal and historic mark in the struggle for human rights in Brazil. This achievement is the result of a process marked by denial of access to public archives, as it was the case of the Araguaia Guerrilla, valuing the culture of secrecy, abuse of power and relations between public and private in Brazil. Thus, the aim of this paper is to present a brief history about the control of access to public information...

  16. Implicit and explicit communication in decentralized control

    CERN Document Server

    Grover, Pulkit

    2010-01-01

    There has been substantial progress recently in understanding toy problems of purely implicit signaling. These are problems where the source and the channel are implicit -- the message is generated endogenously by the system, and the plant itself is used as a channel. In this paper, we explore how implicit and explicit communication can be used synergistically to reduce control costs. The setting is an extension of Witsenhausen's counterexample where a rate-limited external channel connects the two controllers. Using a semi-deterministic version of the problem, we arrive at a binning-based strategy that can outperform the best known strategies by an arbitrarily large factor. We also show that our binning-based strategy attains within a constant factor of the optimal cost for an asymptotically infinite-length version of the problem uniformly over all problem parameters and all rates on the external channel. For the scalar case, although our results yield approximate optimality for each fixed rate, we are unabl...

  17. Open Platform Strategies and Innovation: Granting Access vs. Devolving Control

    OpenAIRE

    Kevin Boudreau

    2010-01-01

    This paper studies two fundamentally distinct approaches to opening a technology platform and their different impacts on innovation. One approach is to grant access to a platform and thereby open up markets for complementary components around the platform. Another approach is to give up control over the platform itself. Using data on 21 handheld computing systems (1990-2004), I find that granting greater levels of access to independent hardware developer firms produces up to a fivefold accele...

  18. Law-Aware Access Control and its Information Model

    OpenAIRE

    Stieghahn, Michael; Engel, Thomas

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for exa...

  19. Transparent image access in a distributed picture archiving and communications system: The master database broker

    OpenAIRE

    Cox, R D; Henri, C. J.; Rubin, R. K.

    1999-01-01

    A distributed design is the most cost-effective system for small- to medium-scale picture archiving and communications systems (PACS) implementations. However, the design presents an interesting challenge to developers and implementers: to make stored image data, distributed throughout the PACS network, appear to be centralized with a single access point for users. A key component for the distributed system is a central or master database, containing all the studies that have been scanned int...

  20. Based on asynchronous communication protocol of geographic space information service access mechanism research

    OpenAIRE

    G. Chen; Zhao, J.; Gu, M; Li, D.

    2014-01-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text m...

  1. Access to communication technologies in a sample of cancer patients: an urban and rural survey

    Directory of Open Access Journals (Sweden)

    Perkins Anthony

    2005-02-01

    Full Text Available Abstract Background There is a growing awareness among providers of the symptom burden experienced by cancer patients. Systematic symptom screening is difficult. Our plan was to evaluate a technology-based symptom screening process using touch-tone telephone and Internet in our rural outreach cancer program in Indiana. Would rural patients have adequate access to technologies for home-based symptom reporting? Objectives 1 To determine access to touch-tone telephone service and Internet for patients in urban and rural clinics; 2 to determine barriers to access; 3 to determine willingness to use technology for home-based symptom reporting. Methods Patients from representative clinics (seven rural and three urban in our network were surveyed. Inclusion criteria were age greater than 18, able to read, and diagnosis of malignancy. Results The response rate was 97%. Of 416 patients completing the survey (230 rural, 186 urban, 95% had access to touch-tone telephone service, while 46% had Internet access (56% of urban patients, 38% of rural patients. Higher rates of Internet access were related to younger patient age, current employment, and higher education and income. The primary barrier to Internet access was lack of interest. Use of the Internet for health related activities was less than 50%. The preferred means of symptom reporting in patients with internet access were the touch-tone telephone (70%, compared to reporting by the Internet (28%. Conclusion Access to communication technologies appears adequate for home-based symptom reporting. The use of touch-tone telephone and Internet reporting, based upon patient preference, has the potential of enhancing symptom detection among cancer patients that is not dependent solely upon clinic visits and clinician inquiry.

  2. Distributed Frequency Control in Power Grids Under Limited Communication

    OpenAIRE

    Parandehgheibi, Marzieh; Turitsyn, Konstantin; Modiano, Eytan

    2016-01-01

    In this paper, we analyze the impact of communication failures on the performance of optimal distributed frequency control. We consider a consensus-based control scheme, and show that it does not converge to the optimal solution when the communication network is disconnected. We propose a new control scheme that uses the dynamics of power grid to replicate the information not received from the communication network, and prove that it achieves the optimal solution under any single communicatio...

  3. A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    Kannan Karthik

    2013-02-01

    Full Text Available Threshold ramp secret sharing schemes are designed so that (i certain subsets of shares have no information about the secret, (ii some subsets have partial information about the secret and (iii some subsets have complete information to recover the secret. However most of the ramp schemes in present literature do not control the leakage of information in partial access sets, due to which the information acquired by these sets is devoid of structure and not useful for fine-grained access control. Through a non-perfect secret sharing scheme called MIX-SPLIT, an encoding methodology for controlling the leakage in partial access sets is proposed and this is used for fine-grained access to binary strings. The ramp code generated using MIX-SPLIT requires a much smaller share size of O(n, as compared to Shamir's ramp adaptation which incurs a share size of atleast O(n2 for the same multi-access structure. The proposed ramp code is finally applied towards the protection and fine-grained access of industrial design drawings.

  4. AUV Control and Communication using Underwater Acoustic Networks

    OpenAIRE

    Marques, Eduardo R.B.; Pinto, Marques; Kragelund, Sean; Dias, Paulo S.; Madureira, Luis; Sousa, Alexandre; Correia, Marcio; Ferreira, Hugo; Goncalves, Rui; Martins, Richardo; Horner, Douglas P.; Healey, Anthony J.; Goncalves, Gil M.; Sousa, Joao B.

    2007-01-01

    Underwater acoustic networks can be quite effective to establish communication links between autonomous underwater vehicles (AUVs) and other vehicles or control units, enabling complex vehicle applications and control scenarios. A communications and control framework to support the use of underwater acoustic networks and sample application scenarios are described for single and multi-AUV operation.

  5. 7 CFR 1726.176 - Communications and control facilities.

    Science.gov (United States)

    2010-01-01

    ... § 1726.176 Communications and control facilities. This section covers the purchase of microwave and power line carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. Mobile radio systems are covered as general plant materials in § 1726.175. (a) Power line...

  6. A Group-oriented Access Control Scheme for P2P Networks

    Directory of Open Access Journals (Sweden)

    Wang Xiaoming

    2011-02-01

    Full Text Available A group-oriented access control scheme is proposed for P2P (peer to peer networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can realize authentication and secure communication, but also can easily and efficiently add new group members and revoke malicious group members. Therefore, it is more efficient, and more practical protocol for P2P networks.

  7. Reliable Radio Access for Massive Machine-to-Machine (M2M) Communication

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales

    the service requirements can range from massive number of devices to ultra-reliable. This PhD thesis focuses on novel mechanisms to meet these requirements in a variety of wireless systems, from well-established technologies such as cellular networks, to emerging technologies like IEEE 802.11ah. Today......Machine-to-Machine (M2M) communication is a term that identifies the emerging paradigm of interconnected systems, machines, and things that communicate and collaborate without human intervention. The characteristics of M2M Communications are small payloads and sporadic transmissions, while...... as the preferable solution for M2M, no mechanisms are in place to guarantee reliable M2M access. Contrary to mainstream solutions that focus on preventing overload, we introduce mechanisms to provide reliable M2M service. We also investigate what cellular networks can do about upcoming smart metering traffic...

  8. Access to Communication for Deaf, Hard-of-Hearing and ESL Students in Blended Learning Courses

    Directory of Open Access Journals (Sweden)

    Gary L. Long

    2007-11-01

    Full Text Available In an effort to better understand student perceptions of communication in blended (online and traditional learning courses, a 22 item questionnaire was developed and sent to all students registered for these courses at a large technology-focused college during three quarters of instruction. The respondents were divided into four groups: 1 hearing, 2 deaf, 3 hard-of-hearing (D/HH, and 3 English as a second language (ESL. Their perceptions of communication and the blended learning experience were examined. While the hearing and ESL students were positive about blended learning, the findings indicated that deaf and hard-of-hearing students reported that both the quality and quantity of their interactions with the professor and other students was greatly improved by the inclusion of an online component. ESL and hearing students were also positive about the blended experience; but the greatest benefit to communication access was observed by students with a hearing loss.

  9. A Tractable Model of the LTE Access Reservation Procedure for Machine-Type Communications

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Min Kim, Dong; Madueño, Germán Corrales;

    2015-01-01

    A canonical scenario in Machine-Type Communications (MTC) is the one featuring a large number of devices, each of them with sporadic traffic. Hence, the number of served devices in a single LTE cell is not determined by the available aggregate rate, but rather by the limitations of the LTE access...... reservation protocol. Specifically, the limited number of contention preambles and the limited amount of uplink grants per random access response are crucial to consider when dimensioning LTE networks for MTC. We propose a low-complexity model that encompasses these two limitations and allows us to evaluate...... on the preamble collisions. A comparison with the simulated LTE access reservation procedure that follows the 3GPP specifications, confirms that our model provides an accurate estimation of the system outage event and the number of supported MTC devices....

  10. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  11. Enhanced communication support between control room and field operation : Human communication and interaction

    OpenAIRE

    Berg, Håkon Nergaard

    2007-01-01

    Communication between the field operator and the control room operator is vital for successful operation in the process industry. By reviewing models for human cognition and interpersonal communication and collaboration together with appropriate ~technology, concepts for enhancing the field operator/control room operator communication are developed. These concepts constitutes the basis for design and implementation of a working prototype. The prototype is utilizing a mobile device with wirele...

  12. A Service Access Security Control Model in Cyberspace

    Science.gov (United States)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  13. Access to Health Care and Control of ABCs of Diabetes

    OpenAIRE

    Zhang, Xuanping; Bullard, Kai McKeever; Gregg, Edward W.; Beckles, Gloria L.; Williams, Desmond E.; Barker, Lawrence E; Albright, Ann L.; Imperatore, Giuseppina

    2012-01-01

    OBJECTIVE To examine the relationship between access to health care and diabetes control. RESEARCH DESIGN AND METHODS Using data from the National Health and Nutrition Examination Survey, 1999–2008, we identified 1,221 U.S. adults (age 18–64 years) with self-reported diabetes. Access was measured by current health insurance coverage, number of times health care was received over the past year, and routine place to go for health care. Diabetes control measures included the proportion of people...

  14. Communication in command and control teams

    NARCIS (Netherlands)

    Schraagen, J.M.C.; Rasker, P.C.

    2001-01-01

    An important factor affecting team performance in Combat Information Centers is communication. Previous research has shown that high-performing teams use effective communication patterns, such as limiting idle chatter during high workload conditions, and sharing information before it is needed. Alth

  15. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  16. A LabVIEW-Based Remotely Controllable and Accesible Laboratory Platform for Communication Systems II Lecture Experiments

    OpenAIRE

    Akar, Aynur; Yayla, Ayse; ERDER, Berkay

    2014-01-01

    In this study, a remotely accessible and controllable communication systems laboratory model is designed for the undergraduate Electronics and Communication Engineering Education. This laboratory model is designed by using LabVIEW program as real time and virtual for Communication Systems II lecture laboratory applications  that contain Convolutional Codes, Viterbi Decoding Algorithm Method, phase shift keying modulated / demodulated schemes and system performance experiments. ...

  17. Review of Access Control Models for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  18. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  19. Control and Communication Network in Hybrid Fuel Cell Vehicles

    Institute of Scientific and Technical Information of China (English)

    朱元; 吴昊; 田光宇; 阳宪惠; 赵立安; 周伟波

    2004-01-01

    This paper describes the control and communication network in fuel cell vehicles, including both the protocol and the hardware.Based on the current protocol (ISO-11898 and SAE J1939), a new practical protocol is proposed and implemented for the control and communication network in fuel cell vehicles.To improve the reliability of data communication and to unify the network management, a new network system based on dual-port RAM is also implemented.

  20. Analyzing Accuracy and Accessibility in Information and Communication Technology Ethical Scenario Context

    Directory of Open Access Journals (Sweden)

    M. Masrom

    2011-01-01

    Full Text Available Problem statement: Recently, the development of Information and Communication Technology (ICT is indispensable to life. The utilization of ICT has provided advantages for people, organizations and society as a whole. Nevertheless, the widespread and rapid use of ICT in society has exacerbated existing ethical issues or dilemmas and also led to the emergence of new ethical issues such as unauthorized access, software piracy, internet pornography, privacy protection, information gap and many others. Approach: Therefore, the aim of this study is to discuss several issues of the ICT ethics. It will focusing on two major issues, that is, data accuracy and accessibility. Results: The results indicated that more than half percentage of respondents tend to be ethical in data accuracy scenario and also in accessibility scenario. Several computer ethics scenarios that relate to the data accuracy and accessibility are presented and the results of analysis are then discussed. Conclusion: Based on the results in this study, computer ethics issues such as data accuracy and accessibility should receive more attention in the ICT field.

  1. Researchers' perspectives on open access scholarly communication in Tanzanian public universities

    Directory of Open Access Journals (Sweden)

    F.W. Dulle

    2009-04-01

    Full Text Available This research explored the awareness, usage and perspectives of Tanzanian researchers on open access as a mode of scholarly communication. A survey questionnaire targeted 544 respondents selected through stratified random sampling from a population of 1088 university researchers of the six public universities in Tanzania. With a response rate of 73%, the data were analysed using the Statistical Package for Social Sciences. The study reveals that the majority of the researchers were aware of and were positive towards open access. Findings further indicate that the majority of researchers in Tanzanian public universities used open access outlets more to access scholarly content than to disseminate their own research findings. It seems that most of these researchers would support open access publishing more if issues of recognition, quality and ownership were resolved. Thus many of them supported the idea of establishing institutional repositories at their respective universities as a way of improving the dissemination of local content. The study recommends that public universities and other research institutions in the country should consider establishing institutional repositories, with appropriate quality assurance measures, to improve the dissemination of research output emanating from these institutions.

  2. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  3. Communication and control tools, systems, and new dimensions

    CERN Document Server

    MacDougall, Robert; Cummings, Kevin

    2015-01-01

    Communication and Control: Tools, Systems, and New Dimensions advocates a systems view of human communication in a time of intelligent, learning machines. This edited collection sheds new light on things as mundane yet still profoundly consequential (and seemingly "low-tech") today as push buttons, pagers and telemarketing systems. Contributors also investigate aspects of "remote control" related to education, organizational design, artificial intelligence, cyberwarfa

  4. Future Communication, Computing, Control and Management Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  5. Future Communication, Computing, Control and Management Volume 2

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  6. Future Computing, Communication, Control and Management Volume 2

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  7. Nanorack Compatible Standardized Data Processing, Communication, and Control Module Project

    Data.gov (United States)

    National Aeronautics and Space Administration — This Phase I study will design and develop a NanoRacks Control Module (NCM) that provides communications, control functions and data processing in a NanoRacks...

  8. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  9. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Gadducci, F.

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori acce

  10. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori acc

  11. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  12. Research on a dynamic workflow access control model

    Science.gov (United States)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  13. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  14. IEPLC Framework, Automated Communication in a Heterogeneous Control System Environment

    CERN Document Server

    Locci, F

    2014-01-01

    In CERN accelerators control system several components are essential such as: Programmable Logic Controller (PLC), PCI Extensions for Instrumentation (PXI), and other micro-controller families. Together with their weaknesses and their strength points they typically present custom communication protocols and it is therefore difficult to federate them into the control system using a single communication strategy. Furthermore this dependency to the physical device interfaces and protocols makes most of the code not reusable and the replacement of old technology a difficult problem. The purpose of IEPLC ([1]) is to mitigate the communication issues given by this heterogeneity; it proposes a framework to define communication interfaces in a hardware independent manner. In addition it automatically generates all the resources needed on master side (typically represented by a FEC: Front-End Computer) and slave side (typically represented by the controller) to implement a common and generic Ethernet communication. Th...

  15. Fuzzy logic controller to improve powerline communication

    Science.gov (United States)

    Tirrito, Salvatore

    2015-12-01

    The Power Line Communications (PLC) technology allows the use of the power grid in order to ensure the exchange of data information among devices. This work proposes an approach, based on Fuzzy Logic, that dynamically manages the amplitude of the signal, with which each node transmits, by processing the master-slave link quality measured and the master-slave distance. The main objective of this is to reduce both the impact of communication interferences induced and power consumption.

  16. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  17. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  18. Adaptive Medium Access Control Protocol for Wireless Body Area Networks

    OpenAIRE

    Javaid, N.; Ahmad, A.; A. Rahim; Z.A. Khan; M. Ishfaq; Qasim, U.

    2014-01-01

    Wireless Body Area Networks (WBANs) are widely used for applications such as modern health-care systems, where wireless sensors (nodes) monitor the parameter(s) of interest. Nodes are provided with limited battery power and battery power is dependent on radio activity. MAC protocols play a key role in controlling the radio activity. Therefore, we present Adaptive Medium Access Control (A-MAC) protocol for WBANs supported by linear programming models for the minimization of energy consumption ...

  19. Access control and interlock system at the Advanced Photon Source

    Energy Technology Data Exchange (ETDEWEB)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D. [Argonne National Lab., IL (United States). Advanced Photon Source

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  20. Communicative social capital and collective efficacy as determinants of access to health-enhancing resources in residential communities.

    Science.gov (United States)

    Matsaganis, Matthew D; Wilkin, Holley A

    2015-04-01

    This article contributes to the burgeoning literature on the social determinants of health disparities. The authors investigate how communication resources and collective efficacy, independently and in combination, shape residents' access to health enhancing resources (including healthcare services, sources of healthier food options, and public recreation spaces) in their communities. Using random digit dial telephone survey data from 833 residents of South Los Angeles communities the authors show that communicative social capital-that is, an information and problem-solving resource that accrues to residents as they become more integrated into their local communication network of neighbors, community organizations, and local media-plays a significant role in access to health resources. This relationship is complicated by individuals' health insurance and health status, as communicative social capital magnifies the sense of absence of resources for those who are in worse health and lack insurance. Communicative social capital builds collective efficacy, which is positively related to access to health-enhancing resources, but it also mediates the negative relationship between communicative social capital and access to health resources. Residents with richer stores of communicative social capital and collective efficacy report better access to health resources. The authors conclude with a discussion of implications of these findings and suggestions for future research.

