WorldWideScience

Sample records for access control protocol

  1. Studying Media Access andControl Protocols

    OpenAIRE

    Mohammed, Alalelddin Fuad Yousif

    2010-01-01

    This thesis project’s goal is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The thesis fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) re...

  2. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  3. Adaptive Medium Access Control Protocol for Wireless Body Area Networks

    OpenAIRE

    Javaid, N.; Ahmad, A.; A. Rahim; Z.A. Khan; M. Ishfaq; Qasim, U.

    2014-01-01

    Wireless Body Area Networks (WBANs) are widely used for applications such as modern health-care systems, where wireless sensors (nodes) monitor the parameter(s) of interest. Nodes are provided with limited battery power and battery power is dependent on radio activity. MAC protocols play a key role in controlling the radio activity. Therefore, we present Adaptive Medium Access Control (A-MAC) protocol for WBANs supported by linear programming models for the minimization of energy consumption ...

  4. Control with a random access protocol and packet dropouts

    Science.gov (United States)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  5. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  6. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  7. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Abdul Razaque; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  8. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  9. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    CERN Document Server

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  10. Broadband passive optical network media access control protocols

    Science.gov (United States)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  11. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  12. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    Science.gov (United States)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  13. In-home Power Line Communication Media Access Control Protocol Based on Collision Resolution

    Institute of Scientific and Technical Information of China (English)

    WANG Bo; HUANG Pei-wei; ZHONG You-ping; QI Ying-hao

    2009-01-01

    Most existing media access control (MAC) protocols in power line communication (PLC) networks just discard the colliding data packets when collision occurs. The collision deteriorates throughput and delay performance of system under high traffic conditions. This article presents a novel media access scheme with fast collision resolution for in-home power line networks. It works by first recognizing the colliding stations through detecting the inserted unique ID sequence ahead of data packets, then the source nodes retransmitting their packets immediately after the collision slot. The proposed protocol maintains the benefits of ALOHA systems. It needs no scheduling overhead and is suitable for bursty sources, such as multimedia data packets. Computer simulations have demonstrated that this approach can achieve high throughput due to its ability of resolving collisions.

  14. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  15. An energy-efficient media access control protocol for chain-type wireless sensor networks

    Science.gov (United States)

    Wang, Yu; Chen, Chang Wen

    2005-06-01

    We present in this paper an energy efficient media access control (MAC) protocol for chain-type wireless sensor networks. The chain-type sensor networks are fundamentally different from traditional sensor networks in that the sensor nodes in this class of networks are deployed along narrow and elongated geographical areas and form a chain-type topology. Recently, we have successfully developed hierarchical network architecture, sensor deployment strategy, and corresponding network initialization and operation protocols for this class of sensor networks. In this paper, we present a novel TDMA scheduling protocol that takes full advantages of the available channel reuse inherent in the chain-type sensor networks to develop energy efficient and high data throughput MAC protocols for sensor data transmission. The synchronized TDMA scheduling allows the nodes to power on only when it is scheduled to send and receive and therefore results in additional energy saving. Within a cluster, parallel transmission is made possible because of the linear distribution of nodes within the chain-type topology and this yields the desired high throughput. Preliminary simulations have been carried out to show that the proposed TDMA scheduling outperforms the well-know SMAC scheme in terms of energy efficiency and data throughput under various duty cycles.

  16. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  17. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    Science.gov (United States)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  18. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  19. Sleeping Cluster based Medium Access Control Layer Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    T. R. Rangaswamy

    2012-01-01

    Full Text Available Wireless sensor networks play a vital role in remote area applications, where human intervention is not possible. In a Wireless Sensor Network (WSN each and every node is strictly an energy as well as bandwidth constrained one. Problem statement: In a standard WSN, most of the routing techniques, move data from multiple sources to a single fixed base station. Because of the greater number of computational tasks, the existing routing protocol did not address the energy efficient problem properly. In order to overcome the problem of energy consumption due to more number of computational tasks, a new method is developed. Approach: The proposed algorithm divides the sensing field into three active clusters and one sleeping cluster. The cluster head selection is based on the distance between the base station and the normal nodes. The Time Division Multiple Access (TDMA mechanism is used to make the cluster remain in the active state as well as the sleeping state. In an active cluster 50% of nodes will be made active and the remaining 50% be in sleep state. A sleeping cluster will be made active after a period of time and periodically changes its functionality. Results: Due to this periodic change of state, energy consumption is minimized. The performance of the Low Energy Adaptive and Clustering Hierarchy (LEACH algorithm is also analyzed, using a network simulator NS2 based on the number of Cluster Heads (CH, Energy consumption, Lifetime and the number of nodes alive. Conclusion: The simulation studies were carried out using a network simulation tool NS2, for the proposed method and this is compared with the performance of the existing protocol. The superiority of the proposed method is highlighted.

  20. Improvement in Medium Access Control protocol based on new contention scheme for wireless ad hoc network

    Directory of Open Access Journals (Sweden)

    C.Ellammal

    2012-05-01

    Full Text Available In todays wireless networks, stations using the IEEE 802.11 standard contend for the channel using the Distributed Coordination Function (DCF. Research has shown that DCF€™s performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, we present a Medium Access Control (MAC scheme for wireless LANs and compare its performance to DCF . Our scheme, which attempts to resolve the contention in a constant number of slots (or constant time, is called CONSTI. The contention resolution happens over a predefined number of slots. In a slot, the stations probabilistically send a jam signal on the channel. The stations listening retire if they hear a jam signal. The others continue to the next slot. Over several slots, we aim to have one station remaining in the contention, which will then transmit its data. We find the optimal parameters of CONSTI and present an analysis on its performance.

  1. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.;

    2015-01-01

    is to provide a comprehensive and self-contained introduction to the fundamentals of the receiver-initiated paradigm, providing newcomers with a quick-start guide on the state of the art of this field and a palette of options, essential for implementing applications or designing new protocols....

  2. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  3. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  4. Improving access to primary care for Aboriginal babies in Western Australia: study protocol for a randomized controlled trial

    OpenAIRE

    McAullay, Daniel; McAuley, Kimberley; Marriott, Rhonda; Pearson, Glenn; Jacoby, Peter; Ferguson, Chantal; Geelhoed, Elizabeth; Coffin, Juli; Green, Charmaine; Sibosado, Selina; Henry, Barbara; Doherty, Dorota; Edmond, Karen

    2016-01-01

    Background Despite a decade of substantial investments in programs to improve access to primary care for Aboriginal mothers and infants, more than 50 % of Western Australian Aboriginal babies are still not receiving primary and preventative care in the early months of life. Western Australian hospitals now input birth data into the Western Australian electronic clinical management system within 48 hours of birth. However, difficulties have arisen in ensuring that the appropriate primary care ...

  5. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  6. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  7. 水声通信网络媒介访问控制协议的研究%Research on Media Access Control Protocol for Underwater Acoustic Communication Network

    Institute of Scientific and Technical Information of China (English)

    匡锐

    2014-01-01

    Media access control protocol is the most important part of data link layer protocol, which plays a decisive significance to the distribution of channels. This paper designs a media access control protocol that com-bines normal access mode and MACAW access mode respectively modeling of channel and underwater communi-cation equipment, simulating the normal access mode and MACAW access mode in throughput, bit error rate and transmission delay.%媒介访问控制协议是数据链路层协议中最重要的部分,对信道的分配起着决定性的作用。本文设计了一种普通访问模式和MACAW访问模式相结合的媒介访问控制协议,分别对信道和水下通信设备进行建模,对普通访问模式和MACAW访问模式在吞吐量、误码率和传输延迟进行了仿真。

  8. A Multiple-Reception Access Protocol with Interruptions with Mixed Priorities in CDMA Networks

    Institute of Scientific and Technical Information of China (English)

    Lu Xiaowen; Zhu Jinkang

    2003-01-01

    A novel access protocol called Multiple-Reception Access Protocol (MRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.

  9. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    CERN Document Server

    Yu, Hong

    2012-01-01

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  10. A NEW RANDOM PACKET ACCESS PROTOCOL IN WCDMA

    Institute of Scientific and Technical Information of China (English)

    Jiao Wenhua; Liang Qinglin

    2002-01-01

    In this paper, a new Random Packet Access Protocol (RPAP) is proposed in WCDMA systems. The new proposed RPAP can efficiently prevent unnecessary interference by stopping a transmission if it is bound to be collided with others. Throughput about the new RPAP is deliberated and analyzed. Computer simulation shows that this protocol has better throughput performance compared with conventional one currently used in WCDMA.

  11. Power Control Protocols in VANET

    OpenAIRE

    Samara, Ghassan; Salem, Amer O. Abu; Alhmiedat, Tareq

    2013-01-01

    Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated.

  12. Remote Memory Access Protocol Target Node Intellectual Property

    Science.gov (United States)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  13. Design of Trusted Network Connection Security Protocol and Access Control Architecture%可信网络连接安全协议与访问控制体系设计

    Institute of Scientific and Technical Information of China (English)

    王明书

    2016-01-01

    针对现阶段可信网络在连接与控制方面存在问题,分析现有可信网络实体功能、结构层次和接口协议,提出包含完整度量收集器在内的全新可信网络连接体系架构,重新设计以 EAP⁃TNC 数据包为核心的安全网络协议及访问控制体系。通过设置网络带宽、终端状态和可信等级等多项指标,对体系访问控制和连接性能进行实验测试。结论表明,可信网络连接安全协议和访问控制体系可使终端以安全可控的方式访问网络,具备良好的安全性和可用性。%In order to solve the connection and control problems of trusted network,the entity function,architecture and interface protocol of trusted network are analyzed,a new trusted network connection architecture,including the integrity measurement collector,is proposed,the security network protocol and access control architecture based on EAP⁃TNC data packet are designed.By setting specifi⁃cations such as network bandwidth,terminal state and reliability level,the performance of the basic connection and access control is test⁃ed.The result shows that based on the connection security protocol and access control architecture of trusted network, the terminal equipment can access the network in a secure and controllable way,and the security and availability are improved.

  14. DCP, a distributed-control polling mac protocol

    OpenAIRE

    Conti, Marco; Gregori, Enrico; Lenzini, Luciano

    1990-01-01

    This paper describes and analyzes a novel MAC protocol named Distributed-Control Polling (DCP), which has been designed to bring together the most interesting features of distributed-control MAC protocols (e.g., DQDB) and centralized token-passing MAC protocols (e.g. FASNET, FDDI, EXPRESS_NET). From the fully?distributed MAC protocols, DCP acquires the capability to guarantee both a complete utilization of the medium capacity and an access delay of only a few slots at light loads. From the ce...

  15. Accessibility in Public Buildings: Efficiency of Checklist Protocols.

    Science.gov (United States)

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checklist protocols. The study revolved around the use of a checklist protocol in assessments of two buildings in Stockholm: the new head office for the National Authority for Social Insurances (ASI) and the School of Architecture at the Royal Institute of Technology (KTH). The study included three groups: Group 1 and Group 2 consisted of 50 real estate managers employed by the ASI, while Group 3 consisted of three participants in a course at the KTH. The results were similar in all of the groups. The use of the checklist protocol generated queries, which related mainly to two factors: (1) the accompanying factsheet consisted of textual explanations with no drawings, photographs or illustrations and (2) the order of the questions in the checklist protocol was difficult to correlate with the two buildings' spatial logic of accessing, egressing and making use of the built space. PMID:27534293

  16. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    OpenAIRE

    Desmedt, Yvo; Shaghaghi, Arash

    2016-01-01

    Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the failure of access control. Access control models derived from access control matrix encompass three ...

  17. Physical Access Control Database

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  18. 多预约信息转发的协作信道预约多址接入协议%A Multiple Access Control Protocol with Multiple Reservation Information Relay and Cooperative Channel Reservation

    Institute of Scientific and Technical Information of China (English)

    袁韵洁; 李波

    2012-01-01

    针对Ad Hoc网络中实时业务在背景业务繁重时信道接入效率低的问题,提出一种邻节点协作转发信道预约信息(CRI)的多址接入协议(M-CCRM).节点在发送数据分组前,选取多条CRI作为其数据开销,在控制该开销不超过预先设定门限的基础上,将这些CRI随分组一起发送;收到数据分组的邻节点提取其携带的CRI,记录下那些自己位于其预约范围内的CRI,避免在这些CRI的预约时段内接入信道.M-CCRM协议扩大了CRI的覆盖范围,解决了由于信道衰落和(或)分组冲突导致的CRI丢失问题,提高了实时业务的信道接入效率.仿真结果表明,当开销门限为0.02时,M-CCRM协议的实时业务发送失败概率比基本信道预约协议和基本协作预约协议分别降低了31%和20%.%A new multiple access control (MAC) protocol called M-CCRM is proposed to solve the problem of poor channel access efficiency for real-time traffic in Ad Hoc networks with heavy background traffic loads. The proposed protocol bases on the idea of distributing channel reservation information (CRI) through cooperative relays of neighboring nodes. Before a node transmits a packet, multiple CRIs are carefully selected and piggy-backed with the packet so as to limit the corresponding overheads caused by carrying CRIs to be lower than a predefined threshold. By o-verhearing the packet, neighboring nodes record some of the CRIs as long as they are within the channel reservation distance of the CRIs, and then avoid to access the channel while the traffic indicated by the CRIs are carrying on. The proposed MAC protocol enlarges the coverage area of the announced CRIs, and avoids the possible missing of CRIs caused by channel fading and (or) packet collisions. Therefore, the channel access efficiency for real-time traffic is significantly increased. Simulations and comparisons with the basic channel reservation protocol and the basic cooperative channel reservation

  19. 基于语音时隙机制的车载自组网MAC协议%Media Access Control Protocol Based on Voice Time Slot Mechanism in VANET

    Institute of Scientific and Technical Information of China (English)

    谢旭; 李丽华; 付伟

    2012-01-01

    在节点高速运动的车载组网多跳通信中,如何快速选择下一跳中继节点是目前无线自组网亟待解决的问题.为此,提出一种基于类语音时隙划分信道竞争机制的时分复用协议,采用类似语音优先权接入的语音突发方式解决多跳中继选择问题.仿真结果表明,在不同节点分布的运动场景下,使用语音突发方式的MAC协议较传统的时分复用随机接入方式具有更短的接入延时与更低的网络开销.%In Vehicle Ad Hoc Networks(VANET) multi-hop communication with nodes of high speed, a problem of how to choose a next hop relay rapidly makes a significant sense. In this paper, a slot assignment for voice access named black-burst scheme based Time Division Multiple Address(TDMA) is proposed for channel access contention. The problem of relay selection can be solved as a method of voice access control with priority. Simulation results show that in scenarios of movement with different nodes distribution, a shorter access delay and a lower cost can be obtained in MAC protocols based on black-burst mechanism compared with the traditional TDMA random channel access method.

  20. IVOA Recommendation: Simple Line Access Protocol Version 1.0

    CERN Document Server

    Salgado, Jesus; Guainazzi, Matteo; Barbarisi, Isa; Dubernet, Marie-Lise; Tody, Doug

    2011-01-01

    The Simple Line Access Protocol (SLAP) is an IVOA Data Access protocol which defines a protocol for retrieving spectral lines coming from various Spectral Line Data Collections through a uniform interface within the VO framework. These lines can be either observed or theoretical and will be typically used to identify emission or absorption features in astronomical spectra. It makes use of the Simple Spectral Line Data Model (SSLDM [1]) to characterize spectral lines through the use of uTypes [14]. Physical quantities of units are described by using the standard Units DM [15]. SLAP services can be registered in an IVOA Registry of Resources using the VOResource [12] Extension standard, having a unique ResourceIdentifier [13] in the Registry. The SLAP interface is meant to be reasonably simple to implement by service providers. A basic query will be done in a wavelength range for the different services. The service returns a list of spectral lines formatted as a VOTable. Thus, an implementation of the service m...

  1. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  2. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  3. Early intervention for depression and anxiety in 16-18-year-olds: Protocol for a feasibility cluster randomised controlled trial of open-access psychological workshops in schools (DISCOVER).

    Science.gov (United States)

    Michelson, Daniel; Sclare, Irene; Stahl, Daniel; Morant, Nicola; Bonin, Eva-Maria; Brown, June S L

    2016-05-01

    Adolescence is a vulnerable period for the development of mental health problems. The DISCOVER intervention aims to provide accessible, acceptable and cost-effective psychological support for stressed adolescents in inner-city secondary schools. The intervention uses age-appropriate cognitive-behavioural therapy (CBT) methods and materials, delivered in an interactive 1-day workshop with additional telephone support. An open-access entry route allows students to self-refer. This protocol describes a feasibility cluster randomised controlled trial (RCT) comparing DISCOVER with a waitlist control condition. The study will run across 10 clusters (secondary schools) in the inner London Boroughs of Southwark and Lambeth. Participants are students aged over 16years who are seeking help with anxiety and/or depressive symptoms. Key feasibility parameters relate to the proportion of students willing to participate in the research following publicity events; the proportion of students who complete the intervention; and response rates for outcome measures. Outcome variance estimates and intra-cluster correlations will be obtained for future power calculations. Qualitative methods will be used to explore the acceptability of the intervention and research procedures for students and school staff. The feasibility of an economic evaluation will also be examined. The results will (i) determine the appropriateness of proceeding to a definitive full-scale trial; and (ii) inform the development of an optimised version of the DISCOVER intervention that can be tested within feasible parameters. PMID:26883283

  4. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  5. 一种动态占空比的无线传感器网络MAC协议%Medium Access Control Protocol with Dynamic Duty Cycle in Wireless Sensor Network

    Institute of Scientific and Technical Information of China (English)

    王晓东; 闵捷; 周宇; 叶庆卫

    2011-01-01

    在无线传感器网络(WSN)中,降低能耗会引发端到端时延的增加.为兼顾能耗和时延的平衡,提出一种基于动态占空比的WSN介质访问控制协议.通过计算节点利用率、平均睡眠延时,结合占空比上下限,动态调整节点占空比,使其更好地适应网络实时通信流量.实验结果表明,该协议在线性拓扑中比S-MAC节能52%,延迟减少35%,在网状拓扑中比S-MAC节能68%,延迟减少46%.%Lowering the energy consumption may result in higher latency Wireless Sensor Network(WSN). To address such a tradeoff, this paper proposes a Media Access Control(MAC) protocol based on dynamic duty cycle. It adjusts duty cycle dynamically based on utilization, average sleeping delay, and the upper and lower bound of duty cycle. Experimental results show that the MAC protocol saves energy about 52% and reduces latency by 35% from S-MAC in a chain topology. In the cross topology, it achieves 68% energy saving and 46% latency reduction from S-MAC.