  1. A User Profile Based Access Control Model and Architecture

    Directory of Open Access Journals (Sweden)

    Meriem Zerkouk

    2013-02-01

    Full Text Available Personalization and adaptation to the user profile capability are the hottest issues to ensure ambientassisted living and context awareness in nowadays environments. With the growing healthcare andwellbeing context aware applications, modeling security policies becomes an important issue in thedesign of future access control models. This requires rich semantics using ontology modeling for themanagement of services provided to dependant people. However, current access control models remainunsuitable due to lack of personalization, adaptability and smartness to the handicap situation.In this paper, we propose a novel adaptable access control model and its related architecture in whichthe security policy is based on the handicap situation analyzed from the monitoring of user’s behavior inorder to grant a service using any assistive device within intelligent environment. The design of ourmodel is an ontology-learning and evolving security policy for predicting the future actions of dependentpeople. This is reached by reasoning about historical data, contextual data and user behavior accordingto the access rules that are used in the inference engine to provide the right service according to theuser’s needs.

  2. Outline of a multiple-access communication network based on adaptive arrays

    Science.gov (United States)

    Zohar, S.

    1982-01-01

    Attention is given to a narrow-band communication system consisting of a central station trying to receive signals simultaneously from K spatially distinct mobile users sharing the same frequencies. One example of such a system is a group of aircraft and ships transmitting messages to a communication satellite. A reasonable approach to such a multiple access system may be based on equipping the central station with an n-element antenna array where n is equal to or greater than K. The array employs K sets of n weights to segregate the signals received from the K users. The weights are determined by direct computation based on position information transmitted by the users. A description is presented of an improved technique which makes it possible to reduce significantly the number of required computer operations in comparison to currently known techniques.

  3. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  4. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Control (MAC) protocols that are following the receiver-initiated paradigm of asynchronous communication. According to the receiver-initiated paradigm the communication is initiated by the receiver that states its availability to receive data through beacons. The sender is passively listening...... to the channel until it receives the beacon of interest. In this context, the dissertation begins with an in-depth survey of all the receiverinitiated MAC protocols and presents their unique optimization features, which deal with several challenges of the link layer such as mitigation of the energy consumption......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  5. The integration of open access journals in the scholarly communication system: Three science fields

    DEFF Research Database (Denmark)

    Faber Frandsen, Tove

    2009-01-01

    The greatest number of open access journals (OAJs) is found in the sciences and their influence is growing. However, there are only a few studies on the acceptance and thereby integration of these OAJs in the scholarly communication system. Even fewer studies provide insight into the differences...... across disciplines. This study is an analysis of the citing behaviour in journals within three science fields: biology, mathematics, and pharmacy and pharmacology. It is a statistical analysis of OAJs as well as non-OAJs including both the citing and cited side of the journal to journal citations...

  6. Pharma Pricing & Market Access Europe 2016--Health Network Communications' Tenth Annual Conference (February 23-25, 2016--London, UK).

    Science.gov (United States)

    D'Souza, P

    2016-03-01

    Tighter national budgets and escalating drug prices continue to present challenges for pharmaceutical market access strategies and societal cost of care. As pharmaceutical companies and medical governmental advisory organizations enter tougher negotiations, hospital trusts and other dispensary firms face barriers to receiving the best medical treatment, and as a result patient access is limited. The 2016 HealthNetwork Communications' Pharma Pricing & Market Access Europe meeting brought together pharmaceutical, medical governmental advisory and stakeholders and market access/pricing consultants, to encourage discussions and negotiations into how to improve the drug pricing system and consequential market access strategies while achieving the respective reimbursement and affordability objectives. PMID:27186595

  7. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-06-01

    Full Text Available At the center of core technologies for a future cyber world, such as Internet of Things (IoT or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC-based electronic payments. Near-field Communication (NFC integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.

  8. A formal model for access control with supporting spatial context

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hong; HE YePing; SHI ZhiGuo

    2007-01-01

    There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented,and the role is assigned a logical location domain to specify the spatial boundary.Roles are activated based on the current physical position of the user which obtained from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, constrained SC-RBAC allows express various spatial separations of duty constraints,location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 invariants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.

  9. Controlled and secure direct communication using GHZ state and teleportation

    International Nuclear Information System (INIS)

    A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), alice encodes the secret message directly on a sequence of particle states in the GHZ state and transmits them to Bob, supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if a perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of a third side. (orig.)

  10. A trio of nanoswitches in redox-potential controlled communication.

    Science.gov (United States)

    Pramanik, Susnata; De, Soumen; Schmittel, Michael

    2014-11-11

    A potential-controlled two-step bidirectional communication protocol between the nanoswitches [Cu(1)](+), 2 and 3 is set up, in which ligand followed by metal-ion oxidation drives two subsequent metal ion translocations (self-sorting) changing the switching state at each switch. The communication is reset to its starting point by a two-electron reduction. PMID:25227112

  11. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  12. Access Control Design and Implementations in the ATLAS Experiment

    CERN Document Server

    Leahu, M C; Avolio, G

    2008-01-01

    The ATLAS experiment operates with a significant number of hardware and software resources. Their protection against misuse is an essential task to ensure a safe and optimal operation. To achieve this goal, the Role Based Access Control (RBAC) model has been chosen for its scalability, flexibility, ease of administration and usability from the lowest operating system level to the highest software application level. This paper presents the overall design of RBAC implementation in the ATLAS experiment and the enforcement solutions in different areas such as the system administration, control room desktops and the data acquisition software. The users and the roles are centrally managed using a directory service based on Lightweight Directory Access Protocol which is kept in synchronization with the human resources and IT datab

  13. Type-Based Access Control in Data-Centric Systems

    Science.gov (United States)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  14. Access and control of resources: Lessons from the SANREM CRSP

    OpenAIRE

    Flora, Cornelia B.

    2001-01-01

    Metadata only record Developing sustainability in an agricultural ecosystem requires that attention be given to inequities within communities. The experiences of SANREM CRSP revealed that gender inequality was a significant factor in the access and control of resources that were critical for the projects reaching their goals. Among the resources of financial, manufactured, human, environmental, and social capital, enhancing social capital among women was a crucial component of plans for in...

  15. Achieving Fine-grained Access Control in Virtual Organisations

    OpenAIRE

    Zhang, Nien Fan; Yao, L.; Nenadic, A.; Chin, J.; Goble, C.; Rector, A.; Chadwick, David W; Otenko, Sassa; Shi, Q.

    2007-01-01

    In a virtual organization environment, where services and data are provided and shared amongorganizations from different administrative domains and protected with dissimilar security policies and measures, there is a need for a flexible authentication framework that supports the use of various authentication methods and tokens. The authentication strengths derived from the authentication methods and tokens should be incorporated into an access-control decision-making process, so that more sen...

  16. THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

    OpenAIRE

    S. R. KODITUWAKKU

    2010-01-01

    The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Object oriented design patterns facilitate small scale and large scale design reuse. This paper presents an object oriented design pattern, Administrator Object, to address the User-Role assignment problem in Role Based Access Control (RBAC). Two alternative solutions are proposed. The pattern is presented according to the Gang of Four template.

  17. THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    S. R. KODITUWAKKU

    2010-12-01

    Full Text Available The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Object oriented design patterns facilitate small scale and large scale design reuse. This paper presents an object oriented design pattern, Administrator Object, to address the User-Role assignment problem in Role Based Access Control (RBAC. Two alternative solutions are proposed. The pattern is presented according to the Gang of Four template.

  18. GSM-Based Wireless Database Access For Food And Drug Administration And Control

    OpenAIRE

    Engr. Prof Hyacinth C. Inyiama; Engr. Mrs Lois Nwobodo; Engr. Dr. Mrs. Christiana C. Okezie; Engr. Mrs. Nkolika O. Nwazor

    2012-01-01

    GSM (Global system for mobile communication) based wireless database access for food and drug administration and control is a system that enables one to send a query to the database using the short messaging system (SMS) for information about a particular food or drug. It works in such a way that a user needs only send an SMS in order to obtain information about a particular drug produced by a pharmaceutical industry. The system then receives the SMS, interprets it and uses its contents to qu...

  19. Material control and surveillance for high frequency access vaults project

    International Nuclear Information System (INIS)

    The 'Material Control and Surveillance for High Frequency Access Vaults' project sponsored by United States Department of Energy's Office of Security Policy, Policy Integration and Technical Support Program (SO-20.3) focuses on enhancing nuclear materials control and surveillance in vaults that are frequently accessed. The focus of this effort is to improve materials control and accountability (MC and A) while decreasing the operational impact of these activities. Los Alamos and Y-12 have developed a testbed at the Los Alamos National Laboratory for evaluating and demonstrating integrated technologies for use in enhancing materials control and accountability in active nuclear material storage vaults. An update will be provided on the new systems demonstrated in the test-bed including a 'confirmatory cart' for expediting the performance of inventory and radio-frequency actuated video that demonstrates the concept of automated data entry for materials moving between MBA's. The United States Department of Energy's Office of Security Policy, Policy Integration and Technical Support Program (SO-20.3) has sponsored a project where nuclear material inventory, control and surveillance systems are evaluated, developed, and demonstrated in an effort to provide technologies that reduce risk, increase material assurance, and provide cost-efficient alternatives to manpower-intensive physical inventory and surveillance approaches for working (high-frequency-access) vaults. This Fiscal Year has been largely focused on evaluating and developing components of two sub-systems that could be used either separately in nuclear material vaults or as part of a larger integrated system for nuclear materials accountability, control and surveillance.

  20. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-06-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive com-munication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  1. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-01-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive communication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  2. State control, access to capital and firm performance

    Institute of Scientific and Technical Information of China (English)

    Oliver Zhen Li; Xijia Su; Zhifeng Yang

    2012-01-01

    We study the effect of state control on capital allocation and investment in China, where the government screens prospective stock issuers. We find that state firms are more likely to obtain government approval to conduct seasoned equity offerings than non-state firms. Further, non-state firms exhibit greater sensitivities of subsequent investment and stock performance to regulatory decisions on stock issuances than state firms. Our work suggests that state control of capital access distorts resource allocation and impedes the growth of non-state firms. We also provide robust evidence that financial constraints cause underinvestment.

  3. RFID Based Security Access Control System with GSM Technology

    Directory of Open Access Journals (Sweden)

    Peter Adole

    2016-08-01

    Full Text Available The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises. This is achieved mainly through the use of a Radio Frequency Identification System with operating frequency of 125 KHz, Microcontroller programmed to send control signals, DC motor, relay, buzzer, Liquid Crystal Display (LCD and GSM/GPRS Modem.Once the RFID tag which contains the user’s unique information is scan by the RFID reader and confirmed match with the information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number” to security personnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”, buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid RFID card is used to access the security system” to the security personnel. The electronic circuit was implemented, the codes for microcontroller were written in assembly language, debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Hardware simulation was carried out using the Proteus Virtual System Modelling (VSM version 8.0.An importation implication of this paper is that the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock

  4. A supervisory control policy over an acoustic communication network

    OpenAIRE

    Farhadi, Alireza; Dumon, Jonathan; Canudas-De-Wit, Carlos

    2014-01-01

    International audience This paper presents a supervisory multi-agent control policy over an acoustic communication network subject to imperfections (packet dropout and transmission delay) for localization of an underwater flow source (e.g., source of chemical pollution, fresh water, etc.) with an unknown location at the bottom of the ocean. A two-loop control policy combined with a coding strategy for reliable communication is presented to perform the above task. A simulator is developed a...

  5. Multihomed communication with SCTP (stream control transmission protocol)

    CERN Document Server

    Leung, Victor CM

    2012-01-01

    Although multihomed communication is a rapidly emerging trend for next generation networks, no known book explores multihomed communication with the Stream Control Transmission Protocol (SCTP). Filling this void, Multihomed Communication with SCTP (Stream Control Transmission Protocol) explains this innovative feature that allows an endpoint to simultaneously maintain and use multiple points of connectivity to the network-making it possible for fixed and mobile users to connect to the Internet via multiple service providers or last hop technologies. Among the topics addressed, the book covers:

  6. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  7. OJADEAC: An Ontology Based Access Control Model for JADE Platform

    Directory of Open Access Journals (Sweden)

    Ban Sharief Mustafa

    2014-06-01

    Full Text Available Java Agent Development Framework (JADE is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA specifications. JADE propose new infrastructure solutions to support the development of useful and convenient distributed applications. Security is one of the most important issues in implementing and deploying such applications. JADE-S security add-ons are one of the most popular security solutions in JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give authorities to perform an action based on a set of permission objects attached to every authenticated user. This service has several drawbacks when implemented in a scalable distributed context aware applications. In this paper, an ontology-based access control model called (OJADEAC is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome the shortcoming of this service. The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules. OJADEAC model is distributed, intelligent, dynamic, context-aware and use reasoning engine to infer access decisions based on ontology knowledge.

  8. A study of multiple access schemes in satellite control network

    Science.gov (United States)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  9. Results of an Iridium-Based Data Communication System Providing Internet Access to Polar Expeditions

    Science.gov (United States)

    Mohammad, A.; Frost, V.; Braaten, D.

    2003-12-01

    The Polar Radar for Ice Sheet Measurements (PRISM) Project at the University of Kansas has developed and field-tested a versatile communications system for use by researchers in high-latitude Polar Regions. The PRISM project is developing advanced intelligent remote sensing technology that involves radar systems, an autonomous rover, and communications systems to measure detailed ice sheet characteristics, and to determine bed conditions (frozen or wet) below active ice sheets in both Greenland and Antarctica. We also have a very strong public outreach and educational program aimed at K-12 educators and students that requires data, voice and video feeds from Polar field locations in near real time. Hence, PRISM requires a robust communications system for use in the field between a base camp and the mobile remote sensing system, and from the field back to the University of Kansas and onto the Internet. The communication system that has been developed is truly mobile and is relatively inexpensive. We initially considered various satellite services during the design phase of this project. The two feasible options for high-latitude locations were Iridium, with its low-bit-rate service (2.4 Kb/s), and Inmarsat/Intelsat with broadband service. We selected the Iridium option for testing and development because it provided coverage in both Antarctica and Greenland. To achieve higher capacity communications, the multilink point-to-point protocol (MLPPP) implemented in Linux was tuned to operate efficiently over the Iridium satellite system. This mechanism combines multiple channels to obtain a seamless data connection with a capacity equal to the sum of the individual link rates. We used four Iridium modems to obtain an aggregate capacity of about 9.6 Kb/s. Standard Internet protocols (TCP/IP) were then used to provide end-to-end connectivity. The communications system field experiments were conducted at the NorthGRIP ice core drilling camp in Greenland (75° 06' N, 42° 20

  10. Design of a control system for self-shielded irradiators with remote access capability

    International Nuclear Information System (INIS)

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  11. Guide to Evaluating Usability, Accessibility and Communicability in Web Applications with User Intervention

    Directory of Open Access Journals (Sweden)

    Asnier Góngora R.

    2013-12-01

    Full Text Available The article is associated with the creation of a usability lab where various types of tests performed using static and dynamic tools for evaluating the characteristics of usability, accessibility and Communicability by indicators in the software testing process with the user's presence. It also addresses the current situation in Cuba on the issue of evidence of these characteristics and the impact it could bring to the development teams. In addition, an analysis of the result of applying a tool (check list to multiple Web applications on tests conducted at the National Center for Software Quality Cuba (CALISOFT. We also present a set of best practices that support the development of web applications to suit the user.

  12. Analysis of an FBMC/OQAM scheme for asynchronous access in wireless communications

    Science.gov (United States)

    Mattera, Davide; Tanda, Mario; Bellanger, Maurice

    2015-12-01

    The OFDM/OQAM transceiver belongs to the filter-bank-based multicarrier (FBMC) family and, unlike OFDM schemes, it is particularly able to meet the requirements of the physical layer of cognitive radio networks such as high level of adjacent channel leakage ratio and asynchronous communications. The paper proposes and analyzes a new implementation structure, named frequency spreading, for the OFDM/OQAM transceiver. On flat channels, it is equivalent to the standard one in terms of input-output relations, though more complex. On multipath channels, it offers a crucial advantage in terms of equalization, which is performed in the frequency domain, leading to high performance and no additional delay. With its flexibility and level of performance, the analyzed scheme has the potential to outperform OFDM in the asynchronous access context and in cognitive radio networks.

  13. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  14. Access control for MPEG video applications using neural network and simulated annealing

    Directory of Open Access Journals (Sweden)

    Ahmed N. U.

    2004-01-01

    Full Text Available We present a dynamic modelfor access control mechanism used in computer communication network applied to MPEG video transmission over Internet. This modelis different fromthosedeveloped inthe previous works related to this topic. In our model, token buckets supported by data buffersare used to shape incoming traffic and one multiplexor, serving all the token pools, multiplexes all theconforming traffic. The model is governed by a system of discrete nonlinear difference equations. Weuse neural network as the feedback controller which receives at its input (measurable available information and provides at its output the optimal control. The simulated annealing algorithm isusedto optimize the system performance by adjusting the weights. For illustration, we presentnumerical results which show that the system performance of MPEG video server can be improved by using neural network and simulated annealing approach.

  15. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...

  16. Design of the Wind Tunnel Model Communication Controller Board. Degree awarded by Christopher Newport Univ. on Dec. 1998

    Science.gov (United States)

    Wilson, William C.

    1999-01-01

    The NASA Langley Research Center's Wind Tunnel Reinvestment project plans to shrink the existing data acquisition electronics to fit inside a wind tunnel model. Space limitations within a model necessitate a distributed system of Application Specific Integrated Circuits (ASICs) rather than a centralized system based on PC boards. This thesis will focus on the design of the prototype of the communication Controller board. A portion of the communication Controller board is to be used as the basis of an ASIC design. The communication Controller board will communicate between the internal model modules and the external data acquisition computer. This board is based around an Field Programmable Gate Array (FPGA), to allow for reconfigurability. In addition to the FPGA, this board contains buffer Random Access Memory (RAM), configuration memory (EEPROM), drivers for the communications ports, and passive components.

  17. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    Science.gov (United States)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  18. Communications for Coordinative Control of Wind Power Systems

    DEFF Research Database (Denmark)

    Wei, Mu

    Due to the rapid development of wind energy and the smart grid requirement on modern power systems, data communication technologies in wind power system play an increasingly important role. The objective of the project is to investigate communication system attributes and develop advanced power...... system control strategies for wind power integration, in order to achieve coordinative control for a secure and efficient power system. The project basically contains three main aspects: studies on DGS (Distributed Generation System) characteristics, analysis of communication technologies......, and integration of power system and communication system. For the DGS studies, the main components, such as WTs (Wind Turbines) and CHPs (Combined Head and Power), are modelled. Since WTs are sensitive to disturbances, one focus of this PhD study is the investigation of WTs characteristics; mainly covering FSIG...