  6. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...

  7. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  8. IVOA Recommendation: Simple Spectral Access Protocol Version 1.1

    CERN Document Server

    Tody, Doug; McDowell, Jonathan; Bonnarel, Francois; Budavari, Tamas; Busko, Ivo; Micol, Alberto; Osuna, Pedro; Salgado, Jesus; Skoda, Petr; Thompson, Randy; Valdes, Frank

    2012-01-01

    The Simple Spectral Access (SSA) Protocol (SSAP) defines a uniform interface to remotely discover and access one dimensional spectra. SSA is a member of an integrated family of data access interfaces altogether comprising the Data Access Layer (DAL) of the IVOA. SSA is based on a more general data model capable of describing most tabular spectrophotometric data, including time series and spectral energy distributions (SEDs) as well as 1-D spectra; however the scope of the SSA interface as specified in this document is limited to simple 1-D spectra, including simple aggregations of 1-D spectra. The form of the SSA interface is simple: clients first query the global resource registry to find services of interest and then issue a data discovery query to selected services to determine what relevant data is available from each service; the candidate datasets available are described uniformly in a VOTable format document which is returned in response to the query. Finally, the client may retrieve selected datasets ...

  9. Timing of access to secondary healthcare services for diabetes management and lower extremity amputation in people with diabetes: a protocol of a case-control study.

    LENUS (Irish Health Repository)

    Buckley, Claire M

    2013-09-03

    Lower extremity amputation (LEA) is a complication of diabetes and a marker of the quality of diabetes care. Clinical and sociodemographic determinants of LEA in people with diabetes are well known. However, the role of service-related factors has been less well explored. Early referral to secondary healthcare is assumed to prevent the occurrence of LEA. The objective of this study is to investigate a possible association between the timing of patient access to secondary healthcare services for diabetes management, as a key marker of service-related factors, and LEA in patients with diabetes.

  10. Table Access Protocol Applied to the SIMBAD Database

    Science.gov (United States)

    Mantelet, G.; Wenger, M.; Michel, L.

    2012-09-01

    We have implemented in the SIMBAD service the Table Access Protocol (TAP), a standard of the Virtual Observatory defining a protocol for accessing astronomical catalogs and database tables using queries written in the Astronomical Data Query Language (ADQL), another VO standard. Implementing TAP requires several steps: the definition of a database schema with the data exposed to the users, the translation of ADQL queries into regular SQL language performing the queries in SIMBAD, and the implementation of the Universal Worker Service (UWS) standard to manage asynchronous queries, useful for long queries, either by their duration or their output size. These standards were implemented as much as possible in a generic way, allowing them to be reused in other services, as it has already been done in the database generator SAADA. The ADQL to SQL translator uses callbacks to implement the specific routines for a given service. All these libraries have been designed as autonomous packages, easy to reuse with very few specific developments. The whole development is in the Java language.

  11. Diagrammatization of the Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  12. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  13. A universal data access and protocol integration mechanism for smart home

    Science.gov (United States)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  14. ParaMED Home: A protocol for a randomised controlled trial of paramedic assessment and referral to access medical care at home

    Directory of Open Access Journals (Sweden)

    Johnston Steven

    2011-06-01

    Full Text Available Abstract Background In Australia approximately 25% of Emergency Department (ED attendances are via ambulance. ED overcrowding in Australia, as in many countries, is common. Measures to reduce overcrowding include the provision of enhanced timely primary care in the community for appropriate low risk injury and illness. Therefore paramedic assessment and referral to a community home hospital service, in preference to transfer to ED, may confer clinical and cost benefit. Methods/Design A randomised controlled trial. Consenting adult patients that call an ambulance and are assessed by paramedics as having an eligible low risk problem will be randomised to referral to ED via ambulance transfer or referral to a rapid response service that will assess and treat the patient in their own residence. The primary outcome measure is requirement for unplanned medical attention (in or out of hospital in the first 48 hours. Secondary outcomes will include a number of other clinical endpoints. A cost effectiveness analysis will be conducted. Discussion If this trial demonstrates clinical non-inferiority and cost savings associated with the primary assessment service, it will provide one means to safely address ED overcrowding. Trial Registration Australian and New Zealand Clinical Trials Registry Number 12610001064099

  15. Efficient Controlled Quantum Secure Direct Communication Protocols

    Science.gov (United States)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  16. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Science.gov (United States)

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  17. Robust access control framework for mobile cloud computing network

    OpenAIRE

    Li, F; Rahulamathavan, Y.; Conti, M.; Rajarajan, M.

    2015-01-01

    Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of unified communications, employees exploit the advantages of smart devices and 4G wireless technology to access the data from anywhere and anytime. Security protocols such as access control designed for traditional setup are not su...

  18. A study on the media access control protocol for distributed multi-hop underwater acoustic network%分布式多跳水声通信网络的媒质控制协议研究

    Institute of Scientific and Technical Information of China (English)

    李霞; 杨文; 苏阳

    2013-01-01

    Underwater Acoustic Network(UAN)technology has become attractive to the researchers in the field of underwater acoustic communication in recent years[1~4].One of the key technologies is the design of media access control(MAC)protocol.The focus of this paper is to design an energy and throughput efficient MAC protocol for multi-hop and long range acoustic sensor networks.A multi-hop T-Lohi protocol (MT-Lohi)is designed,which extends the T-Lohi protocol from single-hop networks to multi-hop networks by introducing dynamic contention round,pseudo tone,priority-based contention,new contenders counting mechanism.In order to gain a balance between good channel utilization and low probability of packet loss,the length of the duration of contention round is modified also.Simulation under OPNET platform is carried out to evaluate the performance in throughput,packet loss rate and fairness,and to verify the effectiveness of dynamic contention round.%水声通信网络由于可以弥补传统海洋探测技术的不足,在海洋信息采集、环境监测、灾难预报、辅助导航、水声反潜等民用、军事领域有诸多重要应用.因此,组网技术也成为近年来水声通信领域的研究热点之一.其中数据链路层的媒质控制协议关系到信道资源的有效分配及网络性能.结合能量及网络吞吐量效率因素,本文设计了一种用于分布式远距离多跳水声通信网络的媒质控制协议协议.已有的的新性能的水声调制解调器并没有开发相应的低功耗网络媒质控制协议.有人提出了一类分布式能量有效的竞争媒质控制协议,称为Tone-Lohi (T-Lohi)协议,该协议采用了信道预约机制,共有三个类型:时间同步的T-Lohi协议、保守非时间同步T-Lohi协议及主动非时间同步T-Lohi协议.本文在分析该类协议的基础上讨论了分布式多跳水声通信网络的竞争型媒质控制协议.设计了多跳式的T-Lohi协议,通过采用动态竞争回

  19. Physiological, Behavioral, and Scientific Impact of Different Fluid Control Protocols in the Rhesus Macaque (Macaca mulatta)

    Science.gov (United States)

    Bertrand, Henri; Mindus, Claire; Flecknell, Paul

    2016-01-01

    Abstract Rhesus macaques are an important model in behavioral neuroscience due to their advanced cognitive abilities. To motivate animals to engage in complex tasks, fluid rewards, in conjunction with fluid control protocols, are often used. The impact of these protocols on animal welfare is controversial. We compared two fluid control protocols against a protocol providing free access to water and evaluated the impacts on physiological states of hydration, behavioral measures of welfare, and scientific output. Blood physiology did not significantly differ between any of the protocols, and urine measures were indicative of well functioning, healthy kidneys. Changes in behaviors were limited, the main one being an increase in motivation to drink on the stricter fluid control protocol, and improved task performance early in the week. Overall, fluid control protocols had little measurable impact on the welfare of rhesus macaques while ensuring that scientific data of high quality could be obtained. PMID:27679812

  20. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  1. Comparison of High Speed Congestion Control Protocols

    Directory of Open Access Journals (Sweden)

    Jawhar Ben Abed

    2012-10-01

    Full Text Available Congestion control limits the quantity of information input at a rate less important than that of thetransmission one to ensure good performance as well as protect against overload and blocking of thenetwork. Researchers have done a great deal of work on improving congestion control protocols,especially on high speed networks.In this paper, we will be studying the congestion control alongside low and high speed congestion controlprotocols. We will be also simulating, evaluating, and comparing eight of high speed congestion controlprotocols : Bic TCP, Cubic TCP, Hamilton TCP, HighSpeed TCP, Illinois TCP, Scalable TCP,Compound TCP and YeAH TCP, with multiple flows.

  2. Dynamic Characteristics of Explicit Control Protocol

    Institute of Scientific and Technical Information of China (English)

    CHENG Shuang-mei; LI Jian-hua; GUO Chuan-xiong

    2008-01-01

    The dynamic characteristics of eplicit control protocol (XCP) were investigated with single bottle-neck on the microscopic time-scale. Analysis and simulation results show that the bandwidth utilization of an XCP bottleneck link converges to 1 at exponential rate, persistent congestion cannot occur at the bottleneck link, and throughput of an arbitrary subset of XCP flows at the bottleneck link converges to its fair share in exponential rate. The XCP has high bandwidth utilization and good fairness properties.

  3. Flexible access control for dynamic collaborative environments

    NARCIS (Netherlands)

    Dekker, Mari Antonius Cornelis

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect confident

  4. Towards Trusted Network Access Control

    Science.gov (United States)

    Bente, Ingo; von Helden, Josef

    Network Access Control (NAC) solutions promise to significantly increase the security level of modern networks. In short, they allow to measure the integrity state of an endpoint that tries to get access to the network. Based upon the measurement results, which are compared to a defined NAC policy, access to the network can be allowed or denied. One problem of all currently available NAC solutions is referred to as the “lying endpoint” problem. Normally, special software components are responsible for gathering the relevant integrity information on the endpoint. If an attacker modifies those software components, an endpoint can lie about its current integrity state. Therefore, endpoints which are not compliant to the defined NAC policy can get access to the network. Those endpoints must be considered as potential threat. This paper summarizes a possible solution for the lying endpoint problem based upon the specifications of the Trusted Computing Group (TCG) and the results of the two research projects TNC@ FHH and Turaya. The goal is to develop an open source, TNC compatible NAC solution with full TPM support within a new research project: tNAC.

  5. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  6. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  7. Addressing Mobility in Wireless Sensor Media Access Protocol

    OpenAIRE

    Huan Pham; Sanjay Jha

    2005-01-01

    Handling mobility in wireless sensor networks presents several new challenges. Techniques developed for other mobile networks, such as mobile phone or mobile adhoc networks can not be applicable, as in these networks energy is not a very critical resource. This paper presents a new adaptive Mobility-aware Sensor MAC protocol (MS-MAC) for mobile sensor applications. In MS-MAC protocol, a node detects its neighbor's mobility based on a change in its received signal level from the neighbor, or a...

  8. Does access to a colorectal cancer screening website and/or a nurse-managed telephone help line provided to patients by their family physician increase fecal occult blood test uptake?: A pragmatic cluster randomized controlled trial study protocol

    Directory of Open Access Journals (Sweden)

    Clouston Kathleen

    2012-05-01

    Full Text Available Abstract Background Fecal occult blood test screening in Canada is sub-optimal. Family physicians play a central role in screening and are limited by the time constraints of clinical practice. Patients face multiple barriers that further reduce completion rates. Tools that support family physicians in providing their patients with colorectal cancer information and that support uptake may prove useful. The primary objective of the study is to evaluate the efficacy of a patient decision aid (nurse-managed telephone support line and/or colorectal cancer screening website distributed by community-based family physicians, in improving colorectal cancer screening rates. Secondary objectives include evaluation of (disincentives to patient FOBT uptake and internet use among 50 to 74 year old males and females for health-related questions. Challenges faced by family physicians in engaging in collaborative partnerships with primary healthcare researchers will be documented. Methods/design A pragmatic, two-arm, randomized cluster controlled trial conducted in 22 community-based family practice clinics (36 clusters with 76 fee-for-service family physicians in Winnipeg, Manitoba, Canada. Each physician will enroll 30 patients attending their periodic health examination and at average risk for colorectal cancer. All physicians will follow their standard clinical practice for screening. Intervention group physicians will provide a fridge magnet to each patient that contains information facilitating access to the study-specific colorectal cancer screening decision aids (telephone help-line and website. The primary endpoint is patient fecal occult blood test completion rate after four months (intention to treat model. Multi-level analysis will include clinic, physician and patient level variables. Patient Personal Health Identification Numbers will be collected from those providing consent to facilitate analysis of repeat screening behavior. Secondary outcome

  9. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  10. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  11. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  12. Wireless Plug and Play Control Systems: Hardware, Networks, and Protocols

    DEFF Research Database (Denmark)

    Meybodi, Soroush Afkhami

    2012-01-01

    . The scope is, however, constrained to the challenges that are relevant to the wireless communication framework which provides underlying services for plug and play control systems. Other aspects of plug and play control systems are studied in other research projects within P3C. The main results of this Ph......This dissertation reports the result of efforts to identify and solve the problems that arise when a control system is to be designed for various industrial case studies of the Plug and Play Process Control (P3C) project that require autonomous addition/removal of sensors, actuators and subsystems......D project are presented in two distinct areas which are: 1) Signal propagation in underground and confined areas, and 2) Access and Networking protocols that accommodate the required flexibility, scalability, and quality of services for plug and play control systems. The first category finds application...

  13. Optical Shared Memory Computing and Multiple Access Protocols for Photonic Networks

    Science.gov (United States)

    Li, Kuang-Yu.

    In this research we investigate potential applications of optics in massively parallel computer systems, especially focusing on design issues in three-dimensional optical data storage and free-space photonic networks. An optical implementation of a shared memory uses a single photorefractive crystal and can realize the set of memory modules in a digital shared memory computer. A complete instruction set consists of R sc EAD, W sc RITE, S sc ELECTIVE E sc RASE, and R sc EFRESH, which can be applied to any memory module independent of (and in parallel with) instructions to the other memory modules. In addition, a memory module can execute a sequence of R sc EAD operations simultaneously with the execution of a W sc RITE operation to accommodate differences in optical recording and readout times common to optical volume storage media. An experimental shared memory system is demonstrated and its projected performance is analyzed. A multiplexing technique is presented to significantly reduce both grating- and beam-degeneracy crosstalk in volume holographic systems, by incorporating space, angle, and wavelength as the multiplexing parameters. In this approach, each hologram, which results from the interference between a single input node and an object array, partially overlaps with the other holograms in its neighborhood. This technique can offer improved interconnection density, optical throughput, signal fidelity, and space-bandwidth product utilization. Design principles and numerical simulation results are presented. A free-space photonic cellular hypercube parallel computer, with emphasis on the design of a collisionless multiple access protocol, is presented. This design incorporates wavelength-, space-, and time-multiplexing to achieve multiple access, wavelength reuse, dense connectivity, collisionless communications, and a simple control mechanism. Analytic models based on semi-Markov processes are employed to analyze this protocol. The performance of the

  14. Tag Content Access Control with Identity-based Key Exchange

    Science.gov (United States)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  15. Analysis of the LTE Access Reservation Protocol for Real-Time Traffic

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir;

    2013-01-01

    LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based on the fo......LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based...... of available data resources caused by variable load, and (2) detection of collisions in contention phase may not be possible. All of this affects transmission of real-time M2M traffic, where data packets have to be sent within a deadline and may have only one contention opportunity. We analyze the features...

  16. A Linux Implementation of Temporal Access Controls

    OpenAIRE

    Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E.

    2007-01-01

    Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval File Protection System (TIFPS), a prototype of the Time Interval Access Control (TIAC) model, has been implemented by modifying Linux extended attributes to include temporal metadata associated both with files and users. The Linux Security Module was used to provide hooks fo...

  17. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno;

    2013-01-01

    successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  18. WIRELESS ADHOC MULTI ACCESS NETWORKS OPTIMIZATION USING OSPF ROUTING PROTOCOL BASED ON CISCO DEVICES

    Directory of Open Access Journals (Sweden)

    Mohamed E. Khedr

    2015-03-01

    Full Text Available One of the most attractive field for research for researchers and authors so the Wireless adhoc networks. So, this paper will describe the background and basic features of Open Short Path First (OSPF routing protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands. Describe, modify and calculate the metric (Cost used by OSPF due to adhoc networks. Illustrating the Election parameters made by DR/BDR (Designated and Back Designated Routers used in multi-access wireless networks. This paper will use OSPF routing protocol because of its average administrative distance with all routing protocols.