  19. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  20. Robust Broadcast-Communication Control of Electric Vehicle Charging

    CERN Document Server

    Turitsyn, Konstantin; Backhaus, Scott; Chertkov, Misha

    2010-01-01

    The anticipated increase in the number of plug-in electric vehicles (EV) will put additional strain on electrical distribution circuits. Many control schemes have been proposed to control EV charging. Here, we develop control algorithms based on randomized EV charging start times and simple one-way broadcast communication allowing for a time delay between communication events. Using arguments from queuing theory and statistical analysis, we seek to maximize the utilization of excess distribution circuit capacity while keeping the probability of a circuit overload negligible.

  1. Communications involving the control room of a nuclear power plant

    International Nuclear Information System (INIS)

    This study investigated communications within the operations component of a nuclear power plant, with a primary emphasis on control room communications. A structured interview technique was developed following preliminary interviews at the plant, and pretested at AECB headquarters. Patterns were identified from questions asked on communications links, work relationships, miscommunications, procedures, instrumentation and responses to problems. The study was an exploratory one, conducted under a limited budget, to provide background information and to identify areas for further investigation. The report offers recommendations about areas for further research

  2. Control, Communication, and Knowledge-Building in Asian Call Centers

    Directory of Open Access Journals (Sweden)

    Maria Lombard

    2015-02-01

    Full Text Available Communication within international call centers can be significantly complicated by breakdowns that result from multiple layers of corporate language.  This case study explores training sessions and documentation developed and delivered by an American team responsible for training international call center workers located in the Philippines.  Findings show that attempts to standardize and control workplace language can limit meaningful two-way communication, leaving workers to both question what they are told and invent new ways of communicating.  Recommendations are presented in this study for a workplace writing model that can overcome language differences through authentic interaction.

  3. Optimization of Communication for Commanding and Controlling Systems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper mainly discussed some special requiremen ts for communication system and specific implement methods during the cause of cam paign cooperation in modern times. That system is the Advanced Field Tactical Da ta System which was developed to meet the requirements for controlling every fir e nodes, through which Army can achieve their campaign and tactical goals. The c ourse of dealing with communication message mainly include Emery's situation rep orted, Message change (generally referred to taxis a...

  4. Control, Communication, and Knowledge-Building in Asian Call Centers

    OpenAIRE

    Maria Lombard

    2015-01-01

    Communication within international call centers can be significantly complicated by breakdowns that result from multiple layers of corporate language.  This case study explores training sessions and documentation developed and delivered by an American team responsible for training international call center workers located in the Philippines.  Findings show that attempts to standardize and control workplace language can limit meaningful two-way communication, leaving workers to both question w...

  5. Compensating for Unreliable Communication Links in Networked Control Systems

    OpenAIRE

    Henriksson, Erik

    2009-01-01

    Control systems utilizing wireless sensor and actuator networks can be severely affectedby the properties of the communication links. Radio fading and interferencemay cause communication losses and outages in situations when the radio environmentis noisy and low transmission power is desirable. This thesis proposes amethod to compensate for such unpredictable losses of data in the feedback controlloop by introducing a predictive outage compensator (POC). The POC is a filter tobe implemented a...

  6. Controlled Bidirectional Quantum Direct Communication by Using a GHZ State

    Institute of Scientific and Technical Information of China (English)

    MAN Zhong-Xiao; XIA Yun-Jie

    2006-01-01

    @@ A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger-Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed.

  7. Cryptanalysis and improvement of controlled secure direct communication

    Institute of Scientific and Technical Information of China (English)

    Kao Shih-Hung; Hwang Tzonelih

    2013-01-01

    This paper points out that,due to a flaw in the sender's encoding,the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin.Phys.14 (2005),No.5,p.893] can reveal the whole secret message without permission from the controller.An improvement is proposed to avoid this flaw.

  8. Minimizing communication cost among distributed controllers in software defined networks

    Science.gov (United States)

    Arlimatti, Shivaleela; Elbreiki, Walid; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Software Defined Networking (SDN) is a new paradigm to increase the flexibility of today's network by promising for a programmable network. The fundamental idea behind this new architecture is to simplify network complexity by decoupling control plane and data plane of the network devices, and by making the control plane centralized. Recently controllers have distributed to solve the problem of single point of failure, and to increase scalability and flexibility during workload distribution. Even though, controllers are flexible and scalable to accommodate more number of network switches, yet the problem of intercommunication cost between distributed controllers is still challenging issue in the Software Defined Network environment. This paper, aims to fill the gap by proposing a new mechanism, which minimizes intercommunication cost with graph partitioning algorithm, an NP hard problem. The methodology proposed in this paper is, swapping of network elements between controller domains to minimize communication cost by calculating communication gain. The swapping of elements minimizes inter and intra communication cost among network domains. We validate our work with the OMNeT++ simulation environment tool. Simulation results show that the proposed mechanism minimizes the inter domain communication cost among controllers compared to traditional distributed controllers.

  9. Controlled Quantum N-Party Simultaneous Direct Communication

    Institute of Scientific and Technical Information of China (English)

    XIA Yun-Jie; MAN Zhong-Xiao

    2007-01-01

    In this paper, we propose a controlled quantum N-party simultaneous direct communication protocol with single-qubit measurements. Many users can simultaneously exchange their secret messages in a set of devices with the control of a supervisor. The eavesdropper's commonly used attacks can be detected through two security checking processes.

  10. The development of access control system in Fukushima No.2 nuclear power station

    Energy Technology Data Exchange (ETDEWEB)

    Ookubo, S.; Nakai, Y.; Oohira, N.; Kishishita, S. [Tokyo Electric power Co., Tokyo (Japan); Kobayashi, H.; Sano, F. [Fuji Electric Co., Tokyo (Japan); Masuda, M.; Tajima, T.; Oohira, K. [Toshiba Corporation, Tokyo (Japan)

    2002-07-01

    A new radiation work control system has been developed for controlling the entrance and exit of workers from the radiation controlled area in a nuclear power station and has been run in the Fukushima No. 2 Nuclear Power Station of Tokyo Electric Power Co., Inc. since October, 1999. The system is designed to reduce workers burden by simplifying the operation of each equipment that controls access to radiation controlled areas, and to minimize radiation exposure by automatically acquiring dose data during each access and each task. The new system adopted electronic personal dosimeters (gamma radiation EPD) which permit data collection by radio communication, thus improving the conventional alarm-equipped personal dosimeter (EPD) and increasing reliability as primary dosimeters. Furthermore, additional electronic personal dosimeters capable of measuring beta radiation (gamma and beta radiations EPD) were also utilized in specific tasks in October 2001. After a six-month test run of these EPDs, the film badges were discontinued in April 2002 and replaced solely with the EPDs. EPDs are now used as the primary dosimetry for radiation workers.

  11. A supervisory control policy over an acoustic communication network

    Science.gov (United States)

    Farhadi, Alireza; Dumon, Jonathan; Canudas-de-Wit, Carlos

    2015-05-01

    This paper presents a supervisory multi-agent control policy over an acoustic communication network subject to imperfections (packet dropout and transmission delay) for localisation of an underwater flow source (e.g., source of chemical pollution, fresh water, etc.) with an unknown location at the bottom of the ocean. A two-loop control policy combined with a coding strategy for reliable communication is presented to perform the above task. A simulator is developed and used to evaluate the trade-offs between quality of communication, transmission delay and control for a fleet of autonomous underwater vehicles supervised over a noisy acoustic communication network by an autonomous surface vessel. It is illustrated that without compensation of the effects of severe random packet dropout, localisation of an unknown underwater flow source is not possible for the condition simulated just by implementing a two-loop control policy. But a two-loop control policy combined with a strategy for reliable communication locates the unknown location of flow source.

  12. Advent of Biometric Sensors in Field of Access Control

    Directory of Open Access Journals (Sweden)

    Ali Anas

    2015-09-01

    Full Text Available Biometrics is the science of measuring and analyzing biological data. It is used to uniquely identify individuals by their physical characteristics or personal behavior traits.The results from scrutiny of various themes including unimodal, multimodal, physiological, behavioural bio-metrics. Bio-metrics, Physiological and behavioural are compared in the review. The article addresses a particular aspect of utilizing biometrics for authentication, identification and access control. The use of systems like fingerprint, face recognition, hand geometry, Palm print, DNA analysis, iris recognition, retina and odour/scent will be dealt with herewith. This study deals with various applications of this technology, like surveillance, employee identification, device access etc with mentions respective of hardware used. The influence of such features is yet to be documented properly, but it is safe to say that it has been a huge step towards better information security and identification control.Over the course of this text, we will try to bring to light our analysis of the subject and provide an in-depth examination of contemporary and futuristic technologies pertaining to this field.

  13. Extending a Role Graph for Role-Based Access Control

    Science.gov (United States)

    Asakura, Yoshiharu; Nakamoto, Yukikazu

    Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.

  14. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Science.gov (United States)

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  15. Echolocation calls and communication calls are controlled differentially in the brainstem of the bat Phyllostomus discolor

    Directory of Open Access Journals (Sweden)

    Schuller Gerd

    2005-08-01

    Full Text Available Abstract Background Echolocating bats emit vocalizations that can be classified either as echolocation calls or communication calls. Neural control of both types of calls must govern the same pool of motoneurons responsible for vocalizations. Electrical microstimulation in the periaqueductal gray matter (PAG elicits both communication and echolocation calls, whereas stimulation of the paralemniscal area (PLA induces only echolocation calls. In both the PAG and the PLA, the current thresholds for triggering natural vocalizations do not habituate to stimuli and remain low even for long stimulation periods, indicating that these structures have relative direct access to the final common pathway for vocalization. This study intended to clarify whether echolocation calls and communication calls are controlled differentially below the level of the PAG via separate vocal pathways before converging on the motoneurons used in vocalization. Results Both structures were probed simultaneously in a single experimental approach. Two stimulation electrodes were chronically implanted within the PAG in order to elicit either echolocation or communication calls. Blockade of the ipsilateral PLA site with iontophoretically application of the glutamate antagonist kynurenic acid did not impede either echolocation or communication calls elicited from the PAG. However, blockade of the contralateral PLA suppresses PAG-elicited echolocation calls but not communication calls. In both cases the blockade was reversible. Conclusion The neural control of echolocation and communication calls seems to be differentially organized below the level of the PAG. The PLA is an essential functional unit for echolocation call control before the descending pathways share again the final common pathway for vocalization.

  16. 2011 International Conference in Electrics, Communication and Automatic Control Proceedings

    CERN Document Server

    2012-01-01

    This two-volume set contains the very latest, cutting-edge material in electrics, communication and automatic control. As a vital field of research that is highly relevant to current developments in a number of technological domains, the subjects it covers include micro-electronics and integrated circuit control, signal processing technology, next-generation network infrastructure, wireless communication and scientific instruments. The aim of the International Conference in Electrics, Communication and Automatic Control, held in Chongqing, China, in June 2011 was to provide a valuable inclusive platform for researchers, engineers, academicians and industrial professionals from all over the world to share their research results with fellow scientists in the sector. The call for papers netted well over 600 submissions, of which 224 were selected for presentation. This fully peer-reviewed collection of papers from the conference can be viewed as a single-source compendium of the latest trends and techniques in t...

  17. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal...

  18. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-01-26

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... market access to customers or other persons, to implement risk management controls and supervisory... pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access),\\10\\ and thus could...

  19. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  20. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  1. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10 a.m.-4..., Airport Security Access Control Systems. The agenda will include the following: February 9, 2012...

  2. Data communications and computer communications network

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Gwon; Gu, Chang Hoe

    2005-03-15

    This textbook is composed of twelve chapters, which are communication network introduction, foundation of data communication, data link control, circuit switching system, packet switching system, multiple access communication system, protocol and architecture, LAN, MAN communication network, integrated service digital network, internet and Asymmetric digital subscriber Line and Wireless Local Loop. Each chapter has the introduction of the technique, structure, function and practice problems. It also has the appendix on electricity and communication standards organization, characteristic table and glossary.

  3. Data communications and computer communications network

    International Nuclear Information System (INIS)

    This textbook is composed of twelve chapters, which are communication network introduction, foundation of data communication, data link control, circuit switching system, packet switching system, multiple access communication system, protocol and architecture, LAN, MAN communication network, integrated service digital network, internet and Asymmetric digital subscriber Line and Wireless Local Loop. Each chapter has the introduction of the technique, structure, function and practice problems. It also has the appendix on electricity and communication standards organization, characteristic table and glossary.

  4. Exploring Bridge-Engine Control Room Collaborative Team Communication

    Directory of Open Access Journals (Sweden)

    Aditi Kataria

    2015-06-01

    Full Text Available The EC funded CyClaDes research project is designed to promote the increased impact of the human element in shipping across the design and operational lifecycle. It addresses the design and operation of ships and ship systems. One of the CyClaDes’ tasks is to create a crew-centered design case-study examination of the information that is shared between the Bridge and Engine Control Room that helps the crew co-ordinate to ensure understanding and complete interconnected tasks. This information can be provided in various ways, including communication devices or obtained from a common database, display, or even the ship environment (e.g., the roll of the ship. A series of semi-structured interviews were conducted with seafarers of diverse ranks to get a better idea of what communication does, or should, take place and any problems or challenges existing in current operations, as seen from both the bridge and ECR operators’ perspectives. Included in the interview were both the standard communications and information shared during planning and executing a voyage, as well as special situations such as safety/casualty tasks or heavy weather. The results were analyzed in terms of the goals of the communication, the primary situations of interest for communication and collaboration, the communication media used, the information that is shared, and the problems experienced. The results of seafarer interviews are presented in the paper to explore on-board inter-departmental communication.

  5. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  6. Scholarly Publishing's Evolving Landscape: Impact Metrics, Electronic-Only Journals, and Open Access in Journalism and Communication Research

    Science.gov (United States)

    Antell, Karen; Foote, Joe S.; Foote, Jody Bales

    2016-01-01

    This study surveys the landscape of scholarly publishing, with particular emphasis on scholarly journals in the communication discipline, measuring the shift to electronic publishing in six selected disciplines and exploring two other important emerging topics: open-access publishing and new journal citation metrics. The goals are to inform…

  7. Trust-based Access Control in Virtual Learning Community

    Science.gov (United States)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  8. Cancer control and the communication innovation in South Korea: implications for cancer disparities.

    Science.gov (United States)

    Jung, Minsoo

    2013-01-01

    Over the last 10 years, the number of cancer survivors in South Korea has reached nearly one million with a survival rate of 49.4%. However, integrated supportive care for cancer survivors is lagging. One area in which the current cancer control policy needs updating is in the utilization of information and communication technology (ICT). The remarkable progress in the field of ICT over the past 10 years presents exciting new opportunities for health promotion. Recent communication innovations are conducive to the exchange of meta-information, giving rise to a new service area and transforming patients into active medical consumers. Consequently, such innovations encourage active participation in the mutual utilization and sharing of high-quality information. However, these benefits from new ICTs will almost certainly not be equally available to all, leading to so-called communication inequalities where cancer survivors from lower socioeconomic classes will likely have more limited access to the best means of making use of the health information. Therefore, most essentially, emphasis must be placed on helping cancer survivors and their caregivers utilize such advances in ICT to create a more efficient flow of health information, thereby reducing communication inequalities and expanding social support. Once we enhance access to health information and better manage the quality of information, as a matter of fact, we can expect an alleviation of the health inequalities faced by cancer survivors. PMID:23886120

  9. A Semantic Context-Based Model for MobileWeb Services Access Control

    OpenAIRE

    Haibo Shen; Yu Cheng

    2011-01-01

    As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic context-based access control model (called SCBAC) to be applied in mobile web services environment by combining ...

  10. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    OpenAIRE

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  11. Safety systems and access control in the National Ignition Facility.

    Science.gov (United States)

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  12. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    that is suitable for video surveillance systems as well as other domains sharing similar requirements. As the currently dominant access control models – the role-based access control (RBAC) and the attribute-based access control (ABAC) – suffer from limitations while offering features complementary to each other...... while addressing the role- and permission-explosion issues faced in RBAC. Based on our access control model, we then present an access control mechanism for video surveillance systems. Contrary to the existing approaches, the proposed access control mechanism is role-oriented and retains advantages...... associated with role-based access control, yet it allows specification of policies using the metadata associated with the objects as well as the attributes of users and environment. In addition to role hierarchies, the content-based permissions in our model allow derivation of several permissions from...

  13. Outbreaks: Sources of Epidemiological Knowledge in Communicable Disease Control

    NARCIS (Netherlands)

    P.L.J.M. Mertens (Paulus Leonardus Johannes Marie)

    2008-01-01

    textabstractPublic health has been defined as the science and art of disease prevention, prolonging life, and promoting health and well-being through organized community effort for the sanitation of the environment, the control of communicable infections, the organization of medical and nursing serv

  14. Control and Non-Payload Communications Generation 1 Prototype Radio Flight Test Report

    Science.gov (United States)

    Shalkhauser, Kurt A.; Young, Daniel P.; Bretmersky, Steven C.; Ishac, Joseph A.; Walker, Steven H.; Griner, James H.; Kachmar, Brian A.

    2014-01-01

    Unmanned aircraft (UA) represent a new capability that will provide a variety of services in the Government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized because of the lack of a common understanding of what is required to safely operate Unmanned Aircraft Systems in the National Airspace System (UAS in the NAS). The desire and ability to fly UA is of increasing urgency. The application of UA to perform national security, defense, scientific, and emergency management are driving the critical need for less restrictive access by UA to the NAS. Existing Federal Aviation Regulations, procedures, and technologies do not allow routine UA access to the NAS. Access to the NAS is hampered by challenges such as the lack of an onboard pilot to see and avoid other aircraft; the ability of a single pilot or operator to control multiple UA; the reliance on command and control (C2) links; the altitudes, speeds, and duration at which the aircraft fly; and the wide variation in UA size and performance. NASA is working with other Government agencies to provide solutions that reduce technical barriers and make access to the NAS routine. This goal will be accomplished through system-level integration of key concepts, technologies, or procedures and through demonstrations of these integrated capabilities in an operationally relevant environment. This project provides an opportunity to transition the acquired empirical data and knowledge to the Federal Aviation Administration and other stakeholders to help them define the requirements for routine UA access to the NAS.Radio communications channels for UA are currently managed through exceptions and use either Department of Defense frequencies for line-of-sight (LOS) and satellite-based communications links, low-power LOS links in amateur bands, or unlicensed Industrial/Scientific/Medical (ISM) frequencies. None of these frequency bands are designated for safety and

  15. Security controls in the Stockpoint Logistics Integrated Communications Environment (SPLICE)

    Science.gov (United States)

    Arseneault, D. S.

    1985-03-01

    This thesis examines security controls specified and implemented in the Stock Point Logistics Integrated Communications Environment (SPLICE) project. Controls provided by the Defense Data Network and the Tandem operating system are reviewed. Alternatives from current literature in areas of authentication, encryption, and dial-port protection are reviewed for the purpose of suggesting enhancements. Issues discussed apply to most interactive/decentralized systems in operation today and include administrative as well as technical recommendations.