  19. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... characteristics of the traffic for allocating bandwidth effeciently to CBR, VBR and ABR/UBR connections by a compromise of assignment, contetion, reservation and polling access techniques. Simulation results show that the proposed protocol can achieve a very high channel utilization of 90 % while providing...

  20. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  1. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  2. Random Access Game and Medium Access Control Design

    OpenAIRE

    Chen, Lijun; Low, Steven H.; Doyle, John C.

    2010-01-01

    Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (strategy evolutions) to achieve Nash equilibria. This provides a general analytical framework that is capable of modeling a large class of system-wide quality-of-service (QoS) models via the specification of per-node util...

  3. A novel multipriority reservation protocol for plastic optical fiber access network

    Institute of Scientific and Technical Information of China (English)

    Ning Zhang(张宁); Rongjin Yu(于荣金)

    2003-01-01

    In this papcr, a novel multipriority reservation protocol for plastic optical fiber access network based onoptical code division multiplexing access (OCDMA) technology is proposed. Conventional OCDMA systemonly allows finite units to transmit and access simultaneously according to the number of channels. Theprotocol is proposed to resolve this problem. By using the reservation scheme and a distributed arbitrationalgorithm, channel collision and destination conflict can be avoided. The protocol can efficiently supportthe transmission of multimedia messages that require the different time-delays. At the same time, eachoptical network unit is equipped with a fixed optical encoder/decoder that is always tuned to channel forcontrol and the tunable optical encoder/decoder that is tuned to any of channel for data. The networkthroughput and average delay have been investigated by numerical analysis and simulation experiments.It is shown that the multipriority reservation protocol in this POF access network based on OCDMAtechnology is valid and efficient.

  4. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  5. An electronically controlled automatic security access gate

    OpenAIRE

    Jonathan A. Enokela; Michael N. TYOWUAH

    2014-01-01

    The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF) transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is ...

  6. Evaluation of file access control implementations

    OpenAIRE

    Madar, Fatima Ali

    2005-01-01

    This thesis discusses two implementations of file access controls: the UNIX Permissions (UP) and the Access Control List (ACL). We will evaluate advantages and weaknesses in these two implementations. The criteria of evaluation are usefulness, security and manageability. The level of usefulness of systems was measured by evaluating user-surveys. The level of security was measured by comparing the implementations against well-established file access control models concerning privacy, inte...

  7. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  8. An Efficient Secure Real-Time Concurrency Control Protocol

    Institute of Scientific and Technical Information of China (English)

    XIAO Yingyuan; LIU Yunsheng; CHEN Xiangyang

    2006-01-01

    Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time performance significantly.

  9. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  10. EPCM - an efficient power controlled MAC protocol for mobile ad hoc network

    Science.gov (United States)

    Seth, D. D.; Patnaik, S.; Pal, S.

    2014-10-01

    To reduce interference and to save a significant amount of energy, a control of transmission power is employed in Mobile Ad hoc Network. Many researchers have reported numerous transmission power control schemes to achieve the objective. Some of those techniques use higher transmission power for control packets (Request To Send/Clear To Send) and lesser power for Data and ACK packets. These schemes, though save some amount of energy, achieve least aggregate throughput due to poor spatial reuse and hidden terminal interference. In this paper, an efficient Power Controlled Medium Access Control (EPCM) scheme is evinced, which uses uniform interference aware and minimum transmission power for both Control and Data packet. The performance of EPCM is evaluated and compared with three reported Medium Access Control protocols which are based on transmission power control schemes and is observed that the proposed protocol achieves better throughput and minimal energy consumption while avoiding the hidden terminal problem.

  11. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  12. Formal Description of Trust-based Access Control

    Science.gov (United States)

    Xiaoning, Ma

    Different from traditional access control technologies, such as discretionary access control, mandatory access control, role-based access control, trust-based access control can solve the problem of uncertainty, risk and vulnerability coming from authorization. In this paper, strict definition and formal description of trust-based access control is defined.

  13. Design and Realization of An Access Controling System Based on 802 .1x Protocol%基于802.1x 协议的接入控制系统设计与实现磁

    Institute of Scientific and Technical Information of China (English)

    刘福强; 李威; 李镞

    2014-01-01

    The technology of ethernet-port authentication and access controling based on 802 .1x protocal has many ad-vantages ,such as high efficiency ,is designed and built ,flexible application and easy operation .In this paper ,access-contro-ling system based on 802 .1x protocal is designed and built ,the key technical problems are researched ,such as the security mode of EAP-TLS and the efficiency of USBKEY authentication .%基于802.1x 协议的以太网端口认证与接入控制技术具有简洁高效、容易实现、应用灵活以及易于运营等诸多特点和优点。文章通过对802.1x 等相关协议的研究与分析,设计并实现了基于该协议的安全接入控制系统,并对基于EAP-TLS 的安全认证方式、基于 USBKEY 认证方式效率等关键问题进行了深入分析。

  14. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Directory of Open Access Journals (Sweden)

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  15. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo;

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications...

  16. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  17. Disk access controller for Multi 8 computer

    International Nuclear Information System (INIS)

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  18. Modelling Access Control For Healthcare Information Systems

    OpenAIRE

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  19. Formal verification of safety protocol in train control system

    OpenAIRE

    Zhang, Yan; TANG, TAO; Li, Keping; Mera Sanchez de Pedro, Jose Manuel; Zhu, Li; Zhao, Lin; Xu, Tianhua

    2011-01-01

    In order to satisfy the safety-critical requirements, the train control system (TCS) often employs a layered safety communication protocol to provide reliable services. However, both description and verification of the safety protocols may be formidable due to the system complexity. In this paper, interface automata (IA) are used to describe the safety service interface behaviors of safety communication protocol. A formal verification method is proposed to describe the safety communication pr...

  20. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  1. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  2. Impacts of the Nagoya Protocol on access to plant genetic resources and benefit sharing in China

    Directory of Open Access Journals (Sweden)

    Jianyong Wu

    2013-11-01

    Full Text Available The Nagoya Protocol (NP is an international legal framework for access to genetic resources and benefit-sharing. It opened for signature on February1, 2011, and was proposed to be in force 90 days after the date when the fiftieth country or regional organization had ratified it. By October 2013, the protocol had been signed by 92 countries and ratified by 26 countries. The protocol is now expected to be in force before the twelfth meeting of the Conference of the Parties (COP to the Convention on Biological Diversity (CBD in 2014. The Nagoya Protocol will change the current situation of unordered access to and free development of genetic resources. It will provide a premise and guarantee for the principle of national sovereignty of genetic resources and implementation of equitable sharing of benefits arising from their utilization. Analyses show that although genetic resources indigenous to China have been widely utilized by other developed countries, with patents taken out on some products, utilization in China has been poor owing to a weak capacity for independent innovation and underdeveloped biotechnology. China currently lacks a policy and regulatory system for access and benefit sharing (ABS to its genetic resources. It is, therefore, a pressing matter for China to improve the implementation of the NP by strengthening national and local policies and regulations on ABS. There is also a need to increase investment to support basic research capacity and develop biological technology to fully utilize genetic resources in China

  3. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol

    Science.gov (United States)

    Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-01-01

    Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013

  4. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  5. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  6. A Novel Adaptive MAC Protocol for Wireless Internet Access Network with Smart Antennas

    Institute of Scientific and Technical Information of China (English)

    YANGJun; LIJiandong

    2004-01-01

    Employing smart antennas in the Central access point (CAP) of wireless Internet access networks is studied. Based on the characteristics of the networks and smart antennas, a Polling-based Adaptive beamforming multiple access protocol (PB-ABFMA) is proposed. In PB-ABFMA, the CAP requests the corresponding Mobile terminal (MT) to transmit training sequence just before the data packets transmission, so the Temporal reference beamforming (TRB) can be performed by the smart antennas. The CAP schedules packet transmissions based on the polling mechanism and dynamic TDMA, and a mini-slot is used to keep connectivity when an MT is idle, therefore,the access delay is reduced. Meanwhile, a simple and effec-tive access method is proposed to guarantee rapid access of new arrival MTs to the channel. Based on the “requestreply” traffic, which is the main traffic in Internet, the theoretical analysis of channel utilization and mean turnaround delay is presented. Analysis and simulation results show that the proposed PB-ABFMA protocols effectively support the application of smart antennas and provide high channel utilization and low turn-around delay.

  7. Access control issues in social networks

    OpenAIRE

    Carreras Coch, Anna; Rodríguez Luna, Eva; Delgado Mercè, Jaime; Maroñas Borras, Xavier

    2010-01-01

    Social Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies in Social Networks. Subsequently, two main issues are addressed: the interoperability amongst systems using different policy languages and the lack of elements in the existing policy languages when trying to express Social Networks’ access control. In part...

  8. Quality control protocols for radiodiagnosis agents and radiopharmaceuticals

    International Nuclear Information System (INIS)

    Based on the compilation of pharmacopoeia methods, literature, manuals and other information developed in our laboratory, protocols have been prepared to carry out quality controls for radiodiagnosis agents (RDA), better known as kits and RDA labelled with Tc99m. Quality control protocols cover physicochemical and biological controls. Physicochemical controls described for RDA include physical characteristics, particle size and number, pH, chemical identification, humidity, tin II; whereas biological controls include sterility, acute toxicity and bacterial endotoxin determination (LAL). Physicochemical controls described for radiopharmaceuticals labelled with Tc99m are pH and radiochemical purity; while biological distribution is described as a biological control

  9. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  10. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  11. Workflow Management in Occupational Medicine Using the Simple Workflow Access Protocol (SWAP)

    OpenAIRE

    McClay, James

    2001-01-01

    There are over nine million reported work related injuries a year administered through the workers compensation system. Workers compensation requires extensive communication with employers and payers. Workflow automation tools exist in segments of the industry but there isn't a common communication system. The Internet Engineering Task Force (IETF) Working Group on Simple Workflow Access Protocol (SWAP) is addressing the specifications for workflow across the Internet. We are adapting these p...

  12. A High-Throughput Random Access Protocol for Multiuser MIMO Systems

    Directory of Open Access Journals (Sweden)

    Yan Zhang

    2008-05-01

    Full Text Available We propose a high-throughput random access protocol for 2×2 multiuser multiple-input multiple-output (MIMO systems. The cross-layer mechanism utilizes the packets combining technique to exploit the advantages of both spatial multiplexing and multipacket reception. Analytical result indicates that the proposed scheme achieves 0.669 per spatial degree of freedom in stable throughput, which is much higher than those in the existed studies.

  13. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  14. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  15. Access Control Design and Implementations in the ATLAS Experiment

    CERN Document Server

    Leahu, M C; Avolio, G

    2008-01-01

    The ATLAS experiment operates with a significant number of hardware and software resources. Their protection against misuse is an essential task to ensure a safe and optimal operation. To achieve this goal, the Role Based Access Control (RBAC) model has been chosen for its scalability, flexibility, ease of administration and usability from the lowest operating system level to the highest software application level. This paper presents the overall design of RBAC implementation in the ATLAS experiment and the enforcement solutions in different areas such as the system administration, control room desktops and the data acquisition software. The users and the roles are centrally managed using a directory service based on Lightweight Directory Access Protocol which is kept in synchronization with the human resources and IT datab

  16. Near-Optimal Deviation-Proof Medium Access Control Designs in Wireless Networks

    CERN Document Server

    Phan, Khoa Tran; van der Schaar, Mihaela

    2010-01-01

    Distributed medium access control (MAC) protocols are essential for the proliferation of low cost, decentralized wireless local area networks (WLANs). Most MAC protocols are designed with the presumption that nodes comply with prescribed rules. However, selfish nodes have natural motives to manipulate protocols in order to improve their own performance. This often degrades the performance of other nodes as well as that of the overall system. In this work, we propose a class of protocols that limit the performance gain which nodes can obtain through selfish manipulation while incurring only a small efficiency loss. The proposed protocols are based on the idea of a review strategy, with which nodes collect signals about the actions of other nodes over a period of time, use a statistical test to infer whether or not other nodes are following the prescribed protocol, and trigger a punishment if a departure from the protocol is perceived. We consider the cases of private and public signals and provide analytical a...

  17. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...

  18. Performance estimates for personnel access control systems

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  19. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  20. An Access Definition and Query Language : Towards a Unified Access Control Model

    OpenAIRE

    Sonnenbichler, Andreas

    2013-01-01

    In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of rights, ego-centered roles, and decentralized administration. The suggested meta access control model is named \\'\\'Access Definition and Query Language\\'\\' (ADQL). ADQL is represented by a formal, context-free grammar allowing to express the targeted access control model, policies, facts, and access queries as a formal language.

  1. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...... of contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell...

  2. A Novel Multiple Access Protocol for Mobile Ad Hoc Network with Smart Antennas

    Institute of Scientific and Technical Information of China (English)

    YANGJun; LIJiandong; ZHOUXiaodong

    2004-01-01

    The approach to employ smart antennas in Mobile ad hoc network (MANET) nodes is presented. An adaptive beamforming-Carrier-Sense multiple access/collison avoidance) (ABF-CSMA/CA) protocol is proposed. In the ABF-CSMA/CA, Request-to-Send/Clear-to-Send (RTS/CTS) dialogue is used to distribute channel reservation information. Training sequences are transmitted just before RTS and CTS packets, so the Temporal reference beamforming (TRB) can be performed by the source node and the destination node.An improved virtual carrier-sense mechanism is also proposed to enhance Collision avoidance (CA) and obtain efficient Space division multiple access (SDMA). In this scheme, every node has two kinds of Network allocation vector (NAV): an oNAV maintains the interval of ongoing transmission of neighbors whose smart antennas operate in omnidirectional mode, and multiple bNAVs maintain those intervals of neighbors whose smart antennas operate in beamforming mode. Theoretical analysis of channel utilization of the proposed protocol is presented. Results show that ABF-CSMA/CA protocol combining with smart antennas can provide higher channel utilization.

  3. Partner randomized controlled trial: study protocol and coaching intervention

    Directory of Open Access Journals (Sweden)

    Garbutt Jane M

    2012-04-01

    Full Text Available Abstract Background Many children with asthma live with frequent symptoms and activity limitations, and visits for urgent care are common. Many pediatricians do not regularly meet with families to monitor asthma control, identify concerns or problems with management, or provide self-management education. Effective interventions to improve asthma care such as small group training and care redesign have been difficult to disseminate into office practice. Methods and design This paper describes the protocol for a randomized controlled trial (RCT to evaluate a 12-month telephone-coaching program designed to support primary care management of children with persistent asthma and subsequently to improve asthma control and disease-related quality of life and reduce urgent care events for asthma care. Randomization occurred at the practice level with eligible families within a practice having access to the coaching program or to usual care. The coaching intervention was based on the transtheoretical model of behavior change. Targeted behaviors included 1 effective use of controller medications, 2 effective use of rescue medications and 3 monitoring to ensure optimal control. Trained lay coaches provided parents with education and support for asthma care, tailoring the information provided and frequency of contact to the parent's readiness to change their child's day-to-day asthma management. Coaching calls varied in frequency from weekly to monthly. For each participating family, follow-up measurements were obtained at 12- and 24-months after enrollment in the study during a telephone interview. The primary outcomes were the mean change in 1 the child's asthma control score, 2 the parent's quality of life score, and 3 the number of urgent care events assessed at 12 and 24 months. Secondary outcomes reflected adherence to guideline recommendations by the primary care pediatricians and included the proportion of children prescribed controller medications

  4. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  5. Role-based access control in retrospect

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Wieringa, Roel

    2012-01-01

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of R

  6. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  7. Atom-Role-Based Access Control Model

    Science.gov (United States)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  8. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming;

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...

  9. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  10. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    Science.gov (United States)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  11. Survey of Performance based Transmission Control Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Sapna Bagde

    2013-01-01

    Full Text Available Transmission Control Protocol (TCP is a connection-oriented transport service that ensures the reliability of message delivery. It verifies that messages and data were received. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP provides a communication service at an intermediate level between an application programs. TCP is the protocol used by major Internet applications such as the World Wide Web, email, remote administration and file transfer. TCP is a reliable transport protocol that is well tuned to perform well in traditional networks. However, several experiments and analysis have shown that this protocol is not suitable for bulk data transfer in high bandwidth, large round trip time networks because of its slow start and conservative congestion control mechanism. In this paper we discussed a survey of Performance Based Transmission Control Protocol in Mobile Ad-hoc Network environment. The performance based techniques are categorized based upon different approaches like throughput, end-to-end delay, congestion control etc. We also analysis the major improvement in recent methods for performance based TCP in MANET.

  12. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  13. Standard protocol stack for mission control

    Science.gov (United States)

    Hooke, Adrian J.

    1994-01-01

    It is proposed to create a fully 'open' architectural specification for standardized space mission command and control. By being open, i.e., independent for any particular implementation, diversity and competition will be encouraged among future commercial suppliers of space equipment and systems. Customers of the new standard capability are expected to include: (1) the civil space community (e.g., NASA, NOAA, international Agencies); (2) the military space community (e.g., Air Force, Navy, intelligence); and (3) the emerging commercial space community (e.g., mobile satellite service providers).