  16. Nuclear and related techniques in the control of communicable diseases

    International Nuclear Information System (INIS)

    The IAEA has a programme component entitled ''Nuclear Techniques in Communicable Diseases'', the aims of which are to encourage research in the development of new methods of controlling communicable diseases and to transfer the technology to institutes in endemic regions. Implementation of the programme component includes information exchange through publications, symposiums and seminars. The two most recent seminars were held in Bombay in November 1988 and Belo Horizonte in November 1989, and a selection of the papers presented have been published in this Technical Document. Refs, figs and tabs

  17. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel;

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC...... of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...... emergency response scenario which highlights the novel challenges that arise when enforcing access control in an environment with moving subjects and objects. To address a realistic application scenario, we consider movement on road networks, and we identify complex access control decisions relevant...

  18. Current Hale ROA Voice and Control Communication Practices and Performance: White Paper

    Science.gov (United States)

    2007-01-01

    The objective of this white paper is to help achieve the ACCESS 5 goal by sharing the UNITE members knowledge of current HALE ROA communication systems with other ACCESS 5 participants so that all interested parties start from a common understanding as we begin the clarification of requirements for voice and C2 communication. This white paper is also intended to describe the point of departure for any future developments that need to be realized to achieve the long term ACCESS 5 goal. Although this white paper describes the current systems, the functional and performance requirements that are also being developed under ACCESS 5 may not require the same levels of functionality and performance as currently exist. The paper addresses the following: 1) A description of a typical current HALE ROA communications system, 2) HALE ROA communications systems performance metrics, 3) HALE ROA communications systems performance, and 5) A comparison of current HALE ROA communications systems with current regulations.

  19. Nonverbal social communication and gesture control in schizophrenia.

    Science.gov (United States)

    Walther, Sebastian; Stegmayer, Katharina; Sulzbacher, Jeanne; Vanbellingen, Tim; Müri, René; Strik, Werner; Bohlhalter, Stephan

    2015-03-01

    Schizophrenia patients are severely impaired in nonverbal communication, including social perception and gesture production. However, the impact of nonverbal social perception on gestural behavior remains unknown, as is the contribution of negative symptoms, working memory, and abnormal motor behavior. Thus, the study tested whether poor nonverbal social perception was related to impaired gesture performance, gestural knowledge, or motor abnormalities. Forty-six patients with schizophrenia (80%), schizophreniform (15%), or schizoaffective disorder (5%) and 44 healthy controls matched for age, gender, and education were included. Participants completed 4 tasks on nonverbal communication including nonverbal social perception, gesture performance, gesture recognition, and tool use. In addition, they underwent comprehensive clinical and motor assessments. Patients presented impaired nonverbal communication in all tasks compared with controls. Furthermore, in contrast to controls, performance in patients was highly correlated between tasks, not explained by supramodal cognitive deficits such as working memory. Schizophrenia patients with impaired gesture performance also demonstrated poor nonverbal social perception, gestural knowledge, and tool use. Importantly, motor/frontal abnormalities negatively mediated the strong association between nonverbal social perception and gesture performance. The factors negative symptoms and antipsychotic dosage were unrelated to the nonverbal tasks. The study confirmed a generalized nonverbal communication deficit in schizophrenia. Specifically, the findings suggested that nonverbal social perception in schizophrenia has a relevant impact on gestural impairment beyond the negative influence of motor/frontal abnormalities. PMID:25646526

  20. Nonverbal social communication and gesture control in schizophrenia.

    Science.gov (United States)

    Walther, Sebastian; Stegmayer, Katharina; Sulzbacher, Jeanne; Vanbellingen, Tim; Müri, René; Strik, Werner; Bohlhalter, Stephan

    2015-03-01

    Schizophrenia patients are severely impaired in nonverbal communication, including social perception and gesture production. However, the impact of nonverbal social perception on gestural behavior remains unknown, as is the contribution of negative symptoms, working memory, and abnormal motor behavior. Thus, the study tested whether poor nonverbal social perception was related to impaired gesture performance, gestural knowledge, or motor abnormalities. Forty-six patients with schizophrenia (80%), schizophreniform (15%), or schizoaffective disorder (5%) and 44 healthy controls matched for age, gender, and education were included. Participants completed 4 tasks on nonverbal communication including nonverbal social perception, gesture performance, gesture recognition, and tool use. In addition, they underwent comprehensive clinical and motor assessments. Patients presented impaired nonverbal communication in all tasks compared with controls. Furthermore, in contrast to controls, performance in patients was highly correlated between tasks, not explained by supramodal cognitive deficits such as working memory. Schizophrenia patients with impaired gesture performance also demonstrated poor nonverbal social perception, gestural knowledge, and tool use. Importantly, motor/frontal abnormalities negatively mediated the strong association between nonverbal social perception and gesture performance. The factors negative symptoms and antipsychotic dosage were unrelated to the nonverbal tasks. The study confirmed a generalized nonverbal communication deficit in schizophrenia. Specifically, the findings suggested that nonverbal social perception in schizophrenia has a relevant impact on gestural impairment beyond the negative influence of motor/frontal abnormalities.

  1. 卫星通信终端话音接入车通的分析%Analysis on Voice Access from Satellite Communication Terminals to Vehicular Communication System

    Institute of Scientific and Technical Information of China (English)

    薛晓飞; 白雪杨

    2012-01-01

    Aiming at application requirements of satellite voice communication on moving vehicles, great influence of vehicle movement on satellite communication voice effect and the disadvantage that the voice can not be shared by multi-members,this paper analyzes the voice of satellite communication terminals and the category and characteristics of vehicular communication system, and provides two methods, one is to access two-line and four-line analog voice to different vehicular communication systems, the other is to access IP voice to digital vehicular communication system,so as to provide references to practical engineering application.%根据车辆运动中对卫星话音通信的应用需求,针对车辆运动噪音对卫星通信话音效果影响大,以及卫星通信话音不能供多个乘员共享使用的缺点,对卫星通信终端的话音和车通的种类、特点进行了分析;提出了通过话音接入装置将卫星通信终端二线和四线模拟话音接入到各种车通的方法,以及通过必要的协议转换将IP话音接入到数字车通的方法,可以为实际的工程应用提供参考。

  2. A novel distributed algorithm for media access control address assignment in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    TIAN Ye; SHENG Min; LI Jiandong

    2007-01-01

    This Paper presents a novel distributed media access control(MAC)address assignment algorithm,namely virtual grid spatial reusing(VGSR),for wireless sensor networks,which reduces the size of the MAC address efficiently on the basis of both the spatial reuse of MAC address and the mapping of geographical position.By adjusting the communication range of sensor nodes,VGSR algorithm can minimize the size of MAC address and meanwhile guarantee the connectivity of the sensor network.Theoretical analysis and experimental results show that VGSR algorithm is not only of low energy cost,but also scales well with the network ize,with its performance superior to that of other existing algorithms.

  3. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  4. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  5. OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITYBASED ENCRYPTION WITH ANONYMOUS KEY ISSUING

    Institute of Scientific and Technical Information of China (English)

    Xu Lingling; Zhang Fangguo; Wen Yamin

    2011-01-01

    In ACM'CCS 2009,Camenisch,et al.proposed the Obhvious Transfer with Access Control (AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the simplified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption (IBE) with Anonymous Key Issuing (AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.

  6. 基于XACML的EPCIS访问控制模型%Access Control Model for EPCIS Based on XACML

    Institute of Scientific and Technical Information of China (English)

    李景峰; 李云鹏

    2013-01-01

    根据供应链系统对EPC信息服务(EPCIS)提出的访问控制需求,设计一种基于可扩展访问控制标记语言(XACML)的EPCIS访问控制模型.模型中的访问控制执行接口利用方法拦截技术实现对访问请求的拦截,并生成决策上下文对象.访问控制服务组件基于决策上下文对象中包含的用户、资源、环境和动作属性实现对访问请求的动态评估.安全通信组件利用安全性断言标记语言,结合缓存机制实现XACML授权请求/响应的实时传输.访问控制流程表明,该模型能够实现灵活的访问控制策略部署和管理,具有供应链产品信息访问控制的动态性、异构性等特点.%The special access control requirements of EPC Information Service(EPCIS) in the supply chains are analyzed,and an EPCIS access control model based on Extensible Access Control Markup Language(XACML) is presented.The access control execution interface in the model can intercept the access requests by using the method intercepting technology,and produce the corresponding judgment context.Based on the user property,resource property,environment property and action property,which are included into the judgment context,the access control service component can dynamically assess the access requests.The secure communication component can effectively provide the real-time transmission for XACML authorization request/response messages,by combining the Security Assertion Markup Language(SAML) and the caching mechanism.The access control workflow indicates that the model can implement the flexible and variable deployment and management of the access control strategies,which is well fit for implement highly dynamic and heterogeneous access control function for the product information in the supply chains.

  7. Complex systems relationships between control, communications and computing

    CERN Document Server

    2016-01-01

    This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity an...

  8. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  9. Access Control Mechanisms for Semantic Web services-A Discussion on Requirements & Future Directions

    CERN Document Server

    Gondara, Mandeep Kaur

    2011-01-01

    Semantic Web is an open, distributed, and dynamic environment where access to resources cannot be controlled in a safe manner unless the access decision takes into account during discovery of web services. Security becomes the crucial factor for the adoption of the semantic based web services. An access control means that the users must fulfill certain conditions in order to gain access over web services. Access control is important in both perspectives i.e. legal and security point of view. This paper discusses important requirements for effective access control in semantic web services which have been extracted from the literature surveyed. I have also discussed open research issues in this context, focusing on access control policies and models in this paper.

  10. High-speed narrowband PLC - High-performance Access Powerline Communication structures in smart grid; High-Speed Narrowband PLC. Leistungsfaehige Access-Powerline-Kommunikationsstrukturen im Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Offner, Georg [devolo AG, Aachen (Germany)

    2012-07-01

    The smart grid provides a stable operation of a decentralized power system which is fed more and more by small providers by means of solar technology and wind power technology. Furthermore, commercial and private clients profit from the smart grid, as they may capture information about their current consumption in real time or can obtain these data from the Internet. The author of the contribution under consideration presents new approaches to access powerline communications that enable efficient communication between IPv6 based household meter and network station. The contribution under consideration describes the technologies used as well as practical experiences and initial results from field tests. Here insights from the integration of G3-PLC are in the foreground.

  11. I/O Standard Based Thermal/Energy Efficient Green Communication For Wi-Fi Protected Access on FPGA

    DEFF Research Database (Denmark)

    Kumar, Tanesh; Pandey, Bishwajeet; Das, Teerath;

    2014-01-01

    In this paper, we analyzed how does life and reliability of an integrated circuit is affected when it is operated in different regions under different temperatures. We have taken Fibonacci generator as our target circuit and LVCMOS as I/O standards. WPA and WPA2 (Wi-Fi Protected Access) key can...... be generated with Fibonacci generator. Here, thermal efficient green Fibonacci Generator is used to generate key for Wi-Fi Protected Access in order to make green communication possible under different room temperature. By analysis it is observed that at standard normal temperature (21degrees C), LVCMOS12 have...

  12. Bilateral Control Using Master/Slave Simulator for Haptic Communication

    Science.gov (United States)

    Yokokura, Yuki; Katsura, Seiichiro; Ohishi, Kiyoshi

    A bilateral controller is used to transmit and share haptic information between a master system and a slave system. In a transmission system, the bilateral controller encounters problems in the event of data packet loss and/or disconnections. In this study, a master/slave simulator and environmental data memory are used to solve the problems. In the case of normal operation, the environmental data memory stores force data in a remote side. The control system is operated by the environmental data memory and master/slave simulator when the communication lines are disconnected.

  13. Mapping communicable disease control in the European union.

    Science.gov (United States)

    Elliott, Heather A; Jones, David K; Greer, Scott L

    2012-12-01

    Understanding both the current performance of communicable disease control in Europe and the scale of the differences among systems is crucial to understanding its present performance and possible Europeanization. We attempt to identify the structure of authority in communicable disease control in each European Union (EU) member state. The primary sources of information were the competent bodies list posted on the European Centre for Disease Prevention and Control website and the Health in Transition reports produced by the European Observatory on Health Systems and Policies. Three key patterns emerge to answer the question of who does what. First, the landscape is full and crowded, with many actors involved. Second, the landscape is highly fragmented, with many organizations performing overlapping functions in each country. Third, regional patterns describe which types of organizations are assigned which functions. These full, fragmented, and regionally disparate systems show no signs of constituting a shared model. As a result, if there is an EU model of communicable disease control today, it is at most an aspiration. PMID:22899840

  14. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  15. Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Directory of Open Access Journals (Sweden)

    Adebukola Onashoga

    2014-02-01

    Full Text Available Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as it relates to access control, a Role based Examination System (RBES was designed, developed and evaluated. RBES attempted to solve the security issue by the combination of two authentication techniques: text-based authentication and graphical password authentication. The Text-based authentication utilizes two text-based parameters namely the username and password. The graphical password authentication makes use of a finite set of controls (RBES chooses radio buttons which are identified by numbers. These numbers constitute the password used for graphical authentication. To improve on resource sharing among users in the examination system, RBES proposes role management (role creation, role update, role removal and user management (user creation, user update and user removal. The developed system made use of asp.net, C#, IIS server, WAMP server, Mysql and other tools for its development. RBES was tested by some legitimate and illegitimate users and the performance of the system was found to be satisfactory, hence RBES shows an efficient and reliable scheme that can be deployed in any examination or e-learning system. Finally the potential threats to the system were modeled and the use of weak passwords was found to be the most likely threat the system could be vulnerable to.

  16. Gender, sex and sexuality in two open access communication journals published in Portugal: a critical overview of current discursive practices

    OpenAIRE

    Pinto-Coelho, Zara; Mota-Ribeiro, Silvana

    2016-01-01

    The links between gender, sex and sexuality and their relevance are theoretically and politically problematic (Richardson, 2007). One of the difficulties in understanding their interconnections is that these terms are often used differently and ambiguously by different authors (and even by the same authors). This article reports the results of an analysis of the articles published in open access communication journals with known impact factor, edited in Portugal and publishe...

  17. Introduction to Command, Control, and Communications: a primer

    OpenAIRE

    Eidson, Edward H.

    1995-01-01

    This thesis is a primer for students in the Introduction to Command, Control, and Communications Courses at the Naval Postgraduate School. This document provide students a consolidated reference that emphasizes key concepts and ideas presented by the course instructor and required readings. Its organization closely parallels the course outline used for in-class instruction. It supports course objectives by providing an executive overview of a wide variety of C2 topics. These topics include: C...

  18. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  19. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  20. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  1. Communication Security for Control Systems in Smart Grid

    Science.gov (United States)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  2. Security Encryption Scheme for Communication of Web Based Control Systems

    Science.gov (United States)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  3. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access... Prescriptions § 1311.125 Requirements for establishing logical access control—Individual practitioner. (a) At... his two-factor authentication credential to satisfy the logical access controls. The second...

  4. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  5. Broadband passive optical network media access control protocols

    Science.gov (United States)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  6. Enhanced Communication Network Solution for Positive Train Control Implementation

    Science.gov (United States)

    Fatehi, M. T.; Simon, J.; Chang, W.; Chow, E. T.; Burleigh, S. C.

    2011-01-01

    The commuter and freight railroad industry is required to implement Positive Train Control (PTC) by 2015 (2012 for Metrolink), a challenging network communications problem. This paper will discuss present technologies developed by the National Aeronautics and Space Administration (NASA) to overcome comparable communication challenges encountered in deep space mission operations. PTC will be based on a new cellular wireless packet Internet Protocol (IP) network. However, ensuring reliability in such a network is difficult due to the "dead zones" and transient disruptions we commonly experience when we lose calls in commercial cellular networks. These disruptions make it difficult to meet PTC s stringent reliability (99.999%) and safety requirements, deployment deadlines, and budget. This paper proposes innovative solutions based on space-proven technologies that would help meet these challenges: (1) Delay Tolerant Networking (DTN) technology, designed for use in resource-constrained, embedded systems and currently in use on the International Space Station, enables reliable communication over networks in which timely data acknowledgments might not be possible due to transient link outages. (2) Policy-Based Management (PBM) provides dynamic management capabilities, allowing vital data to be exchanged selectively (with priority) by utilizing alternative communication resources. The resulting network may help railroads implement PTC faster, cheaper, and more reliably.

  7. Display For Command, Control, Communication and Intelligence System

    Directory of Open Access Journals (Sweden)

    S. Prabhu

    1998-04-01

    Full Text Available Display subsystem is an important part of command, control, communication and intelligence(C31 system. The display used in C31 system for air defence should provide a panoramic view of thecomplete air segment under its command and control in real-time. The necessary information requiredfor taking a quick decision should be available to the commander in easily understandable graphicformat This paper describes salient features of the display known as synthetic radar situation display(SRSD developed by the Defence Electronics Research Laboratory (DLRL, Hyderabad, for such applications

  8. Wi-Fi Networks Security and Accessing Control

    Directory of Open Access Journals (Sweden)

    Tarek S. Sobh

    2013-06-01

    Full Text Available As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

  9. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  10. Role-based access control through on-demand classification of electronic health record.

    Science.gov (United States)

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority.

  11. Role-based access control through on-demand classification of electronic health record.

    Science.gov (United States)

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  12. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  13. NASA Unmanned Aircraft (UA) Control and Non-Payload Communication (CNPC) System Waveform Trade Studies

    Science.gov (United States)

    Chavez, Carlos; Hammel, Bruce; Hammel, Allan; Moore, John R.

    2014-01-01

    Unmanned Aircraft Systems (UAS) represent a new capability that will provide a variety of services in the government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized due to the lack of a common understanding of what is required to safely operate UAS in the National Airspace System (NAS). To address this deficiency, NASA has established a project called UAS Integration in the NAS (UAS in the NAS), under the Integrated Systems Research Program (ISRP) of the Aeronautics Research Mission Directorate (ARMD). This project provides an opportunity to transition concepts, technology, algorithms, and knowledge to the Federal Aviation Administration (FAA) and other stakeholders to help them define the requirements, regulations, and issues for routine UAS access to the NAS. The safe, routine, and efficient integration of UAS into the NAS requires new radio frequency (RF) spectrum allocations and a new data communications system which is both secure and scalable with increasing UAS traffic without adversely impacting the Air Traffic Control (ATC) communication system. These data communications, referred to as Control and Non-Payload Communications (CNPC), whose purpose is to exchange information between the unmanned aircraft and the ground control station to ensure safe, reliable, and effective unmanned aircraft flight operation. A Communications Subproject within the UAS in the NAS Project has been established to address issues related to CNPC development, certification and fielding. The focus of the Communications Subproject is on validating and allocating new RF spectrum and data link communications to enable civil UAS integration into the NAS. The goal is to validate secure, robust data links within the allocated frequency spectrum for UAS. A vision, architectural concepts, and seed requirements for the future commercial UAS CNPC system have been developed by RTCA Special Committee 203 (SC-203) in the process

  14. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  15. Communications and control for electric power systems: Final report

    Energy Technology Data Exchange (ETDEWEB)

    Kirkham, H.