  14. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  15. Multihomed communication with SCTP (stream control transmission protocol)

    CERN Document Server

    Leung, Victor CM

    2012-01-01

    Although multihomed communication is a rapidly emerging trend for next generation networks, no known book explores multihomed communication with the Stream Control Transmission Protocol (SCTP). Filling this void, Multihomed Communication with SCTP (Stream Control Transmission Protocol) explains this innovative feature that allows an endpoint to simultaneously maintain and use multiple points of connectivity to the network-making it possible for fixed and mobile users to connect to the Internet via multiple service providers or last hop technologies. Among the topics addressed, the book covers:

  16. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  17. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    Directory of Open Access Journals (Sweden)

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  18. A noise immunity controlled quantum teleportation protocol

    Science.gov (United States)

    Li, Dong-fen; Wang, Rui-jin; Zhang, Feng-li; Baagyere, Edward; Qin, Zhen; Xiong, Hu; Zhan, Huayi

    2016-08-01

    With the advent of the Internet and information and communication technology, quantum teleportation has become an important field in information security and its application areas. This is because quantum teleportation has the ability to attain a timely secret information delivery and offers unconditional security. And as such, the field of quantum teleportation has become a hot research topic in recent years. However, noise has serious effect on the safety of quantum teleportation within the aspects of information fidelity, channel capacity and information transfer. Therefore, the main purpose of this paper is to address these problems of quantum teleportation. Firstly, in order to resist collective noise, we construct a decoherence-free subspace under different noise scenarios to establish a two-dimensional fidelity quantum teleportation models. And also create quantum teleportation of multiple degree of freedom, and these models ensure the accuracy and availability of the exchange of information and in multiple degree of freedom. Secondly, for easy preparation, measurement and implementation, we use super dense coding features to build an entangled quantum secret exchange channel. To improve the channel utilization and capacity, an efficient super dense coding method based on ultra-entanglement exchange is used. Thirdly, continuous variables of the controlled quantum key distribution were designed for quantum teleportation; in addition, we perform Bell-basis measurement under the collective noise and also prepare the storage technology of quantum states to achieve one-bit key by three-photon encoding to improve its security and efficiency. We use these two methods because they conceal information, resist a third party attack and can detect eavesdropping. Our proposed methods, according to the security analysis, are able to solve the problems associated with the quantum teleportation under various noise environments.

  19. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    Science.gov (United States)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  20. The prevention access and risk taking in young people (PARTY project protocol: A cluster randomised controlled trial of health risk screening and motivational interviewing for young people presenting to general practice

    Directory of Open Access Journals (Sweden)

    Sanci Lena

    2012-06-01

    Full Text Available Abstract Background There are growing worldwide concerns about the ability of primary health care systems to manage the major burden of illness in young people. Over two thirds of premature adult deaths result from risks that manifest in adolescence, including injury, neuropsychiatric problems and consequences of risky behaviours. One policy response is to better reorientate primary health services towards prevention and early intervention. Currently, however, there is insufficient evidence to support this recommendation for young people. This paper describes the design and implementation of a trial testing an intervention to promote psychosocial risk screening of all young people attending general practice and to respond to identified risks using motivational interviewing. Main outcomes: clinicians’ detection of risk-taking and emotional distress, young people’s intention to change and reduction of risk taking. Secondary outcomes: pathways to care, trust in the clinician and likelihood of returning for future visits. The design of the economic and process evaluation are not detailed in this protocol. Methods PARTY is a cluster randomised trial recruiting 42 general practices in Victoria, Australia. Baseline measures include: youth friendly practice characteristics; practice staff’s self-perceived competency in young people’s care and clinicians’ detection and response to risk taking behaviours and emotional distress in 14–24 year olds, attending the practice. Practices are then stratified by a social disadvantage index and billing methods and randomised. Intervention practices receive: nine hours of training and tools; feedback of their baseline data and two practice visits over six weeks. Comparison practices receive a three hour seminar in youth friendly practice only. Six weeks post-intervention, 30 consecutive young people are interviewed post-consultation from each practice and followed-up for self-reported risk taking

  1. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  2. A web product data management system based on Simple Object Access Protocol

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the serverside technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture,a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.

  3. FLOSYS--a web-accessible workflow system for protocol-driven biomolecular sequence analysis.

    Science.gov (United States)

    Badidi, E; Lang, B F; Burger, G

    2004-11-01

    FLOSYS is an interactive web-accessible bioinformatics workflow system designed to assist biologists in multi-step data analyses. FLOSYS allows the user to create complex analysis pathways (protocols) graphically, similar to drawing a flowchart: icons representing particular bioinformatics tools are dragged and dropped onto a canvas and lines connecting those icons are drawn to specify the relationships between the tools. In addition, FLOSYS permits to select input-data, execute the protocol and store the results in a personal workspace. The three-tier architecture of FLOSYS has been implemented in Java and uses a relational database system together with new technologies for distributed and web computing such as CORBA, RMI, JSP and JDBC. The prototype of FLOSYS, which is part of the bioinformatics workbench AnaBench, is accessible on-line at http://malawimonas.bcm.umontreal.ca: 8091/anabench. The entire package is available on request to academic groups who wish to have a customized local analysis environment for research or teaching.

  4. Shared access protocol (SAP) in femtocell channel resources for cellular coverage enhancement

    KAUST Repository

    Magableh, Amer M.

    2012-12-01

    Femtocells are promising techniques employed in cellular systems to enhance the indoor coverage, especially in areas with high density and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named shared access protocol (SAP), that enables the unlicensed macro-cell user equipments (MC-UE) to communicate with partially closed access femtocell base stations and hence, improves and enhances the overall system performance in closed environments. For the proposed system model, we obtain, in closed-form, the main signal-to-interference plus noise ratio (SINR) characteristics, including the probability density function (PDF) and the cumulative distribution function (CDF). In addition, these expressions are further used to derive several performance metrics in closed-form, such as, the average bit error rate (BER), outage probability, and the average channel capacity for the proposed SAP herein. Furthermore, Monte-carlo simulations as well as numerical results are provided showing a good match that ensures and confirms the correctness of the derived expressions. © 2012 IEEE.

  5. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  6. Simulations of the Impact of Controlled Mobility for Routing Protocols

    Directory of Open Access Journals (Sweden)

    Loscrí Valeria

    2010-01-01

    Full Text Available This paper addresses mobility control routing in wireless networks. Given a data flow request between a source-destination pair, the problem is to move nodes towards the best placement, such that the performance of the network is improved. Our purpose is to find the best nodes selection depending on the minimization of the maximum distance that nodes have to travel to reach their final position. We propose a routing protocol, the Routing Protocol based on Controlled Mobility (RPCM, where the chosen nodes' path minimizes the total travelled distance to reach desirable position. Specifically, controlled mobility is intended as a new design dimension network allowing to drive nodes to specific best position in order to achieve some common objectives. The main aim of this paper is to show by simulation the effectiveness of controlled mobility when it is used as a new design dimension in wireless networks. Extensive simulations are conducted to evaluate the proposed routing algorithm. Results show how our protocol outperforms a well-known routing protocol, the Ad hoc On Demand Distance Vector routing (AODV, in terms of throughput, average end-to-end data packet delay and energy spent to send a packet unit.

  7. Adaptive Congestion Control Protocol (ACCP for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    James DzisiGadze

    2013-10-01

    Full Text Available In Wireless Sensor Networks (WSN when an event is detected there is an increase in data traffic that mightlead to packets being transmitted through the network close to the packet handling capacity of the WSN.The WSN experiences a decrease in network performance due to packet loss, long delays, and reduction inthroughput. In this paper we developed an adaptive congestion control algorithm that monitors networkutilization and adjust traffic levels and/or increases network resources to improve throughput and conserveenergy. The traffic congestion control protocol DelStatic is developed by introducing backpressuremechanism into NOAH. We analyzed various routing protocols and established that DSR has a higherresource congestion control capability. The proposed protocol, ACCP uses a sink switching algorithm totrigger DelStatic or DSR feedback to a congested node based on its Node Rank. From the simulationresults, ACCP protocol does not only improve throughput but also conserves energy which is critical tosensor application survivability on the field. Our Adaptive Congestion control achieved reliability, highthroughput and energy efficiency.

  8. Control room envelope unfiltered air inleakage test protocols

    Energy Technology Data Exchange (ETDEWEB)

    Lagus, P.L. [Lagus Applied Technology, San Diego, CA (United States); Grot, R.A. [Lagus Applied Technology, Olney, MD (United States)

    1997-08-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs.

  9. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    Directory of Open Access Journals (Sweden)

    Mang Su

    2014-01-01

    Full Text Available This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  10. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  11. External access to ALICE controls conditions data

    Science.gov (United States)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  12. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  13. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  14. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  15. MULTIPLE ELECTRONIC CONTROL UNITS CALIBRATION SYSTEM BASED ON EXPLICIT CALIBRATION PROTOCOL AND J1939 PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    YANG Shiwei; ZHU Keqing; XU Quankui; YANG Lin; ZHUO Bin

    2008-01-01

    The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP , with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs.

  16. Explicit window-based transport control protocols in lossy environments

    OpenAIRE

    de Vleeschouwer, C.; Frossard, P.

    2004-01-01

    This paper addresses efficient packet loss recovery by retransmission in window-based congestion control protocols. It builds on explicit congestion control mechanisms to decouple the packet loss detection from the congestion feedback signals. Implicit algorithms alternatively infer congestion from losses (which yields to window size reduction), and therefore do not allow to evaluate the performance of window-based transmission algorithms in lossy environments. We first propose a simple modif...

  17. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  18. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com- plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an im......Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com- plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged...

  19. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  20. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  1. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  2. A cross-layer scheme for medium access control with QoS guaranteeing for Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2006-01-01

    Ample medium access control (MAC) protocols for Ad hoc networks have been proposed. However, most of them do not take into account the interactions between the physical (PHY) layer and the MAC layers. Therefore, their efficiency and feasibility are greatly limited. In this article, we present a novel MAC protocol for Ad hoc networks according to the idea of cross-layer design. The proposed protocol combines an MAC protocol termed dual busy tone multiple access (DBTMA) with Orthogonal frequency division multiplexing (OFDM) system in IEEE 802.11a standard. The analysis showed that the proposed protocol provides higher throughput and is more flexible than previous MAC protocols. In addition, it can provide Quality of Service(QoS) guarantee to the packets with different delay requirements in the presence of hidden terminals.

  3. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area...

  4. Formats and Network Protocols for Browser Access to 2D Raster Data

    Science.gov (United States)

    Plesea, L.

    2015-12-01

    Tiled web maps in browsers are a major success story, forming the foundation of many current web applications. Enabling tiled data access is the next logical step, and is likely to meet with similar success. Many ad-hoc approaches have already started to appear, and something similar is explored within the Open Geospatial Consortium. One of the main obstacles in making browser data access a reality is the lack of a well-known data format. This obstacle also represents an opportunity to analyze the requirements and possible candidates, applying lessons learned from web tiled image services and protocols. Similar to the image counterpart, a web tile raster data format needs to have good intrinsic compression and be able to handle high byte count data types including floating point. An overview of a possible solution to the format problem, a 2D data raster compression algorithm called Limited Error Raster Compression (LERC) will be presented. In addition to the format, best practices for high request rate HTTP services also need to be followed. In particular, content delivery network (CDN) caching suitability needs to be part of any design, not an after-thought. Last but not least, HTML 5 browsers will certainly be part of any solution since they provide improved access to binary data, as well as more powerful ways to view and interact with the data in the browser. In a simple but relevant application, digital elevation model (DEM) raster data is served as LERC compressed data tiles which are used to generate terrain by a HTML5 scene viewer.

  5. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    Science.gov (United States)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  6. Cryptanalysis on Cheng et al. protocol

    Science.gov (United States)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  7. Burstiness-Aware Congestion Control Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Liang Lulu; Gao Deyun; Qin Yajuan; Zhang Hongke

    2011-01-01

    In monitoring Wireless Sensor Networks (WSNs),the traffic usually has bursty characteristics when an event occurs.Transient congestion would increase delay and packet loss rate severely,which greatly reduces network performance.To solve this problem,we propose a Burstiness-aware Congestion.Control Protocol (BCCP) for wireless sensor networks.In BCCP,the backoff delay is adopted as a congestion indication.Normally,sensor nodes work on contention-based MAC protocol (such as CSMA/CA).However,when congestion occurs,localized TDMA instead of CSMA/CA is embedded into the nodes around the congestion area.Thus,the congestion nodes only deliver their data during their assigned slots to alleviate the contention-caused congestion.Finally,we implement BCCP in our sensor network testbed.The experiment results show that BCCP could detect area congestion in time,and improve the network performance significantly in terms of delay and packet loss rate.

  8. Microcontroller Protocol for Secure Broadcast in Controller Area Networks

    Directory of Open Access Journals (Sweden)

    B.Vijayalakshmi

    2014-04-01

    Full Text Available Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks. To withstand such threats, one can implement security in the application layer of CAN. Here we design, refine and implement a broadcast authentication protocol based on the well known paradigm of using key-chains and time synchronization, a commonly used Mechanism in wireless sensor networks, which allows us to take advantage from the use of symmetric primitives without the need of secret shared keys during broadcast. But, as process control is a time critical operation we make several refinements in order to improve on the authentication delay. For this we study several trade-offs to alleviate shortcomings on computational speed, memory and bandwidth up to the point of using reduced versions of hash functions that can assure ad hoc security. To prove the efficiency of the protocol

  9. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.;

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  10. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  11. Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks

    Directory of Open Access Journals (Sweden)

    Francisco Vázquez-Gallego

    2015-01-01

    Full Text Available Machine-to-Machine (M2M area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC protocols which are based on a tree-splitting algorithm to resolve collisions among devices: the Contention Tree Algorithm (CTA and the Distributed Queuing (DQ access. We have carried out computer-based simulations to validate the accuracy of the theoretical models and to compare the energy performance using DQ, CTA, and Frame Slotted-ALOHA (FSA in M2M area networks with devices in compliance with the IEEE 802.15.4 physical layer. Results show that the performance of DQ is totally independent of the number of contending devices, and it can reduce the energy consumed per device in more than 35% with respect to CTA and in more than 80% with respect to FSA.

  12. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.;

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  13. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani;

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  14. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  15. Practical Physiological Monitoring Protocol for Heat Strain Control

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, R B; Johnson, J S; Burastero, S R; Gilmore, O

    2003-07-01

    This protocol is indicated when employees are: (1) Exposed to Heat Stress above the TLV; (2) Performing low to moderate work rates with rare excursions to heavy rates; NOT for heavy and very heavy work rates or requiring peak outputs for extended periods; and, (3) Determined to need physiological heat strain monitoring by the cognizant Industrial Hygienist. The requirements are: (1) A work/rest regimen must be established at outset and adjusted as needed during operations (see Appendix A); (2) On-going data collection and review; (3) Rest times must be increased if indicated; (4) Intended for normal, healthy adults. Seasonal medical screening is recommended; and (5) Training for affected employees regarding this protocol, hydration, self-limitation, lifestyle effects and signs, symptoms and treatment of heat related illnesses. This protocol is to aid industrial hygienists in assessing individual physiological response to employee heat exposures, and provides guidance to identify and reduce heat strain as needed. Physiological monitoring is recommended when heat exposure exceeds the TLV by {ge} 2 C and/or when evaporative cooling is limited or eliminated. Typically, this occurs when the use of personal protective equipment includes impermeable or water vapor restrictive outer garments. This protocol is used to identify when heat strain may be excessive. This is determined through measurements taken during each rest period. If decision criteria are exceeded, changes in work practices shall be implemented immediately to reduce employee heat strain and prevent heat related illnesses up to and including heat stroke, a life threatening condition. This protocol may not be appropriate under all conditions. Sound Industrial Hygiene professional judgment is required. Because the measurements for this protocol occur during the rest phase of the work/rest regimen, the conditions affecting employee heat strain during the work phase must be carefully weighed. Work rate

  16. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  17. Evolution of the Data Access Protocol in Response to Community Needs

    Science.gov (United States)

    Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.

    2012-12-01

    Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that

  18. Design and Implementation of a Web-based Monitoring System by using EPICS Channel Access Protocol

    International Nuclear Information System (INIS)

    Proton Engineering Frontier Project (PEFP) has developed a 20MeV proton accelerator, and established a distributed control system based on EPICS for sub-system components such as vacuum unit, beam diagnostics, and power supply system. The control system includes a real-time monitoring and alarm functions. From the aspect of a efficient maintenance of a control system and a additional extension of subsystems, EPICS software framework was adopted. In addition, a control system should be capable of providing an easy access for users and a real-time monitoring on a user screen. Therefore, we have implemented a new web-based monitoring server with several libraries. By adding DB module, the new IOC web monitoring system makes it possible to monitor the system through the web. By integrating EPICS Channel Access (CA) and Database libraries into a Database module, the web-based monitoring system makes it possible to monitor the sub-system status through user's internet browser. In this study, we developed a web based monitoring system by using EPICS IOC (Input Output Controller) with IBM server

  19. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  20. Verifying Resource Access Control on Mobile Interactive Devices

    OpenAIRE

    Besson, Frédéric; Dufay, Guillaume; Jensen, Thomas; Pichardie, David

    2010-01-01

    A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operation...