    1998-04-01

    This report is a summary of some of the work done on the Communications and Control project, with particular emphasis on the achievements during the years 1986--1996. During those years, the project moved away from concern with dispersed storage and generation and its impact on power system operation (the team was responsible for studies in this area, and for making a power system simulator that included DSG), and became involved in more concrete work aimed at applying high-tech solutions to problems of power system communications and control. This report covers work done at JPL on the following topics: (1) the measurement of electric and magnetic fields, both ac and dc; (2) the use of optical power to supply low-power electronics; (3) the design of a fault-tolerant communication system designed for distribution automation; and (4) a digital phase locked loop that allows the use of low-power transmitting electronics to recreate a good-quality signal at the receiver. In a report of this kind, only the results and highlights of the work are described.

  16. THE COMMUNICATION OF INTERNAL CONTROL SYSTEM WEAKNESSES - NECESSITY AND RESPONSIBILITY

    Directory of Open Access Journals (Sweden)

    Mariana, NEDELCU (BUNEA

    2014-11-01

    Full Text Available In terms of its mission, the control is an inherent part of management, being a specifically human activity, especially useful serving both the management, business partners, public institutions and public. Especially in the last period, amid the economic and financial crisis manifested in recent years, the control has evolved and evolving both by the improvement of organization and management systems and by the response to continuous development of the environment in which it operates. The control activities are an integral part of the management process by which the entity aims to achieve their objectives. The research methodology consists essentially in a literature review and recent regulations in the analyzed field.The objective of this study is to highlight the way in which shall be communicated the deficiencies of internal control systems, to the persons responsible for their governance, inclusively in the banking system.

  17. Control of communication networks: welfare maximization and multipath transfers.

    Science.gov (United States)

    Key, Peter B; Massoulié, Laurent

    2008-06-13

    We discuss control strategies for communication networks such as the Internet. We advocate the goal of welfare maximization as a paradigm for network resource allocation. We explore the application of this paradigm to the case of parallel network paths. We show that welfare maximization requires active balancing across paths by data sources, and potentially requires implementation of novel transport protocols. However, the only requirement from the underlying 'network layer' is to expose the marginal congestion cost of network paths to the 'transport layer'. We further illustrate the versatility of the corresponding layered architecture by describing transport protocols with the following properties: they welfare maximization, each communication may use an arbitrary collection of paths, where paths may be from an overlay, and paths may be combined in series and parallel. We conclude by commenting on incentives, pricing and open problems. PMID:18325871

  18. Scientific Communication in the Developing World in an Open Access Mode: The SciELO Model

    Institute of Scientific and Technical Information of China (English)

    Rogerio Meneghini; Abel L. Packer

    2006-01-01

    This paper introduces the Scientific Electronic Library Online (SciELO) program and its three main objectives. Then the paper presents the methodology of open access to scientific information by the SciELO. At last, it shows the perspectives of open access in developing countries.

  19. Remote Access to Wireless Communications Systems Laboratory--New Technology Approach

    Science.gov (United States)

    Kafadarova, Nadezhda; Sotirov, Sotir; Milev, Mihail

    2012-01-01

    Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable students to use expensive laboratory equipment, which is not usually available to students. In…

  20. Reputation, relationships, risk communication, and the role of trust in the prevention and control of communicable disease: a review.

    Science.gov (United States)

    Cairns, Georgina; de Andrade, Marisa; MacDonald, Laura

    2013-01-01

    Population-level compliance with health protective behavioral advice to prevent and control communicable disease is essential to optimal effectiveness. Multiple factors affect perceptions of trustworthiness, and trust in advice providers is a significant predeterminant of compliance. While competency in assessment and management of communicable disease risks is critical, communications competency may be equally important. Organizational reputation, quality of stakeholder relationships and risk information provision strategies are trust moderating factors, whose impact is strongly influenced by the content, timing and coordination of communications. This article synthesizes the findings of 2 literature reviews on trust moderating communications and communicable disease prevention and control. We find a substantial evidence base on risk communication, but limited research on other trust building communications. We note that awareness of good practice historically has been limited although interest and the availability of supporting resources is growing. Good practice and policy elements are identified: recognition that crisis and risk communications require different strategies; preemptive dialogue and planning; evidence-based approaches to media relations and messaging; and building credibility for information sources. Priority areas for future research include process and cost-effectiveness evaluation and the development of frameworks that integrate communication and biomedical disease control and prevention functions, conceptually and at scale.

  1. An effective access control approach to support mobility in IPv6 networks

    Science.gov (United States)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  2. On the Decidability of the Safety Problem for Access Control Policies

    OpenAIRE

    Kleiner, Eldar; Newcomb, Tom

    2006-01-01

    An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is not obvious via human inspection; there is, therefore, a need for automated verification techniques that can check whether a policy does indeed implement some desired security requirement. Thirty years ago, a formalisation of access control presented a model and a safety specification for which satisfaction is undecida...

  3. Containment control of multi-agent systems with unbounded communication delays

    Science.gov (United States)

    Shen, Jun; Lam, James

    2016-07-01

    In this paper, we address the containment control problem for multi-agent systems under heterogeneous unbounded communication delays with emphasis on the convergence rate analysis. Different from most works on multi-agent systems, we resort to a viewpoint from the area of positive delay systems. We first cast the containment control problem into the stability analysis of an associated error system. In order to capture the convergence rate, we introduce a nondecreasing positive function whose reciprocal represents the decay rate of the associated error system. Under the assumption that each follower has access to at least one leader and some mild hypotheses on the communication delays, an explicit condition is given to characterise the decay rate of the associated error system in terms of linear programming. In addition, we provide several special cases when the communication delays are restricted by linear, sublinear and logarithmic growth rates, respectively. Finally, through numerical examples, it is shown that the convergence rate is dominated by the delays being the highest order infinitely large quantity.

  4. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    Science.gov (United States)

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  5. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class...... Barring solution. We then provide a brief overview of the Load Control solutions provided by the Enhanced Packet Core (EPC) Network and how they intertwine with the Extended Access Barring at the Enhanced Universal Terrestrial Radio Access Network (E-UTRAN). We also provide an outlook on the current 3GPP...... efforts in regards to MTC related load control issues....

  6. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  7. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, Mohsen; Sadighi, Babak

    2010-01-01

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based admin

  8. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  9. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13, 2012... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security...

  10. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security...

  11. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15, 2012... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security...

  12. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from 9... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security...

  13. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  14. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  15. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28, 2012... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security...

  16. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10, 2013... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security...

  17. Communicable disease control in England; recommendations from an American.

    Science.gov (United States)

    Detels, R

    1994-12-01

    The problems associated with the Wakefield salmonella and the Stafford Legionnaires' disease outbreaks and the recommendations of the Acheson Committee formed in response led to the creation of the position of Consultant in Communicable Disease Control (CCDC) within the District Health Authorities. The reality of the position as implemented differs from that envisaged by the Acheson Committee and has resulted in ambiguities about the role of the CsCDC, the source of their support, and the range of their responsibilities. This paper, by an American invited to review the position, outlines the history of the position, the current status of CsCDC, and the barriers to effective performance of the position. It ends with a series of recommendations for improving disease control within England by solidifying the position, establishing its role in disease control within the National Health Service and recommending an educational/training pathway to attract and prepare physicians for the position.

  18. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  19. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    Science.gov (United States)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a

  20. A dynamic access control method based on QoS requirement

    Science.gov (United States)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  1. The Study of Access Control for Service-Oriented Computing in Internet of Things

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2012-06-01

    Full Text Available In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC, and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  2. Multi-Gigabits Millimetre Wave Wireless Communications for 5G: From Fixed Access to Cellular Networks

    OpenAIRE

    Wang, Peng; Li, Yonghui; Song, Lingyang; Vucetic, Branka

    2014-01-01

    With the formidable growth of various booming wireless communication services that require ever-increasing data throughputs, the conventional microwave band below 10 GHz, which is currently used by almost all mobile communication systems, is going to reach its saturation point within just a few years. Therefore, the attention of radio system designers has been pushed towards ever-higher segments of the frequency spectrum in a quest for capacity increase. In this article, we investigate the fe...

  3. Access to communication technologies in a sample of cancer patients: an urban and rural survey

    OpenAIRE

    Perkins Anthony; Butler Donna; Kroenke Kurt; Theobald Dale E; Abdullah Ma'n; Edgerton Sara; Dugan William M

    2005-01-01

    Abstract Background There is a growing awareness among providers of the symptom burden experienced by cancer patients. Systematic symptom screening is difficult. Our plan was to evaluate a technology-based symptom screening process using touch-tone telephone and Internet in our rural outreach cancer program in Indiana. Would rural patients have adequate access to technologies for home-based symptom reporting? Objectives 1) To determine access to touch-tone telephone service and Internet for p...

  4. Modeling the Impact of Communication Loss on the Power Grid under Emergency Control

    OpenAIRE

    Parandehgheibi, Marzieh; Turitsyn, Konstantin; Modiano, Eytan

    2015-01-01

    We study the interaction between the power grid and the communication network used for its control. We design a centralized emergency control scheme under both full and partial communication support, to improve the performance of the power grid. We use our emergency control scheme to model the impact of communication loss on the grid. We show that unlike previous models used in the literature, the loss of communication does not necessarily lead to the failure of the correspondent power nodes;...

  5. HIERARCHICAL ACCESS CONTROL IN DYNAMIC PEER GROUPS USING SYMMETRIC POLYNOMIAL AND TREE BASED GROUP ELLIPTIC CURVE DIFFIE HELLMAN SCHEME

    Directory of Open Access Journals (Sweden)

    Nafeesa Begum Jeddy

    2014-01-01

    Full Text Available Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inherently has hierarchical structures for functioning, where providing security by efficient group key management is a big challenging issue. While preserving centralized methods for hierarchical access control, it is difficult to achieve efficiency as a single membership change will result in lot of changes which are difficult to maintain. So, using distributed key agreement techniques is more appropriate for this scenario. This study explore on novel group key agreement approach, which combines both the symmetric polynomial scheme and Tree Based Group elliptic Curve key exchange. Also, it yields a secure protocol suite that is good in fault-tolerant and simple. The efficiency of SP-TGECDH is better than many other schemes. Using TGECDH makes the scheme suitable small Low powered devices.

  6. Secure Remote Access Issues in a Control Center Environment

    Science.gov (United States)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  7. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    CERN Document Server

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  8. Access to the ophthalmic artery by retrograde approach through the posterior communicating artery for intra-arterial chemotherapy of retinoblastoma

    Energy Technology Data Exchange (ETDEWEB)

    Pham, Chi-Tuan; Blanc, Raphael; Pistocchi, Silvia; Bartolini, Bruno; Piotin, Michel [Fondation Rothschild Hospital, Department of Interventional Neuroradiology, Paris (France); Lumbroso-Le Rouic, Livia [Institut Curie, Department of Ocular Oncology, Paris (France)

    2012-08-15

    Intra-arterial infusion of chemotherapy into the ophthalmic artery for treatment of retinoblastoma has been realized after catheterization of the internal carotid and temporary balloon occlusion beyond the orifice of the ophthalmic artery, or more recently after superselective canulation of the ophthalmic artery by a microcatheter. The superselective catheterization of the ophthalmic artery could be cumbersome because of the implantation of the ostium on the carotid siphon or because of the tortuosity of the carotid siphon. We report our experience of using a retrograde approach through the posterior communicating artery that allows a more direct angle of access to the origin of the ophthalmic artery. (orig.)

  9. Access to the ophthalmic artery by retrograde approach through the posterior communicating artery for intra-arterial chemotherapy of retinoblastoma

    International Nuclear Information System (INIS)

    Intra-arterial infusion of chemotherapy into the ophthalmic artery for treatment of retinoblastoma has been realized after catheterization of the internal carotid and temporary balloon occlusion beyond the orifice of the ophthalmic artery, or more recently after superselective canulation of the ophthalmic artery by a microcatheter. The superselective catheterization of the ophthalmic artery could be cumbersome because of the implantation of the ostium on the carotid siphon or because of the tortuosity of the carotid siphon. We report our experience of using a retrograde approach through the posterior communicating artery that allows a more direct angle of access to the origin of the ophthalmic artery. (orig.)

  10. Remote Control for Robotic Systems Using CORBA as Communication Architecture

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper proposes a novel method to implement network connections among a client and remoterobotic systems using CORBA for developing telecare system to aid the aged or disabled. The proposed methodmakes system have low cost and wide availability, high scaling and inter-operating ability to allow the clients andserver objects, written in different languages, run in different operating system, and connected in different net-work to inter-operate. It also makes system easy to be extended and integrated with the other technologies andapplications distributed over the Internet. Using CORBA as a communication architecture, we developed hard-ware base, task-level robot arm control server, live image feedback server and mobile robot control server,which can provide some basic care services to aid the aged and disabled.

  11. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  12. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    CERN Document Server

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  13. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  14. Dependability analysis of the data communication system in train control system

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Communication based train control (CBTC) system is based on mobile communication and overcomes fixed blocks in order to increase track utilization and train safety. The data communication system (DCS) between trains and wayside equipment is a crucial factor for the safe and efficient operation of CBTC system. The dependability under various transmission conditions needs to be modeled and evaluated. In this paper,a stochastic reward net (SRN) model for DCS based IEEE 802.11 standard was developed,which captures all relevant failure and failure recovery behavior system aspects in a concise way. We compared the reliability,availability for DCS with and without access point (AP) and antenna redundant configuration. We also quantitatively evaluated and compared the frame loss probability for three DCS configurations with different train velocities and train numbers in one radio cell. Fixed-point iteration was adopted to simplify the analysis. Numerical results showed the significant improvement of the reliability,availability and the frame loss probability index for the full redundant configuration.

  15. Advanced Data Communications for Downhole Data Logging and Control Applications in the Oil Industry

    International Nuclear Information System (INIS)

    We present details of 'Mercury', a high-speed downhole communications system that utilizes the (metallic) wall of a gas or oil pipeline or a drill 'string' as the communications 'channel' to control or monitor equipment or sensors used in the oil industry. Conventional downhole communication systems typically use 'mud pulse' telemetry for 'Measurement While Drilling' (MWD) operations. Current mud pulse telemetry technology offers bandwidths of up to 40 bit/s. However the data rate drops with increasing length of the wellbore and is typically as low as 1.5 bit/s – 3.0 bit/s at a depth of 35,000 ft. – 40,000 ft. The system described, by contrast, offers data rates of several megabits per second over distances of many kilometres and uses Orthogonal Frequency Division Multiplexing (OFDM) coupled with Wideband Frequency Division Multiple Access (W-CDMA). This paper presents details of our system; results of several trials undertaken on actual gas pipelines in the UK will be presented at the Conference

  16. Dependability analysis of the data communication system in train control system

    Institute of Scientific and Technical Information of China (English)

    XU TanHua; TANG Tao; GAO ChunHai; CAI BaiGen

    2009-01-01

    Communication based train control (CBTC) system is based on mobile communication and overcomes fixed blocks in order to increase track utilization and train safety. The data communication system (DCS) between trains and wayside equipment is a crucial factor for the safe and efficient operation of CBTC system. The dependability under various transmission conditions needs to be modeled and evaluated. In this paper, a stochastic reward net (SRN) model for DCS based IEEE 802.11 standard was developed, which captures all relevant failure and failure recovery behavior system aspects in a concise way. We compared the reliability, availability for DCS with and without access point (AP) and antenna redundant configuration. We also quantitatively evaluated and compared the frame loss probability for three DCS configurations with different train velocities and train numbers in one radio cell. Fixed-point iteration was adopted to simplify the analysis. Numerical results showed the significant improvement of the reliability, availability and the frame loss probability index for the full redundant configuration.

  17. Open access and the future of scholarly communication policy and infrastructure

    CERN Document Server

    Dickson, Katherine A

    2016-01-01

    It is impossible to imagine the future of academic libraries without an extensive consideration of open access the removal of price and permission barriers from scholarly research online. As textbook and journal subscription prices continue to rise, improvements in technology make online dissemination of scholarship less expensive, and faculty recognize the practical and philosophical appeal of making their work available to wider audiences. As a consequences, libraries have begun to consider a wide variety of open access flavors and business models. These new possibilities have significant impact on both library services and collection policies, and the call for new skills within library staffing. Volume 9 of the series Creating the 21st-Century Academic Library is the first of two addressing the topic of open access in academic libraries and focuses on policy and infrastructure for libraries that wish to provide leadership on their campus in the transition to more open forms of scholarship. Chapters in the ...

  18. Efficient LTE Access with Collision Resolution for Massive M2M Communications

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    LTE random access procedure performs satisfactorily in case of asynchronous, uncorrelated traffic arrivals. However, when the arrivals are correlated and arrive synchronously, the performance of the random access channel (RACH) is drastically reduced, causing a large number of devices to experience...... outage. In this work we propose a LTE RACH scheme tailored for delay-sensitive M2M services with synchronous traffic arrivals. The key idea is, upon detection of a RACH overload, to apply a collision resolution algorithm based on splitting trees. The solution is implemented on top of the existing LTE...

  19. The Crisis in Scholarly Communication, Open Access, and Open Data Policies: The Libraries' Perspective

    Science.gov (United States)

    Besara, Rachel

    2015-03-01

    For years the cost of STEM databases have exceeded the rate of inflation. Libraries have reallocated funds for years to continue to provide support to their scientific communities, but they are reaching a point at many institutions where they are no longer able to provide access to many databases considered standard to support research. A possible or partial alleviation to this problem is the federal open access mandate. However, this shift challenges the current model of publishing and data management in the sciences. This talk will discuss these topics from the perspective of research libraries supporting physics and the STEM disciplines.

  20. An Access Control Metamodel for Web Service-Oriented Architecture

    OpenAIRE

    Emig, Christian; Brandt, Frank; Abeck, Sebastian; Biermann, Jürgen; Klarl, Heiko

    2008-01-01

    With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web service-oriented architecture (WSOA) has been established. Considering the momentum observable by the growing number of specifications in the web service domain for the indispensable cross-cutting concern of identity management (IdM) it is still an open issue how a WSOA-aware IdM architecture is built and how it is link...

  1. Communicating with limited English proficiency (LEP) patients: question of health-care access.

    Science.gov (United States)

    Murphy, Stephen

    2004-01-01

    In the United States, the ability to understand English plays an essential role in how well patients and health-care providers communicate. This article highlights the concerns of providers, differential health-care outcomes, and risk management concerns of providing health care in an increasingly diverse and polyglot population. PMID:15500018

  2. ICT and accessibility: an action space perspective on the impact of new information and communication technologies

    NARCIS (Netherlands)

    Dijst, M.J.

    2004-01-01

    It is frequently asserted in the literature that new Information and Communication Technologies (ICTs) are on the point of a breakthrough into rapid growth. Although we cannot say whether this breakthrough will indeed take place and ― should it do so ― on what scale, in this paper we nevertheless an

  3. Access to Communication for Deaf, Hard-of-Hearing and ESL Students in Blended Learning Courses

    Science.gov (United States)

    Long, Gary L.; Vignare, Karen; Rappold, Raychel P.; Mallory, Jim

    2007-01-01

    In an effort to better understand student perceptions of communication in blended (online and traditional) learning courses, a 22 item questionnaire was developed and sent to all students registered for these courses at a large technology-focused college during three quarters of instruction. The respondents were divided into four groups: 1)…

  4. Institutional Repositories and Open Access Initiatives in Bangladesh: A New Paradigm of Scholarly Communication

    Directory of Open Access Journals (Sweden)

    Md. Anwarul Islam

    2013-06-01

    Full Text Available Nowadays, open access (OA in its diverse forms constitutes the most interesting and promising model for the research output of an academic or research institution. The purpose of the present study is to discuss the situation of OA in the developing world, with a focus on Bangladesh. The study also addresses why OA is important for developing countries and which initiatives have been taken in Bangladesh. Finally, we discuss some challenging issues of OA and suggestions on how to overcome these issues. It is rather obvious that developing countries have always faced a lack of research information and were unable to afford sufficient subscriptions to journals. The other side of the picture is the poor dissemination of the research outcome in the developing world. In Bangladesh, only three organizations have their institutional repository and have a reasonable number of local OA journals. We will identify some problems that impede the process of building open access IR, or more generally an OA environment in Bangladesh. We are convinced, however, that we will witness in the near future a sustainable growth of open access initiatives, with more open access literature and digital repositories.

  5. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2 and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC, advertisement-based MAC (A-MAC, Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC, and low-power real-time medium access control (LPR-MAC. The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  6. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  7. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  8. A Semantic Context-Based Model for MobileWeb Services Access Control

    Directory of Open Access Journals (Sweden)

    Haibo Shen

    2011-02-01

    Full Text Available As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic context-based access control model (called SCBAC to be applied in mobile web services environment by combining semantic web technologies with context-based access control mechanism. The proposed model is a context-centric access control solutions, context is the first-class principle that explicitly guides both policy specification and enforcement process. In order to handle context information in the model, this paper proposes a context ontology to represent contextual information and employ it in the inference engine. As well as, this paper specifies access control policies as rules over ontologies representing the concepts introduced in the SCBAC model, and uses semantic web rule language (SWRL to form policy rule and infer those rules by JESS inference engine. The proposed model can also be applied to context-aware applications.

  9. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    Science.gov (United States)

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  10. Linear programming and algorithms for communication networks a practical guide to network design, control, and management

    CERN Document Server

    Oki, Eiji

    2012-01-01

    Explaining how to apply to mathematical programming to network design and control, Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management fills the gap between mathematical programming theory and its implementation in communication networks. From the basics all the way through to more advanced concepts, its comprehensive coverage provides readers with a solid foundation in mathematical programming for communication networks. Addressing optimization problems for communication networks, including the shortest path problem, max f

  11. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Bruce Ndibanje

    2014-08-01

    Full Text Available Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. According to our analysis, Jing et al.’s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  12. Demand management through centralized control system using power line communication for existing buildings

    International Nuclear Information System (INIS)

    Highlights: • A pilot system was developed for demand management of equipment in buildings. • The networking was based on LonWorks platform and power line communication. • Demand strategies led to load reductions up to 74% and energy savings up to 25%. • The peak load reduction is expected to reach 3.44 GW by the year 2030. - Abstract: Managing peak demand efficiently is vital for maintaining uninterrupted supply of electrical power by utility providers. In this work, a pilot system was developed for managing and controlling the demand of major power consuming equipment in buildings from a central server, while relying mostly on existing infrastructure and maintaining consumer comfort. The system was successfully demonstrated on a selected group of buildings using the LonWorks networking platform. At the building level, the system utilized power line and twisted pair communication to control the thermostats of air-conditioning (A/C) units. The higher level communication was executed through extensible markup language (XML) and simple object access protocol (SOAP). The system provided control capabilities based on A/C unit priority, thermostat temperature, building type and geographic location. The development and execution of demand management strategies for selected buildings led to peak load reductions up to 74%, in addition to energy savings up to 25%. Implementing such a system at a national level in Kuwait is estimated to reduce peak demand by 3.44 GW, amounting to capital savings of $4.13 billion. The use of existing infrastructure reduced the cost and installation time of the system. Based on the successful testing of this pilot system, a larger-scale system is being developed

  13. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    Science.gov (United States)

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services. PMID:27240842

  14. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    OpenAIRE

    Bing Du; Jun Zhang

    2010-01-01

    A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC) model, a common compact model in hierarchical wireless sensor networks (WSNs). The scheme uses Low-Density Parity-Check (LDPC) as the ...

  15. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  16. Role-Based Access Control for the Large Hadron Collider at CERN

    CERN Document Server

    Yastrebov, I

    2010-01-01

    Large Hadron Collider (LHC) is the largest scientific instrument ever created. It was built with the intention of testing the most extreme conditions of the matter. Taking into account the significant dangers of LHC operations, European Organization for Nuclear Research (CERN) has developed multi-pronged approach for machine safety, including access control system. This system is based on role-based access control (RBAC) concept. It was designed to protect from accidental and unauthorized access to the LHC and injector equipment. This paper introduces the new model of the role-based access control developed at CERN and gives detailed mathematical description of it. We propose a new technique called dynamic authorization that allows deploying RBAC gradually in the large systems. Moreover, we show how the protection for the very large distributed equipment control system may be implemented in efficient way. This paper also describes motivation of the project, requirements and overview of the main components: au...

  17. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    XACML (eXtensible Access Control Markup Language) is a prominent access control language that is widely adopted both in industry and academia. XACML is an international standard in the field of information security. The problem with XACML is that its specification is described in natural language...... (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0. The...... main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...

  18. Inter-Vehicle Communication System Utilizing Autonomous Distributed Transmit Power Control

    Science.gov (United States)

    Hamada, Yuji; Sawa, Yoshitsugu; Goto, Yukio; Kumazawa, Hiroyuki

    In ad-hoc network such as inter-vehicle communication (IVC) system, safety applications that vehicles broadcast the information such as car velocity, position and so on periodically are considered. In these applications, if there are many vehicles broadcast data in a communication area, congestion incurs a problem decreasing communication reliability. We propose autonomous distributed transmit power control method to keep high communication reliability. In this method, each vehicle controls its transmit power using feed back control. Furthermore, we design a communication protocol to realize the proposed method, and we evaluate the effectiveness of proposed method using computer simulation.

  19. The RFID smart card management application for the hotel access control

    OpenAIRE

    Kreslin, Robert

    2011-01-01

    In this thesis we wanted to present the project that was made for a smaller hotel in Nova Gorica. The goal was to create an application for managing access control according to customer's wishes as well as to introduce the system into the existent infrastructure. The first step was to define what access control actually means. In broad terms it is divided into RFID – radio-frequency identification and biometric identification. Both have their strengths and their weaknesses. Next step was choo...

  20. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  1. A New Access Control Scheme for Facebook-style Social Networks

    OpenAIRE

    Pang, Jun; Zhang, Yang

    2013-01-01

    The popularity of online social networks (OSNs) makes the protection of users' private information an important but scientifically challenging problem. In the literature, relationship-based access control schemes have been proposed to address this problem. However, with the dynamic developments of OSNs, we identify new access control requirements which cannot be fully captured by the current schemes. In this paper, we focus on public information in OSNs and treat it as a new dimension which u...

  2. Multi-model-based Access Control in Construction Projects

    Directory of Open Access Journals (Sweden)

    Frank Hilbert

    2012-04-01

    Full Text Available During the execution of large scale construction projects performed by Virtual Organizations (VO, relatively complex technical models have to be exchanged between the VO members. For linking the trade and transfer of these models, a so-called multi-model container format was developed. Considering the different skills and tasks of the involved partners, it is not necessary for them to know all the models in every technical detailing. Furthermore, the model size can lead to a delay in communication. In this paper an approach is presented for defining model cut-outs according to the current project context. Dynamic dependencies to the project context as well as static dependencies on the organizational structure are mapped in a context-sensitive rule. As a result, an approach for dynamic filtering of multi-models is obtained which ensures, together with a filtering service, that the involved VO members get a simplified view of complex multi-models as well as sufficient permissions depending on their tasks.

  3. Access Control in the ATLAS TDAQ Online Cluster

    CERN Document Server

    Leahu, Marius Constantin; Stoichescu, D A; Lehmann Miotto, G

    ATLAS (A Toroidal LHC Apparatus) is a general-purpose detector for studying high-energy particle interactions: it is the largest particle detector experiment at CERN and it is built around one of the interaction points of the proton beams accelerated by the Large Hadron Collider (LHC). The detector generates an impressive amount of raw data: 64 TB per second as a result of 40 MHz proton-proton collision rate with 1.6 MB data for each such event. The handling of such data rate is managed by a three levels Trigger and Data Acquisition (TDAQ) system, which filters out the events not relevant from physics research point of view and selects in the end in the order of 1000 events per second to be stored for offline analyses. This system comprises a significant number of hardware devices, software applications and human personnel to supervise the experiment operation. Their protection against damages as a result of misuse and their optimized exploitation by avoiding the conflicting accesses to resources are key requ...

  4. TEMPORAL, DELEGABLE AND CHEAP UPDATE ACCESS CONTROL TO PUBLISHED XML DOCUMENTS

    Directory of Open Access Journals (Sweden)

    Waleed Halboob

    2013-01-01

    Full Text Available Providing access control for published XML documents on the Web is an important topic. It involves the use of cryptographic techniques, addressing different requirements and, as a result, facing several challenges. Existing solutions still have some weaknesses such as system update cost, number of required secret encryption/decryption keys, size of encrypted document and supporting temporal and delegable access. This study propose a push--based access control policy enforcement mechanism for addressing these issues using a Dynamic Key Management Table (DKMT and based on Identity Based Encryption (IBE. The proposed mechanism addresses the existing challenges and provides a more acceptable solution.

  5. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures that... develop, test, and implement the relevant risk management controls and supervisory procedures...

  6. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-11-15

    ... Exchange Commission 17 CFR Part 240 Risk Management Controls for Brokers or Dealers With Market Access... Regulations#0;#0; ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls.... The required financial risk management controls and supervisory procedures must be reasonably...

  7. GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATION IN CELLULAR NETWORKS

    Directory of Open Access Journals (Sweden)

    Fa-Bin Li

    2016-09-01

    Full Text Available With the current development of mobile communication services, people need personal communication of high speed, excellent service, high quality and low latency,however, limited spectrum resources become the most important factor to hamper improvement of cellular systems. As big amount of data traffic will cause greater local consumption of spectrum resources, future networks are required to have appropriate techniques to better support such forms of communication. D2D (Device-to-device communication technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall throughput of the networks. Due to the use of multiplexing D2D UE (User equipment resources and spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient mobile network, we can meet the QoS requirements by controlling the power to suppress the interference between the base station and a terminal user.

  8. Social responsibility and educational communication in communities accessed by the works: a case study. IEGA - enterprise implementations for gasene

    Energy Technology Data Exchange (ETDEWEB)

    Campos, Elisangela Assis de; Farias, Aline Marianne Magalhaes [LP Empreendimentos, Rio de janeiro, RJ (Brazil); Marques, Yanna Oliveira [Cia. Nacional de Dutos (Conduto S/A), Duque de Caxias, RJ (Brazil); Penido, Rita de Cassia [Sinopec Brasil, Rio de Janeiro, RJ (Brazil)

    2009-12-19

    Construction and assembly in a gas pipeline project is a constant study of realities and in some cases situations which involve interferences in communities, the company's interests must be wholly integrated with the primary need of the project which is to construct with Social-Environmental Responsibility, establish a good relationship, respect the communities values in which the project passes through and around and surround itself with measures guaranteeing safety, information about the activities and cause minimal impact in the day to day lives of the residents. At Spread 2A of the Pipeline project Cacimbas-Catu, the necessity to develop a specific project for the communities surrounding the access areas was elaborated principally because the topography only permitted the transportation of pipes, equipment and personnel to pass through these areas. This unique situation was drafted based on the transit of vehicles and heavy machinery, through communities with a low IDH (Human Development Index), dangerous living conditions and a high demographic density. Preventive and pacifying actions for Communities and Social responsibility were drafted and developed, involving a multidisciplinary collective effort with other sectors of the project, applying a global theme to ensure safety for the residents around the access areas, also to divulge information in regards to project activities, establish ethical and transparent communication and implement measures that assist in building a solid relationship between the enterprise and community, anticipating risky situations and possible conflicts. This Case Study has as an objective to present projects that were developed in the area of Communication and Social Responsibility in the Access Communities and that, proved effective, became standard within the entire work force's Trainings and Daily Safety, Environmental, and Occupational Health Dialoguing. During the development of the Project 'Street of Leisure

  9. Distributed communications and control network for robotic mining

    Science.gov (United States)

    Schiffbauer, William H.

    1989-01-01

    The application of robotics to coal mining machines is one approach pursued to increase productivity while providing enhanced safety for the coal miner. Toward that end, a network composed of microcontrollers, computers, expert systems, real time operating systems, and a variety of program languages are being integrated that will act as the backbone for intelligent machine operation. Actual mining machines, including a few customized ones, have been given telerobotic semiautonomous capabilities by applying the described network. Control devices, intelligent sensors and computers onboard these machines are showing promise of achieving improved mining productivity and safety benefits. Current research using these machines involves navigation, multiple machine interaction, machine diagnostics, mineral detection, and graphical machine representation. Guidance sensors and systems employed include: sonar, laser rangers, gyroscopes, magnetometers, clinometers, and accelerometers. Information on the network of hardware/software and its implementation on mining machines are presented. Anticipated coal production operations using the network are discussed. A parallelism is also drawn between the direction of present day underground coal mining research to how the lunar soil (regolith) may be mined. A conceptual lunar mining operation that employs a distributed communication and control network is detailed.

  10. Interprocess communication within the DIII-D plasma control system

    International Nuclear Information System (INIS)

    The DIII-D tokamak fusion research experiment's real-time digital plasma control system (PCS) is a complex and ever evolving system. During a plasma experiment, it is tasked with some of the most crucial functions at DIII-D. Key responsibilities of the PCS involve sub-system control, data acquisition/storage, and user interface. To accomplish these functions, the PCS is broken down into individual components (both software and hardware), each capable of handling a specific duty set. Constant interaction between these components is necessary prior, during and after a standard plasma cycle. Complicating the matter even more is that some components, mostly those which deal with user interaction, may exist remotely, that is to say they are not part of the immediate hardware which makes up the bulk of the PCS. The four main objectives of this paper are to (1) present a brief outline of the PCS hardware/software and how they relate to each other; (2) present a brief overview of a standard DIII-D plasma cycle (a shot); (3) using three sets of PCS sub-systems, describe in more detail the communication processes; and (4) evaluate the benefits and drawbacks of said systems

  11. A Security Architecture for Data Aggregation and Access Control in Smart Grids

    CERN Document Server

    Ruj, Sushmita; Stojmenovic, Ivan

    2011-01-01

    We propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. We use homomorphic encryption technique to achieve this. The consumer data that is collected is sent to the substations where it is monitored by remote terminal units (RTU). The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. Users can be maintenance units, utility centers, pricing estimator units or analyzing and prediction groups. We solve this problem of access control using cryptographic technique of attribute-based encryption. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The ac...

  12. DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

    Directory of Open Access Journals (Sweden)

    S.R. Kodituwakku

    2010-11-01

    Full Text Available Role Based Access Control is very useful for providing a high level description of access control for organizational applications. This paper proposes a role based framework that deals with security problems in an intranet environment. The proposed framework protects intranet resources from unauthorized users. The salient feature of the framework is that it allows intranet users to access only authorized resources. It consists of two kinds of role hierarchies: global role hierarchy and local role hierarchy, and two levels of permissions: server permission and object permission. They simplify the way of structuring authority and responsibility in the whole intranet and the allocation of privileges for different objects within a particular server. The proposed framework is implemented over Windows platform and tested for the validity. The test results indicated that it can successfully be used to control accessing network objects.

  13. 面向协作通信的忙音信道接入机制%A channel accessing scheme based on busy tone for cooperative communication

    Institute of Scientific and Technical Information of China (English)

    谢鲲; 谢可欣; 吉刚; 何施茗

    2014-01-01

    Compared with traditional wireless communication , although relay nodes in cooperative communication can help to increase the performance of a wireless network,relay nodes may cause the serious competition for wire-less channel accessing ,which makes the channel access problem in cooperative communication challenging .To solve the problem,a novel MAC ( media access control) scheme by concurrently considering RTS/CTS ( Request To Send/Clear To Send) and busy tone is proposed in the paper.In the scheme,three busy tones are proposed to iden-tify the state of channel occupation and solve the hidden terminal and exposed terminal problems in cooperative communication.Based on the busy tone,this paper also proposes a bandwidth efficient relay selection algorithm.The source can choose the best relay in a distributed way by sensing the busy tone .The theory and simulation results demonstrate that the proposed scheme can efficiently improve the channel utilization and solve the hidden terminal and exposed terminal problems in cooperative communication .The blocking time ratio of the proposed MAC scheme is less than 10% when the data packet size surpasses 3500B.%与传统无线传输相比,虽然协作中继节点的参与可以大大提高无线网络性能,然而协作中继会带来严重的信道竞争问题,这给协作通信环境中的信道访问控制带来挑战。为了解决这个问题,提出一种RTS/CTS(Request To Send/Clear To Send)与忙音结合的MAC(media access control)信道接入方案。该方案使用3个忙音来标识信道的使用状态,并解决协作通信中的隐藏终端和暴露终端问题。基于忙音信号,还提出了一种带宽节俭的协作节点选择算法。通过侦听忙音信号,源节点可分布式地选择最优的协作节点。理论分析和仿真实验表明所提方案能有效地提高协作通信中的信道利用率,很好地解决了协作通信中的隐藏终端暴露终端问

  14. Technical enforcement of european privacy legislation: an access control approach

    OpenAIRE

    Bekara, Kheira; Laurent, Maryline; Nguyen, Than Ha

    2012-01-01

    Until today, the protection of personal data is mainly left to the legislation by means of guidelines. This paper aims to increase the perceived control by users over their data by helping the user's agent to check the service requests conformity to the legislation. To do so, it discusses the main concepts involved in the legislative privacy principles, and deduces a privacy semantic information model. The proposed model focuses on the main concepts involved in legislative privacy principles....