  1. Accession of Pakistan to the 1951 Convention and 1967 Protocol relating to the Status of Refugees: 'Signing on could make all the difference’

    NARCIS (Netherlands)

    M.Y.A. Zieck

    2010-01-01

    One of the means UNHCR uses to attract accessions is a brochure entitled: "The 1951 Convention relating to the Status of Refugees and its 1967 Protocol. Signing on Could Make All the Difference". Accession to the 1951 Convention and its 1967 Protocol would indeed make a difference, but not just the

  2. Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation

    CERN Document Server

    Shen, Charles; Nahum, Erich

    2008-01-01

    A Session Initiation Protocol (SIP) server may be overloaded by emergency-induced call volume, ``American Idol'' style flash crowd effects or denial of service attacks. The SIP server overload problem is interesting especially because the costs of serving or rejecting a SIP session can be similar. For this reason, the built-in SIP overload control mechanism based on generating rejection messages cannot prevent the server from entering congestion collapse under heavy load. The SIP overload problem calls for a pushback control solution in which the potentially overloaded receiving server may notify its upstream sending servers to have them send only the amount of load within the receiving server's processing capacity. The pushback framework can be achieved by either a rate-based feedback or a window-based feedback. The centerpiece of the feedback mechanism is the algorithm used to generate load regulation information. We propose three new window-based feedback algorithms and evaluate them together with two exis...

  3. A field exercise course to train IAEA Safeguards inspectors in implementing the additional protocol and performing complementary access activities

    International Nuclear Information System (INIS)

    The International Atomic Energy Agency (IAEA) Department of Safeguards has the task of implementing the Additional Protocol (AP) in the Member States that have signed agreements bringing that treaty into force. The IAEA inspector under the traditional INFCIRC/153 safeguards has been an accountant focused on the declared nuclear material stores of a Member State. The INFCIRC/540 Strengthened Safeguards System (SSS) provides the Agency and its inspectors with the right to investigate a Member State's nuclear programme to see if all declared activities are in order and no undeclared activities exist. This broadening of the scope of the inspector's responsibilities has changed the training of the inspectors to orient them to being an investigator compared to an accountant. The Safeguards training department has created a curriculum of courses that provides the background to train the inspectorate into this new inspection regime. The United States Support Program (USSP) has contributed to this curriculum by putting together a course at Brookhaven National Laboratory (BNL) in Additional Protocol Complementary Access (APCA) to give the IAEA the opportunity to provide inspectors a necessary field exercise in a realistic environment at a research site. Brookhaven National Laboratory contains three shutdown nuclear research reactors, operating particle accelerators, hot cells, radioactive waste storage, laser laboratories, and magnet production facilities on a large site very similar to numerous research facilities around the world situated in non-nuclear weapon states (NNWS). The USSP Team created an Article 2 declaration containing annotated maps of the site, descriptions of the buildings on site, satellite and aerial photographs of the area, and a declaration of research activities on the site. The declaration is as realistic to actual BNL research except that proprietary and security concerns of the BNL site have been taken into account. The USSP Team felt the best

  4. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  5. A Formal Model of Access Control for Mobile Interactive Devices

    OpenAIRE

    Besson, Frédéric; Dufay, Guillaume; Jensen, Thomas

    2006-01-01

    This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Javaenabled mobile telephones. We consider access control permissions with multiplicities in order to allow to use a permission a certain number of times. An operational semantics of the model and a formal definition of what it means for...

  6. Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access

    NARCIS (Netherlands)

    Pawelczak, P.; Pollin, S.; So, H.-S.W.; Bahai, A.R.S.; Prasad, R.V.; Hekmat, R.

    2009-01-01

    In this paper, different control channel (CC) implementations for multichannel medium access control (MAC) algorithms are compared and analyzed in the context of opportunistic spectrum access (OSA) as a function of spectrum-sensing performance and licensed user activity. The analysis is based on a d

  7. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  8. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  9. Law-Aware Access Control and its Information Model

    CERN Document Server

    Stieghahn, Michael

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  10. Estimation of Medium Access Control Layer Packet Delay Distribution for IEEE 802.11

    Directory of Open Access Journals (Sweden)

    Hatm Alkadeki

    2013-12-01

    Full Text Available The most important standard in wireless local area networks is IEEE 802.11. This is why much of the research work for the enhancement of wireless network is usually based on the behavior of IEEE 802.11 protocol. However, some of the ways in which IEEE 802.11 medium access control layer behaves is still unreliable to guarantee quality of service. For instance , medium access control layer packet delay, jitter and packet loss rate still remain a challenge. The main objective of this research is to propose an accurate estimation of the medium access control layer packet delay distribution for IEEE 802.11. This estimation considers the differences between busy probability and collision probability. These differences are employed to achieve a mo re accurate estimation. Finally, the proposed model and simulation are implemented and validated - using MATLAB program for the purpose of simulation, and Maple program to undertake the calculation of the equations.

  11. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  12. A Quantitative Evaluation Method of Satellite Network Control Protocol based on Multi-attribute Utility Theory

    Directory of Open Access Journals (Sweden)

    Zhu Jun

    2016-01-01

    Full Text Available Satellite network control protocol plays an important part in satellite communication system. Different design schemes of protocol have very different protocol attribute values. It is difficult to select a proper protocol solution from many solution alternatives with quite different protocol attributes, especially some mutual conflicted protocol attributes. Thereupon, this paper provides a multi-attribute utility theory based quantitative method to evaluate these protocol design schemes, in order to make a wise decision on how to select protocol solution. This method introduces several critical protocol attributes by utilizing a Petri net model, and aggregates them into a decision making matrix. On the basis of multi-attribute utility theory, quantitative evaluation values are achieved with the support of user attribute preference weight vectors. In the end, the paper presents experiments and discussions.

  13. A Power-Efficient Access Point Operation for Infrastructure Basic Service Set in IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Hua Ye Ming

    2006-01-01

    Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.

  14. Privacy Enhanced Access Control by Means of Policy Blinding

    NARCIS (Netherlands)

    Sedghi, Saeed; Hartel, Pieter; Jonker, Willem; Nikova, Svetla; Bao, Feng; Weng, Jian

    2011-01-01

    Traditional techniques of enforcing an access control policy rely on an honest reference monitor to enforce the policy. However, for applications where the resources are sensitive, the access control policy might also be sensitive. As a result, an honest-but-curious reference monitor would glean som

  15. Dynamic User Role Assignment in Remote Access Control

    NARCIS (Netherlands)

    Saffarian, Mohsen; Tang, Qiang; Jonker, Willem; Hartel, Pieter

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  16. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  17. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  18. A Model of Workflow-oriented Attributed Based Access Control

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2011-02-01

    Full Text Available the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC, and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  19. Design and Implementation of Embedded Transmission Control Protocol/Internet Protocol Network Based on System-on-programmable Chip

    Institute of Scientific and Technical Information of China (English)

    LUO Yong; HAN Xiao-jun

    2008-01-01

    A scheme of transmission control protocol/Internet protocol(TCP/IP) network system based on system-on-programmable chip(SOPC) is proposed for the embedded network communication. In this system, Nios processor, Ethernet controller and other peripheral logic circuits are all integrated on a Stratix Ⅱ field programmable gate array(FPGA) chip by using SOPC builder design software. And the network communication is realized by transplanting MicroC/OS Ⅱ(μC/OS Ⅱ) operation system and light weight Internet protocol(LwIP). The design idea, key points and the structures of both software and hardware of the system are presented and ran with a telecommunication example. The experiment shows that the embedded TCP/IP network system has high reliability and real-time performance.

  20. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-03-01

    Telecare Medical Information System (TMIS) makes an efficient and convenient connection between patient(s)/user(s) at home and doctor(s) at a clinical center. To ensure secure connection between the two entities (patient(s)/user(s), doctor(s)), user authentication is enormously important for the medical server. In this regard, many authentication protocols have been proposed in the literature only for accessing single medical server. In order to fix the drawbacks of the single medical server, we have primarily developed a novel architecture for accessing several medical services of the multi-medical server, where a user can directly communicate with the doctor of the medical server securely. Thereafter, we have developed a smart card based user authentication and key agreement security protocol usable for TMIS system using cryptographic one-way hash function. We have analyzed the security of our proposed authentication scheme through both formal and informal security analysis. Furthermore, we have simulated the proposed scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and showed that the scheme is secure against the replay and man-in-the-middle attacks. The informal security analysis is also presented which confirms that the protocol has well security protection on the relevant security attacks. The security and performance comparison analysis confirm that the proposed protocol not only provides security protection on the above mentioned attacks, but it also achieves better complexities along with efficient login and password change phase. PMID:25681100

  1. Distributed Access Control Policies for Spectrum Sharing

    OpenAIRE

    Baldini, Gianmarco; NAI-FOVINO Igor; Trombetta, Alberto; Braghin, Stefano

    2012-01-01

    Cognitive Radio (CR) is a novel wireless communication technology that allows for adaptive configuration of the reception parameters of a terminal, based on the information collected from the environment. Cognitive radio (CR) technology can be used in innovative spectrum management approaches like spectrum sharing, where radio frequency spectral bands can be shared among various users through a dynamic exclusive-use spectrum access model. Spectrum sharing can be applied to various...

  2. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  3. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  4. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  5. A new access control system by fingerprint for radioisotope facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  6. Access control management for e-Healthcare in cloud environment

    Directory of Open Access Journals (Sweden)

    Lili Sun

    2014-03-01

    Full Text Available Data outsourcing is a major component for cloud computing that allows data owners to distribute resources to external services for users and organizations who can apply the resources. A crucial problem for owners is how to make sure their sensitive information accessed by legitimate users only using the trusted services but not authorized to read the actual information. With the increased development of cloud computing, it brings challenges for data security and access control when outsourcing users’ data and sharing sensitive data in cloud environment since it is not within the same trusted domain as data owners’. Access control policies have become an important issue in the security filed in cloud computing. Semantic web technologies represent much richer forms of relationships among users, resources and actions among different web applications such as clouding computing. However, Semantic web applications pose new requirements for security mechanisms especially in the access control models. This paper addresses existing access control methods and presents a semantic based access control model which considers semantic relations among different entities in cloud computing environment. We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system. This work shows how the semantic web technology provides efficient solutions for the management of complex and distributed data in heterogeneous systems, and it can be used in the medical information systems as well.

  7. A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Adib M. Monzer Habbal

    2013-01-01

    Full Text Available Transmission Control Protocol (TCP is a fundamental protocol in the TCP/IP Protocol Suite.TCP was well designed and optimized to work over wired networks where most packet loss occurs due to network congestion. In theory, TCP should not care whether it is running over wired networks, WLANs, or Mobile Ad hoc Networks (MANETs. In practice, it does matter because most TCP deployments have been carefully designed based on the assumption that congestion is the main factor of network instability. However, MANETs have other dominating factors that cause network instability. Forgetting the impact of these factors violates some design principles of TCP congestion control and open questions for future research to address. This study aims to introduce a model that shows the impact of MANET factors on TCP congestion control. To achieve this aim, Design Research Methodology (DRM proposed by BLESSING was used as a guide to present this model. The proposed model describes the existing situation of TCP congestion control. Furthermore, it points to the factors that are most suitable to be addressed by researchers in order to improve TCP performance. This research proposes a novel model to present the impact of MANET factors on TCP congestion control. The model is expected to serve as a benchmark for any intended improvement and enhancement of TCP congestion control over MANET.

  8. The Economics of Information, Studiously Ignored in the Nagoya Protocol on Access to Genetic Resources and Benefit Sharing

    Directory of Open Access Journals (Sweden)

    Joseph Henry Vogel et. al.

    2011-06-01

    Full Text Available The economics of information has been studiously ignored in the ten Conferences of the Parties to the Convention on Biological Diversity. Nevertheless, an academic literature exists which recognises genetic resources and associated traditional knowledge as natural and artificial information. Its unambiguous prescriptions would widen the scope of the Nagoya Protocol on Access to Genetic Resources and Benefit Sharing (ABS and resolve almost all of the contentious issues identified by Kamau et al. One begins with retroactivity: because biological resources exhibit tangible and intangible aspects, the latter can be conceptualised as a set of natural information where value currently added in a patent is access to a subset not previously accessed. The economics quickly leads to a justification for a biodiversity cartel among countries of origin, wholly analogous to monopoly intellectual property rights. To achieve such a sea change in policymaking, the justification must be accompanied by a narrative that can penetrate the social sphere, much as Trade Related Intellectual Property Rights achieved through the World Intellectual Property Organisation. Several examples of bio-discoveries drawn from a popular medium are analysed in terms of the contentious issues of the Protocol and the distinct ABS that would eventuate under cartelisation. History also offers an analogy. The Parties’ eighteen years of resistance (1993-2011 to applying the economics of information to genetic resources is reminiscent to the twenty-seven years that the British Parliament rebuffed David Ricardo’s economic analysis of the Corn Laws (1815-1842.

  9. C-LOAD POWER CONTROL PROTOCOL-CROSS-LAYER DESIGN OF A NETWORK LAYER LOAD POWER CONTROL PROTOCOL IN WIRELESS AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    A. Arivoli

    2014-01-01

    Full Text Available In wireless ad hoc network scenario, Cross-layer design is emerging, important in wireless ad hoc network and the power control methods. Power control is the intelligent selection of transmit power in a communication to achieve the better performance within the system. Cross-layer is used to sharing the information between the layers. Physical to Transport layer information are shared in this protocol, due to this cross-layering is designed to optimize the power control. CLD using LOADPOWER (LOADPOW control protocol is reduce the overall end-end delay and the energy consumption using transmission power. The novelty of this work deals with both low and high transmission power control methodologies. So many power control schemes are dealt in MAC layer but this work, Power control protocol was done in network layer and it plays a vital role. A MAC approach to power control only does a local optimization whereas network layer is capable of global optimization. Simulation was done in NS-2 simulator with the performance metrics as improved throughput, energy consumption and end-end delay. The key concept is to improve the throughput, saves energy by sending all the packets with optimal transmission power according to the network load. A comparison of few protocols with Load Power Control Protocol (LPCP was implemented and got the better performances using NS-2 simulator.

  10. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  11. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  12. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  13. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  14. Modeling Access Control Policy of a Social Network

    Directory of Open Access Journals (Sweden)

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  15. Access to finance for community forest management under the UNFCCC and Kyoto Protocol

    OpenAIRE

    Skutsch, Margaret

    2002-01-01

    A previous article in ETFRN News reviewed the potential for funding for forestry under international climate agreements, particularly under the Kyoto Protocol (Skutsch, 2000). Since then, further negotiations have taken place and this article aims at giving an overview of the current situation.

  16. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  17. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Energy Technology Data Exchange (ETDEWEB)

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  18. PMT Dark Noise Monitoring System for Neutrino Detector Borexino Based on the Devicenet Protocol and WEB-Access

    International Nuclear Information System (INIS)

    Monitoring of PMT dark noise in a neutrino detector BOREXINO is a procedure that indicates condition of the detector. Based on CAN industrial network, top level DeviceNet protocol and WEB visualization, the dark noise monitoring system having 256 channels for the internal detector and for the external muon veto was created. The system is composed as a set of controllers, converting the PMT signals to frequency and transmitting them over Can network. The software is the stack of the DeviceNet protocols, providing the data collecting and transporting. Server-side scripts build web pages of user interface and graphical visualization of data

  19. Software application for quality control protocol of mammography systems

    International Nuclear Information System (INIS)

    Considering the fact that the Quality Control of the technological process of the mammographic system involves testing of a large number of parameters, it is clearly evident that there is a need for using the information technology for gathering, processing and storing of all the parameters that are result of this process. The main goal of this software application is facilitation and automation of the gathering, processing, storing and presenting process of the data related to the qualification of the physical and technical parameters during the quality control of the technological process of the mammographic system. The software application along with its user interface and database has been made with the Microsoft Access 2003 application which is part of the Microsoft Office 2003 software packet and has been chosen as a platform for developing because it is the most commonly used office application today among the computer users in the country. This is important because it will provide the end users a familiar environment to work in, without the need for additional training and improving the computer skills that they posses. Most importantly, the software application is easy to use, fast in calculating the parameters needed and it is an excellent way to store and display the results. There is a possibility for up scaling this software solution so it can be used by many different users at the same time over the Internet. It is highly recommended that this system is implemented as soon as possible in the quality control process of the mammographic systems due to its many advantages.(Author)

  20. Implementing ‘Mutually Supportive’ Access and Benefit Sharing Mechanisms Under the Plant Treaty, Convention on Biological Diversity, and Nagoya Protocol

    Directory of Open Access Journals (Sweden)

    Michael Halewood et. al.

    2013-06-01

    Full Text Available The International Treaty on Plant Genetic Resources for Food and Agriculture (ITPGRFA and the Convention on Biological Diversity (CBD commit their member states to implement very different access and benefit-sharing systems: one system, under the ITPGRFA, is designed to encourage international pooling and sharing of genetic diversity; the other system, under the CBD, is designed to maximise each country’s sovereign control over their genetic resources. Progress in domestic implementation of both systems has been relatively slow. One factor contributing to delays is that policy makers in many countries are uncertain about how to address the interface between these two access and benefit-sharing systems. Based on research and policy development experiences in several countries, the authors first identify the issues national policy-makers need to address, and the steps they need to follow, to implement the multilateral system of access and benefit sharing under the ITPGRFA. Second, the authors analyse the points of intersection, at the national level, between the ITPGRFA’s multilateral system and access and benefit-sharing, and mechanisms developed (or being developed pursuant to the Convention on Biological Diversity and its recently adopted Nagoya Protocol. Third, the authors analyse factors that are contributing to the lack of coordination, in many countries, between the national public environment and agriculture agencies that have mandates to lead national implementation of these international agreements.

  1. A United Access Control Model for Systems in Collaborative Commerce

    OpenAIRE

    Ruo-Fei Han; Hou-Xiang Wang; Qian Xiao; Xiao-Pei Jing; Hui Li

    2009-01-01

    The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management...

  2. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Bruce Ndibanje

    2014-08-01

    Full Text Available Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. According to our analysis, Jing et al.’s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  3. Advancing Migrant Access to Health Services in Europe (AMASE): Protocol for a Cross-sectional Study

    OpenAIRE

    Fakoya, I; Álvarez-Del Arco, D.; Monge, S; Copas, A J; Gennotte, A. F.; Volny-Anne, A.; Göpel, S.; Touloumi, G.; Prins, M; Barros, H; Staehelin, C.; del Amo, J.; Burns, F. M.

    2016-01-01

    BACKGROUND: Migrants form a substantial proportion of the population affected by the human immunodeficiency virus (HIV) epidemic in Europe, yet HIV prevention for this population is hindered by poor understanding of access to care and of postmigration transmission dynamics. OBJECTIVE: We present the design and methods of the advancing Migrant Access to health Services in Europe (aMASE) study, the first European cross-cultural study focused on multiple migrant populations. It aims to identify ...

  4. A Random Access Protocol for Pilot Allocation in Crowded Massive MIMO Systems

    OpenAIRE

    Björnson, Emil; de Carvalho, Elisabeth; Sørensen, Jesper H.; Larsson, Erik G.; Popovski, Petar

    2016-01-01

    The Massive MIMO (multiple-input multiple-output) technology has a great potential to manage the rapid growth of wireless data traffic. Massive MIMO achieve tremendous spectral efficiency by spatial multiplexing of many tens of user equipments (UEs). These gains are only achieved in practice if many more UEs can connect efficiently to the network than today. As the number of UEs increases, while each UE intermittently accesses the network, the random access functionality becomes essential to ...

  5. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  6. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  7. Optimal Medium Access Control in Cognitive Radios: A Sequential Design Approach

    CERN Document Server

    Lai, Lifeng; Jiang, Hai; Poor, H Vincent

    2008-01-01

    The design of medium access control protocols for a cognitive user wishing to opportunistically exploit frequency bands within parts of the radio spectrum having multiple bands is considered. In the scenario under consideration, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring the availability of channels and exploiting the opportunities identified thus far. Using a sequential design approach, an optimal medium access strategy is derived. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is also developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels.

  8. Remote device access in the new accelerator controls middleware

    CERN Document Server

    Baggiolini, V; Jensen, S; Kostro, K; Risso, A; Trofimov, N N; SL

    2001-01-01

    This paper presents the Remote Device Access (RDA) package developed at CERN in the framework of the joint PS/SL Controls Middleware project. The package design reflects the Accelerator Device Model in which devices, named entities in the control system, can be controlled via properties. RDA implements this model in a distributed environment with devices residing in servers that can run anywhere in the controls network. It provides a location-independent and reliable access to the devices from control programs. By invoking the device access methods, clients can read, write and subscribe to device property values. We describe the architecture and design of RDA its API, and CORBA-based implementations in Java and C++. First applications of RDA in the CERN accelerator control systems are described as well.

  9. Testing the activitystat hypothesis: a randomised controlled trial protocol

    Directory of Open Access Journals (Sweden)

    Gomersall Sjaan

    2012-10-01

    Full Text Available Abstract Background The activitystat hypothesis proposes that when physical activity or energy expenditure is increased or decreased in one domain, there will be a compensatory change in another domain to maintain an overall, stable level of physical activity or energy expenditure. To date, there has been no experimental study primarily designed to test the activitystat hypothesis in adults. The aim of this trial is to determine the effect of two different imposed exercise loads on total daily energy expenditure and physical activity levels. Methods This study will be a randomised, multi-arm, parallel controlled trial. Insufficiently active adults (as determined by the Active Australia survey aged 18–60 years old will be recruited for this study (n=146. Participants must also satisfy the Sports Medicine Australia Pre-Exercise Screening System and must weigh less than 150 kg. Participants will be randomly assigned to one of three groups using a computer-generated allocation sequence. Participants in the Moderate exercise group will receive an additional 150 minutes of moderate to vigorous physical activity per week for six weeks, and those in the Extensive exercise group will receive an additional 300 minutes of moderate to vigorous physical activity per week for six weeks. Exercise targets will be accumulated through both group and individual exercise sessions monitored by heart rate telemetry. Control participants will not be given any instructions regarding lifestyle. The primary outcome measures are activity energy expenditure (doubly labeled water and physical activity (accelerometry. Secondary measures will include resting metabolic rate via indirect calorimetry, use of time, maximal oxygen consumption and several anthropometric and physiological measures. Outcome measures will be conducted at baseline (zero weeks, mid- and end-intervention (three and six weeks with three (12 weeks and six month (24 week follow-up. All assessors will be

  10. Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

    Directory of Open Access Journals (Sweden)

    Taha A.A Radaei

    2009-01-01

    Full Text Available Problem statement: In only a few years, Multi-Protocol Label Switching (MPLS has evolved from an exotic technology to a mainstream tool used by service providers to create revenue-generating services. MPLS provides a high reliable Label Switched Path (LSP. MPLS failures may degrade the reliability of the MPLS networks. Approach: For that reason, many studies have been conducted to keep the high reliability and survivability of the MPLS networks. Unlike User Datagram Protocol (UDP, Transmission Control Protocol does not perform well in case of like-failure of MPLS networks because of its inability to distinguish packet loss due to link-failure. After the recovery time, TCP takes longer time than UDP to continue as it was before the failure. Results: In terms of packet loss, TCP performs better than UDP. However, the receiving rate of the TCP traffic is much worse than UDP traffic. A need for a mechanism to improve the behavior of TCP after a link failure is needed. This study focused on comparing the behavior of different types TCP as well as UDP traffic over MPLS networks in case of link, node or congestion failures. Conclusion: Although extensions of RSVP-TE protocol support fast recovery mechanism of MPLS networks, the behavior of TCP will be affected during recovery time much more than with UDP.

  11. OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITYBASED ENCRYPTION WITH ANONYMOUS KEY ISSUING

    Institute of Scientific and Technical Information of China (English)

    Xu Lingling; Zhang Fangguo; Wen Yamin

    2011-01-01

    In ACM'CCS 2009,Camenisch,et al.proposed the Obhvious Transfer with Access Control (AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the simplified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption (IBE) with Anonymous Key Issuing (AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.

  12. Improvement The Transmission Efficiency For Wireless Packet Communication Systems Using Automatic Control for power And Time Slot Width Of Slotted Non persistent ISMA Protocol

    Directory of Open Access Journals (Sweden)

    Saad M. Hardan

    2013-05-01

    Full Text Available In packed communication systems which use a protocol, the protocol should perform the allocation of channels such that the transmission channel is used efficiently. Efficiency is usually measured in terms of channel throughput and the average transmission  delay. The Slotted Nonpersistent ISMA protocol is one of random access protocols used in packed communication systems. In this research a Slotted Nonpersistent ISMA protocol Model with automatic control for power and time slot is proposed. the suggested algorithm enable the base station(access point to control  the protocol time slot length and  transmission power in a dynamic way to control the normalized propagation delay d and to maintain all the uplink signals in the limit of captured power threshold (capture ratio in order to control the  throughput and the average transmission delay of the communication system by an automatic method. the computer simulation results  confirm the activity of the  proposed algorithm for increasing the  throughput and decreasing the average transmission delay by an accepted ratios.

  13. Face recognition in controlled access points

    OpenAIRE

    Mur Escartín, Olga

    2009-01-01

    The thesis consist in the study and evaluation of different methods for face recognition. The final objective is to select the most suitable techniques for face detection and recognition. Some of these techniques will be intergrated in a real time demontrator which will be a preliminary prototype that will have to work in controlled conditions (for ilumination and pose) and with reduced databases. The demonstrator will be done in Matlab and the main image acquisition rotines and face detectio...

  14. Secure Remote Access Issues in a Control Center Environment

    Science.gov (United States)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  15. A United Access Control Model for Systems in Collaborative Commerce

    Directory of Open Access Journals (Sweden)

    Ruo-Fei Han

    2009-06-01

    Full Text Available The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management of internal functions is of the same importance as external service management. It is very troublesome to control authorizations merely with attributes and composition of policies introduced from attribute-based access control (ABAC. So, we introduce a united access control model for systems in collaborative commerce, combining the advantages of conventional role-based access control (RBAC, task-based authentication control (TBAC and that of recent ABAC and automated trust negotiation (ATN. Innovational ideas in the model are analyzed, and the implement architecture is discussed. The paper concludes with a summary of the united model’s benefits and future work.

  16. Analysis of Multi-Channel and Slotted Random Multi-Access Protocol with Two-Dimensional Probability for Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ningyu; ZHAO Dongfeng; DING Hongwei

    2008-01-01

    A higher quality of service (QoS) is provided for ad hoc networks through a multi-channel and slotted random multi-access (MSRM) protocol with two-dimensional probability. For this protocol, the system time is slotted into a time slot with high channel utilization realized by the choice of two parameters p1 and p2, and the channel load equilibrium. The protocol analyzes the throughput of the MSRM protocol for a load equilibrium state and the throughput based on priority. Simulations agree with the theoretical analysis. The simulations also show that the slotted-time system is better than the continuous-time system.

  17. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  18. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  19. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir;

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated b...... subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems.......The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated...... by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system...

  20. A Multi-Domain Access Control Infrastructure Based on Diameter and EAP

    Science.gov (United States)

    Ben Ayed, Souheil; Teraoka, Fumio

    The evolution of Internet, the growth of Internet users and the new enabled technological capabilities place new requirements to form the Future Internet. Many features improvements and challenges were imposed to build a better Internet, including securing roaming of data and services over multiple administrative domains. In this research, we propose a multi-domain access control infrastructure to authenticate and authorize roaming users through the use of the Diameter protocol and EAP. The Diameter Protocol is a AAA protocol that solves the problems of previous AAA protocols such as RADIUS. The Diameter EAP Application is one of Diameter applications that extends the Diameter Base Protocol to support authentication using EAP. The contributions in this paper are: 1) first implementation of Diameter EAP Application, called DiamEAP, capable of practical authentication and authorization services in a multi-domain environment, 2) extensibility design capable of adding any new EAP methods, as loadable plugins, without modifying the main part, and 3) provision of EAP-TLS plugin as one of the most secure EAP methods. DiamEAP Server basic performances were evaluated and tested in a real multi-domain environment where 200 users attempted to access network using the EAP-TLS method during an event of 4 days. As evaluation results, the processing time of DiamEAP using the EAP-TLS plugin for authentication of 10 requests is about 20ms while that for 400 requests/second is about 1.9 second. Evaluation and operation results show that DiamEAP is scalable and stable with the ability to handle more than 6 hundreds of authentication requests per second without any crashes. DiamEAP is supported by the AAA working group of the WIDE Project.

  1. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  2. Public information: control, secret and right of access

    OpenAIRE

    Carmem Lúcia Batista

    2012-01-01

    Recently, in November 2011, it was published the law on access to public information, legal and historic mark in the struggle for human rights in Brazil. This achievement is the result of a process marked by denial of access to public archives, as it was the case of the Araguaia Guerrilla, valuing the culture of secrecy, abuse of power and relations between public and private in Brazil. Thus, the aim of this paper is to present a brief history about the control of access to public information...

  3. User Behavior Trust Based Cloud Computing Access Control Model

    OpenAIRE

    Jiangcheng, Qin

    2016-01-01

    Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud...

  4. Open Platform Strategies and Innovation: Granting Access vs. Devolving Control

    OpenAIRE

    Kevin Boudreau

    2010-01-01

    This paper studies two fundamentally distinct approaches to opening a technology platform and their different impacts on innovation. One approach is to grant access to a platform and thereby open up markets for complementary components around the platform. Another approach is to give up control over the platform itself. Using data on 21 handheld computing systems (1990-2004), I find that granting greater levels of access to independent hardware developer firms produces up to a fivefold accele...

  5. Law-Aware Access Control and its Information Model

    OpenAIRE

    Stieghahn, Michael; Engel, Thomas

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for exa...

  6. Accessible protocol for practice classroom about physical and chemical factors that affect the biomembranes integrity

    Directory of Open Access Journals (Sweden)

    Thiago Barros Galvão

    2012-12-01

    Full Text Available The aim of the current work is to review a protocol used in practical classes to demonstrate some factors that affect biomembrane integrity. Sugar-beet fragments were utilized as the experimental model as membrane damage could be visualized by leakage of betacyanins, hydrophilic pigments accumulated in the cell vacuoles. The tests were carried out as discrete experiments utilizing physical agents and chemical products present in the student daily routine. To test the effect of temperature, sugar-beet fragments were submitted to heat, cold or both at different times of exposition. When chemical products were tested, sugar-beet fragments were exposed to organic solvents (common alcohol and acetone or polar and amphipathic substances (disinfectant, detergent, hydrogen peroxide, and sodium hypochlorite. The obtained results were discussed in terms of the capacity of the physical and chemical factors to cause membrane damage. The review of this protocol using reagents that are present in the student daily routine were able to demonstrate clearly the effect of the different tested factors, allowing the utilization of this practical class under limited conditions.

  7. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    Science.gov (United States)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  8. A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    Kannan Karthik

    2013-02-01

    Full Text Available Threshold ramp secret sharing schemes are designed so that (i certain subsets of shares have no information about the secret, (ii some subsets have partial information about the secret and (iii some subsets have complete information to recover the secret. However most of the ramp schemes in present literature do not control the leakage of information in partial access sets, due to which the information acquired by these sets is devoid of structure and not useful for fine-grained access control. Through a non-perfect secret sharing scheme called MIX-SPLIT, an encoding methodology for controlling the leakage in partial access sets is proposed and this is used for fine-grained access to binary strings. The ramp code generated using MIX-SPLIT requires a much smaller share size of O(n, as compared to Shamir's ramp adaptation which incurs a share size of atleast O(n2 for the same multi-access structure. The proposed ramp code is finally applied towards the protection and fine-grained access of industrial design drawings.

  9. Overriding follicle selection in controlled ovarian stimulation protocols: Quality vs quantity

    Directory of Open Access Journals (Sweden)

    Zelinski-Wooten Mary B

    2004-06-01

    Full Text Available Abstract Selection of the species-specific number of follicles that will develop and ovulate during the ovarian cycle can be overridden by increasing the levels of pituitary gonadotropin hormones, FSH and LH. During controlled ovarian stimulation (COS in nonhuman primates for assisted reproductive technology (ART protocols, the method of choice (but not the only method has been the administration of exogenous gonadotropins, either of nonprimate or primate origin. Due to species-specificity of the primate LH (but not FSH receptor, COS with nonprimate (e.g., PMSG hormones can be attributed to their FSH activity. Elevated levels of FSH alone will produce large antral follicles containing oocytes capable of fertilization in vitro (IVF. However, there is evidence that LH, probably in lesser amounts, increases the rate of follicular development, reduces heterogeneity of the antral follicle pool, and improves the viability and rate of pre-implantation development of IVF-produced embryos. Since an endogenous LH surge typically does not occur during COS cycles (especially when a GnRH antagonist is added, a large dose of an LH-like hormone (i.e., hCG may be given to reinitiate meiosis and produce fertilizable oocytes. Alternate approaches using exogenous LH (or FSH, or GnRH agonist to induce an endogenous LH surge, have received lesser attention. Current protocols will routinely yield dozens of large follicles with fertilizable eggs. However, limitations include non/poor-responding animals, heterogeneity of follicles (and presumably oocytes and subsequent short luteal phases (limiting embryo transfer in COS cycles. However, the most serious limitation to further improvements and expanded use of COS protocols for ART is the lack of availability of nonhuman primate gonadotropins. Human, and even more so, nonprimate gonadotropins are antigenic in monkeys, which limits the number of COS cycles to as few as 1 (PMSG or 3 (recombinant hCG protocols in macaques

  10. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    OpenAIRE

    Shin-Yan Chiou

    2013-01-01

    Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control syst...

  11. Based on asynchronous communication protocol of geographic space information service access mechanism research

    OpenAIRE

    G. Chen; Zhao, J.; Gu, M; Li, D.

    2014-01-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text m...

  12. Random access MAC protocols and system monitoring methodology in wireless mesh networks.

    OpenAIRE

    Huang, F.

    2008-01-01

    As an extension of wireless Ad Hoc 1 and sensor 2 networks, wireless mesh networks (WMN) 3 have recently been developed as a key solution to provide high-quality multimedia services and applications, such as voice, data and video, over wireless personal area networks (WPAN) 4, wireless local area network (WXAN) 5 and wireless metropolitan area network (WMAN) 6. A WMN usually has a hierarchical network infrastructure with backbone and access networks operated in both Ad Hoc and centralized mod...

  13. Modified Distributed Medium Access Control Algorithm Based on Multi-Packets Reception in Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHENG Qing; YANG Zhen

    2005-01-01

    Based on the Multi-Packet Reception(MPR)capability at the physical layer and the Distributed Coordination Function(DCF)of the IEEE 802.11 MAC protocol,we propose a modified new solution about WAITING mechanism to make full use of the MPR capability in this paper,which is named as modified distributed medium access control algorithm.We describe the details of each step of the algorithm after introducing the WAITING mechanism.Then,we also analyze how the waiting-time affects the throughput performance of the network.The network simulator NS-2 is used to evaluate the throughput performance of the new WAITING algorithm and we compare it with IEEE 802.11 MAC protocol and the old WAITING algorithm.The experimental results show that our new algorithm has the best performance.