  15. [Access, use and preferences of Information and Communication Technologies by physicians in a general hospital in Peru].

    Science.gov (United States)

    Vásquez-Silva, Luis; Ticse, Ray; Alfaro-Carballido, Luz; Guerra-Castañon, Felix

    2015-01-01

    We assessed the access, use and preferences of information and communication technology (ICT) by physicians who practice at Cayetano Heredia National Hospital. The questionnaire explored the availability and skills of ICT, time, educational activities, search engines and technological applications most used as well as ICT preferences in education.211 physicians were surveyed; laptop use was 93%, tablet and smartphone use was 66% and 88%.68% have mobile Internet. Differences were evident in the frequency of use of ICT in 25-34 year old age group as well as a higher level of skills (paccess of ICT is common among doctors in this hospital and there is positive interest in its use in education.

  16. Placement of Base Stations in Broadband Power Line Communications Access Networks by Means of Multi-criteria Optimization

    Science.gov (United States)

    Haidine, Abdelfatteh; Lehnert, Ralf

    Broadband Power Line Communications (B-PLC) technology is an alternative for broadband access networks, allowing bit rates up to currently 200Mbps. This technique uses the wiring of the low-voltage grid in order to offer to the users the telecommunications services, such as Internet, VoIP, VoD, etc. The B-PLC design process is sub-divided into two parts: the Generalized Base Station Placement (GBSP) problem and the PLC Channel Allocation Problem (P-CAP). This paper focuses on GBSP that is modeled as multi-criteria combinatorial optimization problem. Based on our published mathematical modeling, this paper supplies more numerical experiments for the evaluation of Multi-Objective Evolutionary Algorithms (MOEAs) in solving GBSP. Their performance is compared with the single-objective optimization.

  17. Photonic ultra-wideband pulse generation, hybrid modulation and dispersion-compensation-free transmission in multi-access communication systems.

    Science.gov (United States)

    Tan, Kang; Shao, Jing; Sun, Junqiang; Wang, Jian

    2012-01-16

    We propose and demonstrate a scheme for optical ultrawideband (UWB) pulse generation by exploiting a half-carrier-suppressed Mach-Zehnder modulator (MZM) and a delay-interferometer- and wavelength-division-multiplexer-based, reconfigurable and multi-channel differentiator (DWRMD). Multi-wavelength, polarity- and shape-switchable UWB pulses of monocycle, doublet, triplet, and quadruplet are experimentally generated simply by tuning two bias voltages to modify the carrier-suppression ratio of MZM and the differential order of DWRMD respectively. The pulse position modulation, pulse shape modulation, pulse amplitude modulation and binary phase-shift keying modulation of UWB pulses can also be conveniently realized with the same scheme structure, which indicates that the hybrid modulation of those four formats can be achieved. Consequently, the proposed approach has potential applications in multi-shape, multi-modulation and multi-access UWB-over-fiber communication systems.

  18. [Access, use and preferences of Information and Communication Technologies by physicians in a general hospital in Peru].

    Science.gov (United States)

    Vásquez-Silva, Luis; Ticse, Ray; Alfaro-Carballido, Luz; Guerra-Castañon, Felix

    2015-01-01

    We assessed the access, use and preferences of information and communication technology (ICT) by physicians who practice at Cayetano Heredia National Hospital. The questionnaire explored the availability and skills of ICT, time, educational activities, search engines and technological applications most used as well as ICT preferences in education.211 physicians were surveyed; laptop use was 93%, tablet and smartphone use was 66% and 88%.68% have mobile Internet. Differences were evident in the frequency of use of ICT in 25-34 year old age group as well as a higher level of skills (pICT is common among doctors in this hospital and there is positive interest in its use in education. PMID:26338389

  19. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Science.gov (United States)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  20. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    Directory of Open Access Journals (Sweden)

    Mang Su

    2014-01-01

    Full Text Available This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  1. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  2. A Universal Communication Framework and Navigation Control Software for Mobile Prototyping Platforms

    Directory of Open Access Journals (Sweden)

    Andreas Mitschele-Thiel

    2010-09-01

    Full Text Available In our contribution we would like to describe two new aspects of our low-cost mobile prototyping platform concept: a new hardware communication framework as well as new software features for navigation and control of our mobile platform. The paper is an extension of the ideas proposed in REV2009 [1] and is based on the therein used hardware platform and the monitoring and management software. This platform is based on the Quadrocopter concept – autonomous flying helicopter-style robots – and includes additional off-the-shelf parts. This leads to a universal mobile prototyping platform for communication tasks providing both mobile phone and WiFi access. However, the platform can provide these functions far more quickly than a technician on the ground might be able to. We will show that with our concept we can easily adapt the platform to the individual needs of the user, which leads to a very flexible and semi-autonomous system.

  3. Advanced Communication and Control Solutions of Distributed Energy Resources (DER)

    Energy Technology Data Exchange (ETDEWEB)

    Asgeirsson, Haukur; Seguin, Richard; Sherding, Cameron; de Bruet, Andre, G.; Broadwater, Robert; Dilek, Murat

    2007-01-10

    This report covers work performed in Phase II of a two phase project whose objective was to demonstrate the aggregation of multiple Distributed Energy Resources (DERs) and to offer them into the energy market. The Phase I work (DE-FC36-03CH11161) created an integrated, but distributed, system and procedures to monitor and control multiple DERs from numerous manufacturers connected to the electric distribution system. Procedures were created which protect the distribution network and personnel that may be working on the network. Using the web as the communication medium for control and monitoring of the DERs, the integration of information and security was accomplished through the use of industry standard protocols such as secure SSL,VPN and ICCP. The primary objective of Phase II was to develop the procedures for marketing the power of the Phase I aggregated DERs in the energy market, increase the number of DER units, and implement the marketing procedures (interface with ISOs) for the DER generated power. The team partnered with the Midwest Independent System Operator (MISO), the local ISO, to address the energy market and demonstrate the economic dispatch of DERs in response to market signals. The selection of standards-based communication technologies offers the ability of the system to be deployed and integrated with other utilities’ resources. With the use of a data historian technology to facilitate the aggregation, the developed algorithms and procedures can be verified, audited, and modified. The team has demonstrated monitoring and control of multiple DERs as outlined in phase I report including procedures to perform these operations in a secure and safe manner. In Phase II, additional DER units were added. We also expanded on our phase I work to enhance communication security and to develop the market model of having DERs, both customer and utility owned, participate in the energy market. We are proposing a two-part DER energy market model--a utility

  4. Transmission Analysis of Optical Code Division Multiple Access Communication Systems in the Presence of Noise in Local Area Network Applications

    Directory of Open Access Journals (Sweden)

    Ahmed Nabih Zaki Rashed

    2013-04-01

    Full Text Available OCDMA is an essential part of the digital communication system now days for long haul, high speed networks. The biggest challenge with Optical CDMA system is to maintain the performance of the system and offer high bandwidth in case of higher number of users at minimum cost. As the number of users increase, the input requirements i.e. transmitted power, bit rate etc start increasing sharply which contribute to the additional cost. It has recently attracted significant research interest because of the advantages it offers in terms of the flexibility in the management of the system resources. We have taken into account the system design parameters are determined such as BER (bit error rate, signal to noise ratio (SNR, transmission bit rates, and optical received power for different code lengths. The Optical CDMA systems suffer from the problem of multiple access interference (MAI.As the number of users increase the BER error rate degrades because the effect of MAI (multiple access interference increases. So, there is a limitation in number of users, as the number of users increase SNR decrease and probability of error increases.

  5. Disparities in Health Information Access: Results of a County-Wide Survey and Implications for Health Communication.

    Science.gov (United States)

    Kelley, Megan S; Su, Dejun; Britigan, Denise H

    2016-01-01

    Health knowledge and behavior can be shaped by the extent to which individuals have access to reliable and understandable health information. Based on data from a population-based telephone survey of 1,503 respondents of ages 18 years and older living in Douglas County, Nebraska, in 2013, this study assesses disparities in health information access and their related covariates. The two most frequently reported sources of health information are the Internet and health professionals, followed by print media, peers, and broadcast media. Relative to non-Hispanic Whites, Blacks are more likely to report health professionals as their primary source of health information (odds ratio [OR] = 2.61, p < .001) and less likely to report peers (OR = 0.39, p < .05). A comparison between Whites and Hispanics suggests that Hispanics are less likely to get their health information through the Internet (OR = 0.51, p < .05) and more likely to get it from broadcast media (OR = 4.27, p < .01). Relative to their counterparts, participants with no health insurance had significantly higher odds of reporting no source of health information (OR = 3.46, p < .05). Having no source of health information was also associated with an annual income below $25,000 (OR = 2.78, p < .05 compared to middle income range) and being born outside of the United States (OR = 5.00, p < .05). Access to health information is lowest among society's most vulnerable population groups. Knowledge of the specific outlets through which people are likely to obtain health information can help health program planners utilize the communication channels that are most relevant to the people they intend to reach. PMID:26452300

  6. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  7. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover, the......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered to be the...... hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  8. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...... access to the pill is found to be on non-white students, both among men and women. The paper uses Census Data to compare the changes in career plans to actual changes in labor market outcomes. When looking at the actual career outcomes, early access to the pill affects both men and women - shifting...... plans of both men and women, and by separating the effect by level of academic ability, race and family income. The results show that unrestricted access to the pill caused high ability women to move towards occupations with higher wages, higher occupational prestige scores and higher male ratios...

  9. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  10. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  11. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  12. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...... of contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell...

  13. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani;

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  14. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  15. Communications Technology Assessment for the Unmanned Aircraft System (UAS) Control and Non-Payload Communications (CNPC) Link

    Science.gov (United States)

    Bretmersky, Steven C.; Bishop, William D.; Dailey, Justin E.; Chevalier, Christine T.

    2014-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) is performing communications systems research for the Unmanned Aircraft System (UAS) in the National Airspace System (NAS) Project. One of the goals of the communications element is to select and test a communications technology for the UAS Control and Non-Payload Communications (CNPC) link. The GRC UAS Modeling and Simulation (M/S) Sub Team will evaluate the performance of several potential technologies for the CNPC link through detailed software simulations. In parallel, an industry partner will implement a technology in hardware to be used for flight testing. The task necessitated a technical assessment of existing Radio Frequency (RF) communications technologies to identify the best candidate systems for use as the UAS CNPC link. The assessment provides a basis for selecting the technologies for the M/S effort and the hardware radio design. The process developed for the technical assessments for the Future Communications Study1 (FCS) was used as an initial starting point for this assessment. The FCS is a joint Federal Aviation Administration (FAA) and Eurocontrol study on technologies for use as a future aeronautical communications link. The FCS technology assessment process methodology can be applied to the UAS CNPC link; however the findings of the FCS are not directly applicable because of different requirements between a CNPC link and a general aeronautical data link. Additional technologies were added to the potential technologies list from the State of the Art Unmanned Aircraft System Communication Assessment developed by NASA GRC2. This document investigates the state of the art of communications as related to UAS. A portion of the document examines potential communications systems for a UAS communication architecture. Like the FCS, the state of the art assessment surveyed existing communications technologies. It did not, however, perform a detailed assessment of the

  16. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    Science.gov (United States)

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  17. SparkXS: efficient access control for intelligent and large-scale streaming data applications

    OpenAIRE

    Preuveneers, Davy; Joosen, Wouter

    2015-01-01

    The exponential data growth in intelligent environments fueled by the Internet of Things is not only a major push behind distributed programming frameworks for big data, it also magnifies security and privacy concerns about unauthorized access to data. The huge diversity and the streaming nature of data raises the demand for new enabling technologies for scalable access control that can deal with the growing velocity, volume and variety of volatile data. This paper presents SparkXS, ...

  18. A Model-driven Role-based Access Control for SQL Databases

    OpenAIRE

    Raimundas Matulevičius; Henri Lakk

    2015-01-01

    Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering app...

  19. A Scheduling Algorithm Based on Communication Delay for Wireless Network Control System

    Directory of Open Access Journals (Sweden)

    Jun Wang

    2012-09-01

    Full Text Available In this study, a scheduling algorithm based on communication delay is proposed. This scheduling algorithm can tolerate delay of periodic communication tasks in wireless network control system. It resolves real-time problem of periodic communication tasks in wireless network control system and partly reduces overtime phenomenon of periodic communication tasks caused by delay in wireless network. At the same time, the nonlinear programming model is built for solving scheduling timetable based on the proposed scheduling algorithm. Finally, the performance of the proposed scheduling algorithm is evaluated by an application example. The statistics results show that it is more effective than traditional scheduling algorithms in wireless network control system.

  20. SpaceOps 2012 Plus 2: Social Tools to Simplify ISS Flight Control Communications and Log Keeping

    Science.gov (United States)

    Cowart, Hugh S.; Scott, David W.

    2014-01-01

    A paper written for the SpaceOps 2012 Conference (Simplify ISS Flight Control Communications and Log Keeping via Social Tools and Techniques) identified three innovative concepts for real time flight control communications tools based on social mechanisms: a) Console Log Tool (CoLT) - A log keeping application at Marshall Space Flight Center's (MSFC) Payload Operations Integration Center (POIC) that provides "anywhere" access, comment and notifications features similar to those found in Social Networking Systems (SNS), b) Cross-Log Communication via Social Techniques - A concept from Johnsson Space Center's (JSC) Mission Control Center Houston (MCC-H) that would use microblogging's @tag and #tag protocols to make information/requests visible and/or discoverable in logs owned by @Destination addressees, and c) Communications Dashboard (CommDash) - A MSFC concept for a Facebook-like interface to visually integrate and manage basic console log content, text chat streams analogous to voice loops, text chat streams dedicated to particular conversations, generic and position-specific status displays/streams, and a graphically based hailing display. CoLT was deployed operationally at nearly the same time as SpaceOps 2012, the Cross- Log Communications idea is currently waiting for a champion to carry it forward, and CommDash was approved as a NASA Iinformation Technoloby (IT) Labs project. This paper discusses lessons learned from two years of actual CoLT operations, updates CommDash prototype development status, and discusses potential for using Cross-Log Communications in both MCC-H and/or POIC environments, and considers other ways for synergizing console applcations.

  1. Dual scheduling and quantised control for networked control systems with communication constraints

    Science.gov (United States)

    Lu, Hui; Zhou, Chuan

    2016-07-01

    A novel integrated design scheme of average dwell time scheduling strategy, dynamic bandwidth allocation policy and quantised control for a collection of networked control systems (NCSs) with time delay and communication constraints is proposed in this paper. A scheduling policy is presented to accommodate the limitation of communication capacity which depends on the convergence rate of closed-loop system and divergence rate of open-loop plant. Linear programming technique is adopted to dynamically allocate bit rate for each node and the strategy is used to make trade-offs between the network utilisation and the control performance which provides an effective way of optimising the quality of control (QoC) and the quality of service (QoS) for NCSs. Mid-tread uniform quantisers update the quantisation rules according to the assignment of the bit rate and convert the quantised state into a kind of input saturation with bounded disturbances. Taking into account the effect of dual scheduling strategy and quantisation, the NCSs are modelled as discrete-time switched systems with bounded disturbances. Furthermore, a scheduling and quantised feedback control co-design procedure is proposed for the simultaneous stabilisation of the collection of networked subsystems. Finally, a simulation example is given to illustrate the effectiveness of the proposed method.

  2. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    Science.gov (United States)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  3. Controlling satellite communication system unwanted emissions in congested RF spectrum

    Science.gov (United States)

    Olsen, Donald; Heymann, Roger

    2007-09-01

    The International Telecommunication Union (ITU), a United Nations (UN) agency, is the agency that, under an international treaty, sets radio spectrum usage regulations among member nations. Within the United States of America (USA), the organization that sets regulations, coordinates an application for use, and provides authorization for federal government/agency use of the radio frequency (RF) spectrum is the National Telecommunications and Information Administration (NTIA). In this regard, the NTIA defines which RF spectrum is available for federal government use in the USA, and how it is to be used. The NTIA is a component of the United States (U.S.) Department of Commerce of the federal government. The significance of ITU regulations is that ITU approval is required for U.S. federal government/agency permission to use the RF spectrum outside of U.S. boundaries. All member nations have signed a treaty to do so. U.S. federal regulations for federal use of the RF spectrum are found in the Manual of Regulations and Procedures for Federal Radio Frequency Management, and extracts of the manual are found in what is known as the Table of Frequency Allocations. Nonfederal government and private sector use of the RF spectrum within the U.S. is regulated by the Federal Communications Commission (FCC). There is a need to control "unwanted emissions" (defined to include out-of-band emissions, which are those immediately adjacent to the necessary and allocated bandwidth, plus spurious emissions) to preclude interference to all other authorized users. This paper discusses the causes, effects, and mitigation of unwanted RF emissions to systems in adjacent spectra. Digital modulations are widely used in today's satellite communications. Commercial communications sector standards are covered for the most part worldwide by Digital Video Broadcast - Satellite (DVB-S) and digital satellite news gathering (DSNG) evolutions and the second generation of DVB-S (DVB-S2) standard

  4. Active queue management controller design for TCP communication networks: Variable structure control approach

    International Nuclear Information System (INIS)

    On the basis of variable structure control (VSC), an active queue management (AQM) controller is presented for a class of TCP communication networks. In the TCP/IP networks, the packet drop probability is limited between 0 and 1. Therefore, we modeled TCP/AQM as a rate-based non-linear system with a saturated input. The objective of the VSC-based AQM controller is to achieve the desired queue size and to guarantee the asymptotic stability of the closed-loop TCP non-linear system with saturated input. The performance and effectiveness of the proposed control law are then validated for different network scenarios through numerical simulations in both MATLAB and Network Simulator-2 (NS-2). Both sets of simulation results have confirmed that the proposed scheme outperforms other AQM schemes.

  5. A Communication-Less Distributed Voltage Control Strategy for a Multi-Bus AC Islanded Microgrid

    DEFF Research Database (Denmark)

    Wang, Yanbo; Tan, Yongdong; Chen, Zhe;

    2014-01-01

    This paper presents a communication-less distributed voltage control strategy for a multi-bus AC islanded microgrid. First, a Kalman Filter-based network voltage estimator is proposed to obtain voltage responses without communication links in the presence of load disturbances. Then, a voltage...... (Distributed Generator) unit rather than relying on any communication facilities; (2) In contrast to the conventional PI-based voltage control method, the proposed voltage control strategy can implement not only offset-free control for single-bus, but also optimal control for multi-bus. Thus the flexibility...