  14. IVOA Recommendation: Observation Data Model Core Components and its Implementation in the Table Access Protocol Version 1.0

    CERN Document Server

    Louys, Mireille; Schade, David; Dowler, Patrick; Micol, Alberto; Durand, Daniel; Tody, Doug; Michel, Laurent; Salgado, Jesus; Chilingarian, Igor; Rino, Bruno; Santander, Juan de Dios; Skoda, Petr

    2011-01-01

    This document defines the core components of the Observation data model that are necessary to perform data discovery when querying data centers for observations of interest. It exposes use-cases to be carried out, explains the model and provides guidelines for its implementation as a data access service based on the Table Access Protocol (TAP). It aims at providing a simple model easy to understand and to implement by data providers that wish to publish their data into the Virtual Observatory. This interface integrates data modeling and data access aspects in a single service and is named ObsTAP. It will be referenced as such in the IVOA registries. There will be a separate document to cover the full Observation data model. In this document, the Observation Data Model Core Components (ObsCoreDM) defines the core components of queryable metadata required for global discovery of observational data. It is meant to allow a single query to be posed to TAP services at multiple sites to perform global data discovery...

  15. Perspectives of People Living with HIV on Access to Health Care: Protocol for a Scoping Review

    Science.gov (United States)

    Maybank, Allison; Hurley, Oliver; Modir, Hilary; Farrell, Alison; Marshall, Zack; Kendall, Claire; Johnston, Sharon; Hogel, Matthew; Rourke, Sean B; Liddy, Clare

    2016-01-01

    Background Strategies to improve access to health care for people living with human immunodeficiency virus (PLHIV) have demonstrated limited success. Whereas previous approaches have been informed by the views of health providers and decision-makers, it is believed that incorporating patient perspectives into the design and evaluations of health care programs will lead to improved access to health care services. Objective We aim to map the literature on the perspectives of PLHIV concerning access to health care services, to identify gaps in evidence, and to produce an evidence-informed research action plan to guide the Living with HIV program of research. Methods This scoping review includes peer-reviewed and grey literature from 1946 to May 2014 using double data extraction. Variations of the search terms “HIV”, “patient satisfaction”, and “health services accessibility” are used to identify relevant literature. The search strategy is being developed in consultation with content experts, review methodologists, and a librarian, and validated using gold standard studies identified by those stakeholders. The inclusion criteria are (1) the study includes the perspectives of PLHIV, (2) study design includes qualitative, quantitative, or mixed methods, and (3) outcome measures are limited to patient satisfaction, their implied needs, beliefs, and desires in relation to access to health care. The papers are extracted by two independent reviewers, including quality assessment. Data is then collated, summarized, and thematically analyzed. Results A total of 12,857 references were retrieved, of which 326 documents were identified as eligible in pre-screening, and 64 articles met the inclusion criteria (56% qualitative studies, 38% quantitative studies and 6% mixed-method studies). Only four studies were conducted in Canada. Data synthesis is in progress and full results are expected in June, 2016. Conclusions This scoping review will record and characterize the

  16. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  17. Protocol for ACCESS: a qualitative study exploring barriers and facilitators to accessing the emergency contraceptive pill from community pharmacies in Australia

    Science.gov (United States)

    Hussainy, Safeera Yasmeen; Ghosh, Ayesha; Taft, Angela; Mazza, Danielle; Black, Kirsten Isla; Clifford, Rhonda; Mc Namara, Kevin Peter; Ryan, Kath; Jackson, John Keith

    2015-01-01

    Introduction The rate of unplanned pregnancy in Australia remains high, which has contributed to Australia having one of the highest abortion rates of developed countries with an estimated 1 in 5 women having an abortion. The emergency contraceptive pill (ECP) offers a safe way of preventing unintended pregnancy after unprotected sex has occurred. While the ECP has been available over-the-counter in Australian pharmacies for over a decade, its use has not significantly increased. This paper presents a protocol for a qualitative study that aims to identify the barriers and facilitators to accessing the ECP from community pharmacies in Australia. Methods and analysis Data will be collected through one-on-one interviews that are semistructured and in-depth. Partnerships have been established with 2 pharmacy groups and 2 women's health organisations to aid with the recruitment of women and pharmacists for data collection purposes. Interview questions explore domains from the Theoretical Domains Framework in order to assess the factors aiding and/or hindering access to ECP from community pharmacies. Data collected will be analysed using deductive content analysis. The expected benefits of this study are that it will help develop evidence-based workforce interventions to strengthen the capacity and performance of community pharmacists as key ECP providers. Ethics and dissemination The findings will be disseminated to the research team and study partners, who will brainstorm ideas for interventions that would address barriers and facilitators to access identified from the interviews. Dissemination will also occur through presentations and peer-reviewed publications and the study participants will receive an executive summary of the findings. The study has been evaluated and approved by the Monash Human Research Ethics Committee. PMID:26656987

  18. A Service Access Security Control Model in Cyberspace

    Science.gov (United States)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  19. Privacy Preservation in Role-based Access Control Model

    Directory of Open Access Journals (Sweden)

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  20. Access to Health Care and Control of ABCs of Diabetes

    OpenAIRE

    Zhang, Xuanping; Bullard, Kai McKeever; Gregg, Edward W.; Beckles, Gloria L.; Williams, Desmond E.; Barker, Lawrence E; Albright, Ann L.; Imperatore, Giuseppina

    2012-01-01

    OBJECTIVE To examine the relationship between access to health care and diabetes control. RESEARCH DESIGN AND METHODS Using data from the National Health and Nutrition Examination Survey, 1999–2008, we identified 1,221 U.S. adults (age 18–64 years) with self-reported diabetes. Access was measured by current health insurance coverage, number of times health care was received over the past year, and routine place to go for health care. Diabetes control measures included the proportion of people...

  1. Conflict resolution protocols for random multiple-access channels with binary feedback

    Science.gov (United States)

    Berger, T.; Mehravari, N.

    The problem of conflict resolution in a random multiple-access, time-slotted, packet-switched channel with binary feedback is considered. Conflict resolution algorithms (CRA) for two different types of binary feedback which informs the users only about whether or not there was a collision in the previous slot achieves a throughput of 0.442. The CRA proposed for the case in which the feedback informs the users about whether or not the previous slot was empty achieves a throughput of 0.279.

  2. Advancing Migrant Access to Health Services in Europe (AMASE): Protocol for a Cross-sectional Study

    Science.gov (United States)

    Álvarez-del Arco, Débora; Monge, Susana; Copas, Andrew J; Gennotte, Anne-Francoise; Volny-Anne, Alain; Göpel, Siri; Touloumi, Giota; Prins, Maria; Barros, Henrique; Staehelin, Cornelia; del Amo, Julia; Burns, Fiona M

    2016-01-01

    Background Migrants form a substantial proportion of the population affected by the human immunodeficiency virus (HIV) epidemic in Europe, yet HIV prevention for this population is hindered by poor understanding of access to care and of postmigration transmission dynamics. Objective We present the design and methods of the advancing Migrant Access to health Services in Europe (aMASE) study, the first European cross-cultural study focused on multiple migrant populations. It aims to identify the structural, cultural, and financial barriers to HIV prevention, diagnosis, and treatment and to determine the likely country of HIV acquisition in HIV-positive migrant populations. Methods We delivered 2 cross-sectional electronic surveys across 10 countries (Belgium, France, Germany, Greece, Italy, the Netherlands, Portugal, Spain, Switzerland, and United Kingdom). A clinic survey aimed to recruit up to 2000 HIV-positive patients from 57 HIV clinics in 9 countries. A unique study number linked anonymized questionnaire data to clinical records data (viral loads, CD4 cell counts, viral clades, etc). This questionnaire was developed by expert panel consensus and cognitively tested, and a pilot study was carried out in 2 countries. A Web-based community survey (n=1000) reached those living with HIV but not currently accessing HIV clinics, as well as HIV-negative migrants. It was developed in close collaboration with a community advisory group (CAG) made up of representatives from community organizations in 9 of the participating countries. The CAG played a key role in data collection by promoting the survey to higher-risk migrant groups (sub-Saharan Africans, Latin Americans, men who have sex with men, and people who inject drugs). The questionnaires have considerable content overlap, allowing for comparison. Questions cover ethnicity, migration, immigration status, HIV testing and treatment, health-seeking behavior, sexual risk, and drug use. The electronic questionnaires

  3. Review of Access Control Models for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  4. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  5. A Group-oriented Access Control Scheme for P2P Networks

    Directory of Open Access Journals (Sweden)

    Wang Xiaoming

    2011-02-01

    Full Text Available A group-oriented access control scheme is proposed for P2P (peer to peer networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can realize authentication and secure communication, but also can easily and efficiently add new group members and revoke malicious group members. Therefore, it is more efficient, and more practical protocol for P2P networks.

  6. SAT-based Distributed Reactive Control Protocol Synthesis for Boolean Networks

    OpenAIRE

    Sahin, Yunus Emre; Ozay, Necmiye

    2016-01-01

    This paper considers the synthesis of distributed reactive control protocols for a Boolean network in a distributed manner. We start with a directed acyclic graph representing a network of Boolean subsystems and a global contract, given as an assumption-guarantee pair. Assumption captures the environment behavior, and guarantee is the requirements to be satisfied by the system. Local assumption-guarantee contracts, together with local control protocols ensuring these local contracts, are comp...

  7. On TCP-based Session Initiation Protocol (SIP) Server Overload Control

    OpenAIRE

    Shen, Charles; Schulzrinne, Henning

    2010-01-01

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how c...

  8. Design and Optimization of Wireless Remote Monitoring and Control System Using the ZigBee Protocol

    OpenAIRE

    Zhang, Jingcheng

    2011-01-01

    This thesis presents the design and the optimization of a wireless remote monitoring and control system utilizing the ZigBee protocol. From the system architecture point of view, the remote wireless monitoring and control system is mainly combined by 3 parts, the wireless sensor network, the message gateway and the web service. In order to increase the system flexibility and the reconfigurability, each part communicates with each other by using the standard communication protocols. The wirele...

  9. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  10. An Energy Efficient Protocol for Gateway-Centric Federated Residential Access Networks

    CERN Document Server

    Rossi, Claudio; Chiasserini, Carla-Fabiana

    2011-01-01

    The proliferation of overlapping, always-on IEEE 802.11 Access Points (APs) in urban areas can cause spectrum sharing conflicts, inefficient bandwidth usage and power waste. Cooperation among APs could address these problems (i) by allowing under-used devices to hand over their clients to nearby APs and temporarily switch off, (ii) by balancing the load of clients among APs and thus offloading congested APs. The federated houses model provides an appealing backdrop to implement cooperation among APs. In this paper, we outline a framework that, assuming the presence of a multipurpose gateway with AP capabilities in every household, allows such cooperation through the monitoring of local wireless resources and the triggering of offloading requests toward other federated gateways. We then present simulation results in realistic settings that provide some insight on the capabilities of our framework.

  11. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  12. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Control (MAC) protocols that are following the receiver-initiated paradigm of asynchronous communication. According to the receiver-initiated paradigm the communication is initiated by the receiver that states its availability to receive data through beacons. The sender is passively listening...... to the channel until it receives the beacon of interest. In this context, the dissertation begins with an in-depth survey of all the receiverinitiated MAC protocols and presents their unique optimization features, which deal with several challenges of the link layer such as mitigation of the energy consumption......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  13. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  14. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Gadducci, F.

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori acce

  15. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori acc

  16. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  17. Research on a dynamic workflow access control model

    Science.gov (United States)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  18. Protocol for the Control of Emergencies with Dangerous Materials

    International Nuclear Information System (INIS)

    This document is required to serve as a guide for plant engineers, in charge of the security and industrial hygiene or those people that for its work, have relationship with the use, storage and distribution of chemical substances, which represent a diversity of risks as the toxicity, the inflammability and the risk of explosion. The information that the specific protocol contains is precise and a series of sections that summarize the general information of the substance are developed, like its use, the risk of explosion, the inflammability and the physical-chemical properties. Additionally, some sections are included like the answer mechanisms before the fire presence, the personnel's decontamination and of the equipment, the gathering of the waste and the procedures of first aids. The chemical substances that cause bigger quantity of events for dangerous materials in Costa Rica are the acids, the bases, the chlorine, the liquate petroleum gas (LPG), the ammonia and the agro-chemicals. Due to the intrinsic risk that it possesses these substances, a protocol to act efficiently in front of an emergency related with some of the substances are developed. Due to the increment in the incidence of events with dangerous materials in different population's sectors, for example spills in the roads, emergencies in industries and educational centers, a law with the purpose of stopping the use and the indiscriminate manipulation of these substances in non-capable locations is necessary. Additionally, it is necessary the upgrade in the equipment and in the containers that don't fulfill the minimum requirements of security, as well as to offer the maximum security to people that have contact with such chemical substances. (Author)

  19. A COMBINED ADMISSION CONTROL ALGORITHM WITH DA PROTOCOL FOR SATELLITE ATM NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Lu Rong; Cao Zhigang

    2006-01-01

    Admission control is an important strategy for Quality of Service (QoS) provisioning in Asynchronous Transfer Mode (ATM) networks. Based on a control-theory model of resources on-Demand Allocation (DA) protocol, the paper studies the effect of the protocol on the statistical characteristics of network traffic,and proposes a combined connection admission control algorithm with the DA protocol to achieve full utilization of link resources in satellite communication systems. The proposed algorithm is based on the cross-layer-design approach. Theoretical analysis and system simulation results show that the proposed algorithm can admit more connections within certain admission thresholds than one that does not take into account the DA protocol. Thus, the proposed algorithm can increase admission ratio of traffic sources for satellite ATM networks and improve satellite link utilization.

  20. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  1. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  2. Modemless Multiple Access Communications over Powerlines for DC Microgrid Control

    OpenAIRE

    Angjelichinoski, Marko; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    We present a communication solution tailored specifically for DC microgrids (MGs) that exploits: (i) the communication potential residing in power electronic converters interfacing distributed generators to powerlines and (ii) the multiple access nature of the communication channel presented by powerlines. The communication is achieved by modulating the parameters of the primary control loop implemented by the converters, fostering execution of the upper layer control applications. We present...

  3. Access control and interlock system at the Advanced Photon Source

    Energy Technology Data Exchange (ETDEWEB)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D. [Argonne National Lab., IL (United States). Advanced Photon Source

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  4. Validation concurrency control protocol in parallel real-time database systems

    Institute of Scientific and Technical Information of China (English)

    雷向东; 袁晓莉

    2002-01-01

    In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can enhance the performance of real-time concurrency control mechanism by reducing the number of transactions that might miss their deadlines, and compare the performance of validation concurrency control protocol with that of HP2PL(High priority two phase locking) protocol and OCC-TI-WAIT-50(Optimistic concurrency control-time interval-wait-50) protocol under shared-disk architecture by simulation. The simulation results reveal that the protocol the author presented can effectively reduce the number of transactions restarting which might miss their deadlines and performs better than HP2PL and OCC-TI-WAIT-50. It works well when arrival rate of transaction is lesser than threshold. However, due to resource contention the percentage of missing deadline increases sharply when arrival rate is greater than the threshold.

  5. Pilot studies for the North American Soil Geochemical Landscapes Project - Site selection, sampling protocols, analytical methods, and quality control protocols

    Science.gov (United States)

    Smith, D.B.; Woodruff, L.G.; O'Leary, R. M.; Cannon, W.F.; Garrett, R.G.; Kilburn, J.E.; Goldhaber, M.B.