  6. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.;

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  7. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  8. Estimation of Medium Access Control Layer Packet Delay Distribution for IEEE 802.11

    Directory of Open Access Journals (Sweden)

    Hatm Alkadeki

    2013-12-01

    Full Text Available The most important standard in wireless local area networks is IEEE 802.11. This is why much of the research work for the enhancement of wireless network is usually based on the behavior of IEEE 802.11 protocol. However, some of the ways in which IEEE 802.11 medium access control layer behaves is still unreliable to guarantee quality of service. For instance , medium access control layer packet delay, jitter and packet loss rate still remain a challenge. The main objective of this research is to propose an accurate estimation of the medium access control layer packet delay distribution for IEEE 802.11. This estimation considers the differences between busy probability and collision probability. These differences are employed to achieve a mo re accurate estimation. Finally, the proposed model and simulation are implemented and validated - using MATLAB program for the purpose of simulation, and Maple program to undertake the calculation of the equations.

  9. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  10. Monitor and Control of Deep Space Communications Through AI Planning

    Science.gov (United States)

    Fisher, F.; Knight, R.; Engelhardt, B.; Chien, S.; Alejandre, N.

    2000-01-01

    In recent years with the large increase in the number of space missions at NASA, the demand for deep space communications services to command and collect data from these missions has become more difficult to manage.

  11. A novel decentralised event-triggered ? control for network control systems with communication delays

    Science.gov (United States)

    Li, Fuqiang; Fu, Jingqi; Du, Dajun

    2016-10-01

    This paper studies a novel decentralised event-triggered ? control for network control systems with communication delays and external disturbances. To overcome the drawbacks that the relative event-triggered mechanism (ETM) generates many events when system is close to the origin and the absolute ETM produces many events when system is far away from the origin, a novel decentralised sampled-data-based ETM is first proposed. By using both local state-dependent and state-independent information, the decentralised ETM can effectively reduce network loads in each channel during the whole operation time. Then, a novel general system model with parameters of the decentralised ETM, communication delays and external disturbances is presented, and sufficient conditions for the ultimately bounded stability and asymptotic stability of the closed-loop system are obtained. Specially, the quantitative relationship between the boundness of the stability region and the parameters of the decentralised ETM is established. Moreover, to overcome the inconvenience of the two-step design method that controllers are required to be given a priori, a co-design scheme is presented to design the decentralised event generators and the output-based controller simultaneously. Finally, numerical examples confirm the effectiveness of the proposed method.

  12. Verifying Quality of Service of ARCnet Based ATOMOS Communication System for Integrated Ship Control

    DEFF Research Database (Denmark)

    Nielsen, N.N.; Nielsen, Jens Frederik Dalsgaard; Schiøler, Henrik;

    1999-01-01

    As part of the ATOMOS project (Funded by EU, DG VII) a reliable communication system with predictable behaviour has been designed. The selected solution is a network based on redundant ARCnet segments extended with an EN50170 compliant fieldbus based layer on top of an ARCnet SAP (service access...

  13. Verifying Quality of Service of ARCnet Based ATOMOS Communication System for Integrated Ship Control

    DEFF Research Database (Denmark)

    Nielsen, N.N.; Nielsen, Jens Frederik Dalsgaard; Schiøler, Henrik;

    As part of the ATOMOS project (Funded by EU, DG VII) a reliable communication system with predictable behaviour has been designed. The selected solution is a network based on redundant ARCnet segments extended with an EN50170 compliant fieldbus based layer on top of an ARCnet SAP (service access...

  14. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  15. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  16. An IEEE 802.3 Compatible Real Time Medium Access Control with Length-based Priority

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new medium access control method is proposed over the predominant Ethernet broadcast channel. Taking advantages of intrinsic variable length characteristic of standard Ethernet frame, message-oriented dynamic priority mechanism is established. Prioritized medium access control operates under a so-called block mode in event of collisions.High priority messages have a chance to preempt block status incurred by low priority ones. By this means, the new MAC provides a conditional deterministic real time performance beyond a statistical one. Experiments demonstrate effectiveness and attractiveness of the proposed scheme. Moreover, this new MAC is completely compatible with IEEE802.3.

  17. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  18. Improving Nigerian health policymakers' capacity to access and utilize policy relevant evidence: outcome of information and communication technology training workshop.

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified "before and after" intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers' ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop. PMID:26448807

  19. Improving Nigerian health policymakers’ capacity to access and utilize policy relevant evidence: outcome of information and communication technology training workshop

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified “before and after” intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers’ ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop. PMID:26448807

  20. A Novel Robust Communication Algorithm for Distributed Secondary Control of Islanded MicroGrids

    DEFF Research Database (Denmark)

    Shafiee, Qobad; Dragicevic, Tomislav; Vasquez, Juan Carlos;

    2013-01-01

    Distributed secondary control (DSC) is a new approach for MicroGrids (MGs) such that frequency, voltage and power regulation is made in each unit locally to avoid using a central controller. Due to the constrained traffic pattern required by the secondary control, it is viable to implement...... dedicated local area communication functionality among the local controllers. This paper presents a new, wireless-based robust communication algorithm for DSC of MGs designed to avoid communication bottlenecks and enable the plug-and-play capability of new DGs. Real-time simulation and experimental results...

  1. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    Science.gov (United States)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  2. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems.

    Science.gov (United States)

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D

    2016-01-01

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems. PMID:27463718

  3. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems.

    Science.gov (United States)

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D

    2016-07-25

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems.

  4. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems

    Science.gov (United States)

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D.

    2016-01-01

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems. PMID:27463718

  5. A Multidisciplinary Intervention Utilizing Virtual Communication Tools to Reduce Health Disparities: A Pilot Randomized Controlled Trial.

    Science.gov (United States)

    Emerson, John F; Welch, Madelyn; Rossman, Whitney E; Carek, Stephen; Ludden, Thomas; Templin, Megan; Moore, Charity G; Tapp, Hazel; Dulin, Michael; McWilliams, Andrew

    2016-01-01

    Advances in technology are likely to provide new approaches to address healthcare disparities for high-risk populations. This study explores the feasibility of a new approach to health disparities research using a multidisciplinary intervention and advanced communication technology to improve patient access to care and chronic disease management. A high-risk cohort of uninsured, poorly-controlled diabetic patients was identified then randomized pre-consent with stratification by geographic region to receive either the intervention or usual care. Prior to enrollment, participants were screened for readiness to make a behavioral change. The primary outcome was the feasibility of protocol implementation, and secondary outcomes included the use of patient-centered medical home (PCMH) services and markers of chronic disease control. The intervention included a standardized needs assessment, individualized care plan, intensive management by a multidisciplinary team, including health coach-facilitated virtual visits, and the use of a cloud-based glucose monitoring system. One-hundred twenty-seven high-risk, potentially eligible participants were randomized. Sixty-one met eligibility criteria after an in-depth review. Due to limited resources and time for the pilot, we only attempted to contact 36 participants. Of these, we successfully reached 20 (32%) by phone and conducted a readiness to change screen. Ten participants screened in as ready to change and were enrolled, while the remaining 10 were not ready to change. Eight enrolled participants completed the final three-month follow-up. Intervention feasibility was demonstrated through successful implementation of 13 out of 14 health coach-facilitated virtual visits, and 100% of participants indicated that they would recommend the intervention to a friend. Protocol feasibility was demonstrated as eight of 10 participants completed the entire study protocol. At the end of the three-month intervention, participants had a

  6. A Multidisciplinary Intervention Utilizing Virtual Communication Tools to Reduce Health Disparities: A Pilot Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    John F. Emerson

    2015-12-01

    Full Text Available Advances in technology are likely to provide new approaches to address healthcare disparities for high-risk populations. This study explores the feasibility of a new approach to health disparities research using a multidisciplinary intervention and advanced communication technology to improve patient access to care and chronic disease management. A high-risk cohort of uninsured, poorly-controlled diabetic patients was identified then randomized pre-consent with stratification by geographic region to receive either the intervention or usual care. Prior to enrollment, participants were screened for readiness to make a behavioral change. The primary outcome was the feasibility of protocol implementation, and secondary outcomes included the use of patient-centered medical home (PCMH services and markers of chronic disease control. The intervention included a standardized needs assessment, individualized care plan, intensive management by a multidisciplinary team, including health coach-facilitated virtual visits, and the use of a cloud-based glucose monitoring system. One-hundred twenty-seven high-risk, potentially eligible participants were randomized. Sixty-one met eligibility criteria after an in-depth review. Due to limited resources and time for the pilot, we only attempted to contact 36 participants. Of these, we successfully reached 20 (32% by phone and conducted a readiness to change screen. Ten participants screened in as ready to change and were enrolled, while the remaining 10 were not ready to change. Eight enrolled participants completed the final three-month follow-up. Intervention feasibility was demonstrated through successful implementation of 13 out of 14 health coach-facilitated virtual visits, and 100% of participants indicated that they would recommend the intervention to a friend. Protocol feasibility was demonstrated as eight of 10 participants completed the entire study protocol. At the end of the three-month intervention

  7. Decentralized Control of Unmanned Aerial Robots for Wireless Airborne Communication Networks

    Directory of Open Access Journals (Sweden)

    Deok-Jin Lee

    2010-09-01

    Full Text Available This paper presents a cooperative control strategy for a team of aerial robotic vehicles to establish wireless airborne communication networks between distributed heterogeneous vehicles. Each aerial robot serves as a flying mobile sensor performing a reconfigurable communication relay node which enabls communication networks with static or slow-moving nodes on gorund or ocean. For distributed optimal deployment of the aerial vehicles for communication networks, an adaptive hill-climbing type decentralized control algorithm is developed to seek out local extremum for optimal localization of the vehicles. The sensor networks estabilished by the decentralized cooperative control approach can adopt its configuraiton in response to signal strength as the function of the relative distance between the autonomous aerial robots and distributed sensor nodes in the sensed environment. Simulation studies are conducted to evaluate the effectiveness of the proposed decentralized cooperative control technique for robust communication networks.

  8. Exosomes and nanotubes: Control of immune cell communication.

    Science.gov (United States)

    McCoy-Simandle, Kessler; Hanna, Samer J; Cox, Dianne

    2016-02-01

    Cell-cell communication is critical to coordinate the activity and behavior of a multicellular organism. The cells of the immune system not only must communicate with similar cells, but also with many other cell types in the body. Therefore, the cells of the immune system have evolved multiple ways to communicate. Exosomes and tunneling nanotubes (TNTs) are two means of communication used by immune cells that contribute to immune functions. Exosomes are small membrane vesicles secreted by most cell types that can mediate intercellular communication and in the immune system they are proposed to play a role in antigen presentation and modulation of gene expression. TNTs are membranous structures that mediate direct cell-cell contact over several cell diameters in length (and possibly longer) and facilitate the interaction and/or the transfer of signals, material and other cellular organelles between connected cells. Recent studies have revealed additional, but sometimes conflicting, structural and functional features of both exosomes and TNTs. Despite the new and exciting information in exosome and TNT composition, origin and in vitro function, biologically significant functions are still being investigated and determined. In this review, we discuss the current field regarding exosomes and TNTs in immune cells providing evaluation and perspectives of the current literature.

  9. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mesay Hailu Dangisso

    2015-11-01

    Full Text Available Background: Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs and treatment outcome in the Sidama Zone, southern Ethiopia. Design: We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results: Over a decade the health service coverage (the health facility–to-population ratio increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km between kebeles (the smallest administrative units and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km. In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001 and altitude (b-estimate=−0.31, p<0.001 increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001 and altitude (b-estimate=−0.30, p<0.001 were inversely associated with treatment success (proportion of treatment completed or cured cases

  10. AntNet: Distributed Stigmergetic Control for Communications Networks

    CERN Document Server

    Di Caro, G

    2011-01-01

    This paper introduces AntNet, a novel approach to the adaptive learning of routing tables in communications networks. AntNet is a distributed, mobile agents based Monte Carlo system that was inspired by recent work on the ant colony metaphor for solving optimization problems. AntNet's agents concurrently explore the network and exchange collected information. The communication among the agents is indirect and asynchronous, mediated by the network itself. This form of communication is typical of social insects and is called stigmergy. We compare our algorithm with six state-of-the-art routing algorithms coming from the telecommunications and machine learning fields. The algorithms' performance is evaluated over a set of realistic testbeds. We run many experiments over real and artificial IP datagram networks with increasing number of nodes and under several paradigmatic spatial and temporal traffic distributions. Results are very encouraging. AntNet showed superior performance under all the experimental condit...

  11. Electronic Wallet and Access Control Solution Based on RFID MiFare Cards

    Directory of Open Access Journals (Sweden)

    Stefan Victor Lefter

    2013-03-01

    Full Text Available With the advent of Radio Frequency Identification technologies or RFID for short, different types of products and security-relevant applications have been developed for use in fields and businesses like: inventory management, product tracking, access control, passports or transport fare collection. Even though RFID has been around for quite some time, there are some types of businesses like theme parks, water parks or music festivals that haven’t yet tested the benefits that this technology brings. This paper focuses on presenting advantages and disadvantages of using an unified access control and electronic wallet system based on RFID cards like MiFare tags as an alternative to existing ticket/currency access and payment systems employed by the majority of the businesses mentioned above.

  12. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  13. A Study on Automated Context-aware Access Control Model Using Ontology

    Science.gov (United States)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  14. TRAFFIC CONTROLLED-DEDICATED SHORT RANGE COMMUNICATION: A SECURE COMMUNICATION USING TRAFFIC CONTROLLED DEDICATED SHORT RANGE COMMUNICATION MODEL IN VEHICULAR AD HOC NETWORKS FOR SAFETY RELATED SERVICES

    OpenAIRE

    K. Chandramohan; P. Kamalakkannan

    2014-01-01

    To increase the road safety and secure communication among the vehicles in the network environment, Dedicated Short Range Communication (DSRC) is followed. Nowadays, research over DSRC is dramatically increased for enhancing the road safety applications. The main task of DSRC is to protect the vehicles by communicating the warning message regarding the vehicle changing conditions, traffic occurrence and dangers over the road in the network. So, it is necessary to maintain the accurate communi...

  15. PRESENTATION OF MANDATORY POLICY OF ACCESS CONTROL VIA THE HARRISONRUSSO-WILLIAM’S MODEL

    Directory of Open Access Journals (Sweden)

    Korolev I. D.

    2015-03-01

    Full Text Available The accepted model of the access control is realized with the monitor of safety in the protected automated information system. Models of safety are considered, as a rule, as a system which is a single whole and has the uniform monitor of safety. Nevertheless, the architecture of the real automated information systems and processes of their functioning can be characterized by distribution. The distributed automated information system consists more than of one local segment representing isolated set of subjects and objects of access. In the distributed system local segments can be realized both on the basis of discretionary, and on the basis of mandatory models of safety (i.e. to be diverse. One of directions of a safety in this case is realization of the general monitor of the safety providing the uniform (coordinated policy of access control. For safe interaction of patchwork systems it’s necessary to bring them to a single model. Hence, while the integration of information systems the problem of their interaction becomes persistent. Thus in the systems processing the information of a various level of confidentiality, it is necessary to realize mandatory access control. In given clause the mandatory policy of the safety presented by classical model of Bell-LaPadula, is described by the elements of classical model of Harrison-Russo-William. Using the mechanisms of change of a matrix access the opportunity of assignment and change of confidentiality marks is described and the observance of safe practices within the limits of mandatory access control is analyzed. The safety of application of the given approach has been proved. The perspective direction of research has been defined

  16. The Scholarly Communication Speed of Library and Information Science Open Access Journals as Measured by First-Citation

    Directory of Open Access Journals (Sweden)

    Tai-Chi Yu

    2016-06-01

    Full Text Available Based on the time of journal article first-citation appearance, this study analyzed the citation speeds of Open Access (OA journals within Library and Information Science (LIS field indexed in Scopus and WoS database. Articles published between 2010 and 2014 by a total of 8 Full-OA journals and 13 Hybrid-OA journals indexed by 2010-2013 edition of JCR were collected and analyzed in June 2015. Results showed that there were 639 articles being cited in Scopus and the average firstcitation speed was 1.17 year. On the other hand, there were 434 articles being cited in WoS with a slightly higher first-time citation rate of 1.37 year. Most of the articles studied were cited for the first time in the same year or the year after of its publication. There were some articles being cited even before its official publication. Within the Hybrid-OA journals, articles belong to the OA mechanism did have shorter speed citation time than non-OA ones. This study suggested that further studies could adopt the concept of Altmetrics to investigate the first-usage speeds through the formal and informal communication channels. [Article content in Chinese

  17. Hysteresis-based congestion control at the B-ISDN access

    Science.gov (United States)

    Wissing, Johannes

    1993-11-01

    Multiplexing of bursty sources and refined congestion control strategies are still the subject of numerous research activities. Broadband applications with very high peak-to-mean bitrate ratio and long silence periods like still picture video gave rise to different ideas of rate control at the B-ISDN network access. Contributions on Input Rate Control for source coded traffic as well as on Server Rate Control within a LAN/ATM Interworking Unit have recently been presented. This paper addresses a congestion avoidance strategy at the network access regarding the aggregated traffic of bursty sources. Depending on the number of active sources as well as on certain defined congestion levels the cell rate at the network access is controlled. The proposed analytical approach is based on the model of uniform and continuous arrival and service. The selected underlying Markov chain contains `split' states in order to handle the congestion correlation. The proposed model is extended to an adaptive Non-Markov system where the buffer filling level is evaluated using a switching hysteresis. This type of congestion measurement turns out to be very useful for an adaptive rate control mechanism that guarantees a certain quality of service while still achieving a good statistical gain. The analytical approach is confirmed by results of a computer simulation that is extended to the more complex case of adaptive rate control.

  18. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  19. Reach on Policy-based Transmition Control Technology in MPLS Communication Network

    OpenAIRE

    Jingyang Wang; Yu Hua; Min Huang; Liwei Guo; Wanzhen Zhou

    2012-01-01

    With the increasing variety of service types supported by the communication network, more and more requirements for bandwidth occurred. Different types of services have different characteristics in the aspects of importance, bandwidth demand, time-sensitive and so on. Customers’s requirements for the controllability and manageability of communication network are more and more demanding. The paper researches on policy-based transmition control technology in MPLS controllable and manageab...

  20. Application of Ethernet Powerlink for communication in a Linux RTAI open CNC control system

    OpenAIRE

    Erwiński, Krystian Adam; Paprocki, Marcin Piotr; Grzesiak, Lech; Karwowski, Kazimierz; Wawrzak, Andrzej

    2013-01-01

    In computerized numerical control (CNC) systems, the communication bus between the controller and axis servo drives must offer high bandwidth, noise immunity, and time determinism. More and more CNC systems use real-time Ethernet protocols such as Ethernet Powerlink (EPL). Many modern controllers are closed costly hardware-based solutions. In this paper, the implementation of EPL communication bus in a PC-based CNC system is presented. The CNC system includes a PC, a s...