    2009-01-01

    In 2004, the US Geological Survey (USGS) and the Geological Survey of Canada sampled and chemically analyzed soils along two transects across Canada and the USA in preparation for a planned soil geochemical survey of North America. This effort was a pilot study to test and refine sampling protocols, analytical methods, quality control protocols, and field logistics for the continental survey. A total of 220 sample sites were selected at approximately 40-km intervals along the two transects. The ideal sampling protocol at each site called for a sample from a depth of 0-5 cm and a composite of each of the O, A, and C horizons. The Quality control (QC) of the analyses was monitored at three levels: the laboratory performing the analysis, the USGS QC officer, and the principal investigator for the study. This level of review resulted in an average of one QC sample for every 20 field samples, which proved to be minimally adequate for such a large-scale survey. Additional QC samples should be added to monitor within-batch quality to the extent that no more than 10 samples are analyzed between a QC sample. Only Cr (77%), Y (82%), and Sb (80%) fell outside the acceptable limits of accuracy (% recovery between 85 and 115%) because of likely residence in mineral phases resistant to the acid digestion. A separate sample of 0-5-cm material was collected at each site for determination of organic compounds. A subset of 73 of these samples was analyzed for a suite of 19 organochlorine pesticides by gas chromatography. Only three of these samples had detectable pesticide concentrations. A separate sample of A-horizon soil was collected for microbial characterization by phospholipid fatty acid analysis (PLFA), soil enzyme assays, and determination of selected human and agricultural pathogens. Collection, preservation and analysis of samples for both organic compounds and microbial characterization add a great degree of complication to the sampling and preservation protocols and a

  6. Pilot studies for the North American Soil Geochemical Landscapes Project - Site selection, sampling protocols, analytical methods, and quality control protocols

    International Nuclear Information System (INIS)

    In 2004, the US Geological Survey (USGS) and the Geological Survey of Canada sampled and chemically analyzed soils along two transects across Canada and the USA in preparation for a planned soil geochemical survey of North America. This effort was a pilot study to test and refine sampling protocols, analytical methods, quality control protocols, and field logistics for the continental survey. A total of 220 sample sites were selected at approximately 40-km intervals along the two transects. The ideal sampling protocol at each site called for a sample from a depth of 0-5 cm and a composite of each of the O, A, and C horizons. The 3, HClO4, and HF. Separate methods were used for Hg, Se, total C, and carbonate-C on this same size fraction. Only Ag, In, and Te had a large percentage of concentrations below the detection limit. Quality control (QC) of the analyses was monitored at three levels: the laboratory performing the analysis, the USGS QC officer, and the principal investigator for the study. This level of review resulted in an average of one QC sample for every 20 field samples, which proved to be minimally adequate for such a large-scale survey. Additional QC samples should be added to monitor within-batch quality to the extent that no more than 10 samples are analyzed between a QC sample. Only Cr (77%), Y (82%), and Sb (80%) fell outside the acceptable limits of accuracy (% recovery between 85 and 115%) because of likely residence in mineral phases resistant to the acid digestion. A separate sample of 0-5-cm material was collected at each site for determination of organic compounds. A subset of 73 of these samples was analyzed for a suite of 19 organochlorine pesticides by gas chromatography. Only three of these samples had detectable pesticide concentrations. A separate sample of A-horizon soil was collected for microbial characterization by phospholipid fatty acid analysis (PLFA), soil enzyme assays, and determination of selected human and agricultural

  7. A User Profile Based Access Control Model and Architecture

    Directory of Open Access Journals (Sweden)

    Meriem Zerkouk

    2013-02-01

    Full Text Available Personalization and adaptation to the user profile capability are the hottest issues to ensure ambientassisted living and context awareness in nowadays environments. With the growing healthcare andwellbeing context aware applications, modeling security policies becomes an important issue in thedesign of future access control models. This requires rich semantics using ontology modeling for themanagement of services provided to dependant people. However, current access control models remainunsuitable due to lack of personalization, adaptability and smartness to the handicap situation.In this paper, we propose a novel adaptable access control model and its related architecture in whichthe security policy is based on the handicap situation analyzed from the monitoring of user’s behavior inorder to grant a service using any assistive device within intelligent environment. The design of ourmodel is an ontology-learning and evolving security policy for predicting the future actions of dependentpeople. This is reached by reasoning about historical data, contextual data and user behavior accordingto the access rules that are used in the inference engine to provide the right service according to theuser’s needs.

  8. Protocol for economic evaluation alongside the IMPLEMENT cluster randomised controlled trial

    Directory of Open Access Journals (Sweden)

    McKenzie Joanne E

    2008-02-01

    Full Text Available Abstract Background The recent development and publication of evidence-based clinical practice guidelines (CPGs for acute low back pain (LBP has resulted in evidence-based recommendations that, if implemented, have the potential to improve the quality and safety of care for acute LBP. While a strategy has been specified for dissemination of the CPG for acute LBP in Australia, there is no accompanying plan for active implementation. Evidence regarding the cost-effectiveness of active implementation of CPGs for acute LBP is sparse. The IMPLEMENT study will consider the incremental benefits and costs of progressing beyond development and dissemination to implementation. Methods/design Cost-effectiveness and cost-utility analyses alongside the IMPLEMENT cluster randomised controlled trial (CRCT from a societal perspective to quantify the additional costs (savings and health gains associated with a targeted implementation strategy as compared with access to the CPG via dissemination only. Discussion The protocol provided here registers our intent to conduct an economic evaluation alongside the IMPLEMENT study, facilitates peer-review of proposed methods and provides a transparent statement of planned analyses. Trial registration Australian New Zealand Clinical Trials Registry ACTRN012606000098538

  9. Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks

    Science.gov (United States)

    Hurni, Philipp

    This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.

  10. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  11. A Multiparty Controlled Bidirectional Quantum Secure Direct Communication and Authentication Protocol Based on EPR Pairs

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Sheng, Zhi-Wei

    2013-06-01

    A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping. The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence. Secret messages are transmitted by using the classical XOR operation, which serves as a one-time-pad. No photon with secret information transmits in the quantum channel. Compared with the protocols proposed by Wang et al. [Acta Phys. Sin. 56 (2007) 673; Opt. Commun. 266 (2006) 732], the protocol in this study implements bidirectional communication and authentication, which defends most attacks including the ‘man-in-the-middle’ attack efficiently.

  12. Analysis and Application of Covert Channels of Internet Control Message Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Xueguang; ZHANG Huanguo

    2006-01-01

    Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channel's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network.

  13. A formal model for access control with supporting spatial context

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hong; HE YePing; SHI ZhiGuo

    2007-01-01

    There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented,and the role is assigned a logical location domain to specify the spatial boundary.Roles are activated based on the current physical position of the user which obtained from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, constrained SC-RBAC allows express various spatial separations of duty constraints,location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 invariants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.

  14. On TCP-based Session Initiation Protocol (SIP) Server Overload Control

    CERN Document Server

    Shen, Charles

    2010-01-01

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how can we make it work? We provide a comprehensive explanation of the default SIP-over-TCP overload behavior through server instrumentation. We also propose and implement novel but simple overload control algorithms without any kernel or protocol level modification. Experimental evaluation shows that with our mechanism the overload performance improves from its original zero throughput to nearly full capacity. Our work leads to the important general insight that the traditional notion of TCP flow control alone is incapable of...

  15. Multi-channel Dual Clocks three-dimensional probability Random Multiple Access protocol for Wireless Public Bus Networks based on RTS/CTS mechanism

    Directory of Open Access Journals (Sweden)

    Zhou Sheng Jie

    2016-01-01

    Full Text Available A MAC protocol for public bus networks, called Bus MAC protocol, designed to provide high quality Internet service for bus passengers. The paper proposed a multi-channel dual clocks three-demission probability random multiple access protocol based on RTS/CTS mechanism, decreasing collisions caused by multiple access from multiple passengers. Use the RTS/CTS mechanism increases the reliability and stability of the system, reducing the collision possibility of the information packets to a certain extent, improves the channel utilization; use the multi-channel mechanism, not only enables the channel load balancing, but also solves the problem of the hidden terminal and exposed terminal. Use the dual clocks mechanism, reducing the system idle time. At last, the different selection of the three-dimensional probabilities can make the system throughput adapt to the network load which could realize the maximum of the system throughput.

  16. Secure Communication and Access Control for Mobile Web Service Provisioning

    CERN Document Server

    Srirama, Satish Narayana

    2010-01-01

    It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welcoming, the ability to provide secure and reliable communication in the vulnerable and volatile mobile ad-hoc topologies is vastly becoming necessary. The paper mainly addresses the details and issues in providing secured communication and access control for the mobile web service provisioning domain. While the basic message-level security can be provided, providing proper access control mechanisms for the Mobile Host still poses a great challenge. This paper discusses details of secure communication and proposes the distributed semantics-based authorization mechanism.

  17. Type-Based Access Control in Data-Centric Systems

    Science.gov (United States)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  18. Access and control of resources: Lessons from the SANREM CRSP

    OpenAIRE

    Flora, Cornelia B.

    2001-01-01

    Metadata only record Developing sustainability in an agricultural ecosystem requires that attention be given to inequities within communities. The experiences of SANREM CRSP revealed that gender inequality was a significant factor in the access and control of resources that were critical for the projects reaching their goals. Among the resources of financial, manufactured, human, environmental, and social capital, enhancing social capital among women was a crucial component of plans for in...

  19. Achieving Fine-grained Access Control in Virtual Organisations

    OpenAIRE

    Zhang, Nien Fan; Yao, L.; Nenadic, A.; Chin, J.; Goble, C.; Rector, A.; Chadwick, David W; Otenko, Sassa; Shi, Q.

    2007-01-01

    In a virtual organization environment, where services and data are provided and shared amongorganizations from different administrative domains and protected with dissimilar security policies and measures, there is a need for a flexible authentication framework that supports the use of various authentication methods and tokens. The authentication strengths derived from the authentication methods and tokens should be incorporated into an access-control decision-making process, so that more sen...

  20. THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

    OpenAIRE

    S. R. KODITUWAKKU

    2010-01-01

    The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Object oriented design patterns facilitate small scale and large scale design reuse. This paper presents an object oriented design pattern, Administrator Object, to address the User-Role assignment problem in Role Based Access Control (RBAC). Two alternative solutions are proposed. The pattern is presented according to the Gang of Four template.

  1. THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    S. R. KODITUWAKKU

    2010-12-01

    Full Text Available The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Object oriented design patterns facilitate small scale and large scale design reuse. This paper presents an object oriented design pattern, Administrator Object, to address the User-Role assignment problem in Role Based Access Control (RBAC. Two alternative solutions are proposed. The pattern is presented according to the Gang of Four template.

  2. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  3. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  4. Material control and surveillance for high frequency access vaults project

    International Nuclear Information System (INIS)

    The 'Material Control and Surveillance for High Frequency Access Vaults' project sponsored by United States Department of Energy's Office of Security Policy, Policy Integration and Technical Support Program (SO-20.3) focuses on enhancing nuclear materials control and surveillance in vaults that are frequently accessed. The focus of this effort is to improve materials control and accountability (MC and A) while decreasing the operational impact of these activities. Los Alamos and Y-12 have developed a testbed at the Los Alamos National Laboratory for evaluating and demonstrating integrated technologies for use in enhancing materials control and accountability in active nuclear material storage vaults. An update will be provided on the new systems demonstrated in the test-bed including a 'confirmatory cart' for expediting the performance of inventory and radio-frequency actuated video that demonstrates the concept of automated data entry for materials moving between MBA's. The United States Department of Energy's Office of Security Policy, Policy Integration and Technical Support Program (SO-20.3) has sponsored a project where nuclear material inventory, control and surveillance systems are evaluated, developed, and demonstrated in an effort to provide technologies that reduce risk, increase material assurance, and provide cost-efficient alternatives to manpower-intensive physical inventory and surveillance approaches for working (high-frequency-access) vaults. This Fiscal Year has been largely focused on evaluating and developing components of two sub-systems that could be used either separately in nuclear material vaults or as part of a larger integrated system for nuclear materials accountability, control and surveillance.

  5. GSR-TDMA: A Geometric Spatial Reuse-Time Division Multiple Access MAC Protocol for Multihop Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2016-01-01

    Full Text Available The nonnegligible propagation delay of acoustic signals causes spatiotemporal uncertainty that occasionally enables simultaneous, collision-free packet transmission among underwater nodes (UNs. These transmissions can be handled by efficiently managing the channel access of the UNs in the data-link layer. To this end, Geometric Spatial Reuse-TDMA (GSR-TDMA, a new TDMA-based MAC protocol, is designed for use in centralized, multihop underwater acoustic sensor networks (UASNs, and in this case all UNs are periodically scheduled after determining a geometric map according to the information on their location. The scheduling strategy increases the number of UNs that send packets coincidentally via two subscheduling configurations (i.e., interhop and intrahop scheduling. Extensive simulations are used to investigate the reception success rate (RSR and the multihop delay (MHD of GSR-TDMA, and the results are compared to those of previous approaches, including C-MAC and HSR-TDMA. GSR-TDMA outperforms C-MAC; the RSR of GSR-TDMA is 15% higher than that of C-MAC, and the MHD of GSR-TDMA is 30% lower than that of C-MAC at the most. In addition, GSR-TDMA provides even better performance improvements over HSR-TDMA; the RSR of GSR-TDMA is 50% higher than that of HSR-TDMA, and the MHD of GSR-TDMA is an order of 102 lower than that of HSR-TDMA at the most.

  6. State control, access to capital and firm performance

    Institute of Scientific and Technical Information of China (English)

    Oliver Zhen Li; Xijia Su; Zhifeng Yang

    2012-01-01

    We study the effect of state control on capital allocation and investment in China, where the government screens prospective stock issuers. We find that state firms are more likely to obtain government approval to conduct seasoned equity offerings than non-state firms. Further, non-state firms exhibit greater sensitivities of subsequent investment and stock performance to regulatory decisions on stock issuances than state firms. Our work suggests that state control of capital access distorts resource allocation and impedes the growth of non-state firms. We also provide robust evidence that financial constraints cause underinvestment.

  7. Partner randomized controlled trial: study protocol and coaching intervention

    OpenAIRE

    Garbutt Jane M; Highstein Gabrielle; Yan Yan; Strunk Robert C

    2012-01-01

    Abstract Background Many children with asthma live with frequent symptoms and activity limitations, and visits for urgent care are common. Many pediatricians do not regularly meet with families to monitor asthma control, identify concerns or problems with management, or provide self-management education. Effective interventions to improve asthma care such as small group training and care redesign have been difficult to disseminate into office practice. Methods and design This paper describes ...

  8. RFID Based Security Access Control System with GSM Technology

    Directory of Open Access Journals (Sweden)

    Peter Adole

    2016-08-01

    Full Text Available The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises. This is achieved mainly through the use of a Radio Frequency Identification System with operating frequency of 125 KHz, Microcontroller programmed to send control signals, DC motor, relay, buzzer, Liquid Crystal Display (LCD and GSM/GPRS Modem.Once the RFID tag which contains the user’s unique information is scan by the RFID reader and confirmed match with the information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number” to security personnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”, buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid RFID card is used to access the security system” to the security personnel. The electronic circuit was implemented, the codes for microcontroller were written in assembly language, debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Hardware simulation was carried out using the Proteus Virtual System Modelling (VSM version 8.0.An importation implication of this paper is that the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock

  9. Studying the Noise Control Engineering Protocols in Industry

    Directory of Open Access Journals (Sweden)

    Hamid Golshah

    1999-03-01

    Full Text Available Today, sound is one of the detrimental factors in the workplace and its harmful impact has been so important that scientists have named it “Noise Pollutions”. Hearing is one of the five senses of human being which is also a medium for communicating with other s and enjoying the pleasant feeling of listening to a piece of music. In spite of this, changes in the intensity and frequency of sound can make it annoying. Using Sound Level Meter to measure the dB of noise in the workplace and noise control principles will be discussed here.

  10. OJADEAC: An Ontology Based Access Control Model for JADE Platform

    Directory of Open Access Journals (Sweden)

    Ban Sharief Mustafa

    2014-06-01

    Full Text Available Java Agent Development Framework (JADE is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA specifications. JADE propose new infrastructure solutions to support the development of useful and convenient distributed applications. Security is one of the most important issues in implementing and deploying such applications. JADE-S security add-ons are one of the most popular security solutions in JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give authorities to perform an action based on a set of permission objects attached to every authenticated user. This service has several drawbacks when implemented in a scalable distributed context aware applications. In this paper, an ontology-based access control model called (OJADEAC is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome the shortcoming of this service. The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules. OJADEAC model is distributed, intelligent, dynamic, context-aware and use reasoning engine to infer access decisions based on ontology knowledge.

  11. A study of multiple access schemes in satellite control network

    Science.gov (United States)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  12. Implementation of ON/OFF and PID controller using TCP Protocol Based on Virtual Instrumentation

    Directory of Open Access Journals (Sweden)

    Abhyarthana Bisoyi , Umesh Chandra Pati

    2013-03-01

    Full Text Available LabVIEW(Laboratory Virtual InstrumentEngineering Workbenchisthe softwarewhichgives virtual existence ofhardware, reduces its costand hencetermed as Virtual Instrumentation.Thispaper deals with the implementation ofON/OFFand PID controller for controlling the temperatureof a heating element inside a wooden box with thehelp of LabVIEW. In this software,TransmissionControl Protocol (TCPis used for developing anonline transmission processbetween client andserver. Client has control overthe set point andServer has control over the temperature. Inhardware section, a DataAcquisition (DAQ cardreads temperature from sensor and delivers toServer. With the help of internet protocol,clientprovides the value ofset point according to whichthe control actions aretaken by the server.Thepaper also includes discussions regarding theadvantages and disadvantages of TCP/IP.

  13. A field exercise course to train IAEA safeguards inspectors in implementing the additional protocol and performing complementary access activities (LA-UR-06-5798)

    International Nuclear Information System (INIS)

    Full text: The IAEA Department of Safeguards has the task of implementing the Additional Protocol (AP) in the Member States that have signed agreements bringing that treaty into force. The IAEA inspector under the traditional INFCIRC/153 safeguards has been an accountant focused on the declared nuclear material stores of a Member State. The INFCIRC/540 Strengthened Safeguards System (SSS) provides the Agency and its inspectors with the right to investigate a Member State's nuclear programme to see if all declared activities are in order and no undeclared activities exist. This broadening of the scope of the inspector's responsibilities has changed the training of the inspectors to orient them to being an investigator compared to an accountant. The Safeguards training department has created a curriculum of courses that provides the background to train the inspectorate into this new inspection regime. The United States Support Program (USSP) has contributed to this curriculum by putting together a course at Brookhaven National Laboratory (BNL) in Additional Protocol Complementary Access (APCA) to give the IAEA the opportunity to provide inspectors a necessary field exercise in a realistic environment at a research site. Brookhaven National Laboratory contains three shutdown nuclear research reactors, operating particle accelerators, hot cells, radioactive waste storage, laser laboratories, and magnet production facilities on a large site very similar to numerous research facilities around the world situated in non-nuclear weapon states (NNWS). The BNL team created an Article 2 declaration containing annotated maps of the site, descriptions of the buildings on site, satellite and aerial photographs of the area, and a declaration of research activities on the site. The declaration is as realistic to actual BNL research except that proprietary and security concerns of the BNL site have been taken into account. The BNL team felt the best training vehicle provides a

  14. User Driven Feedback Control System driven using CAN Protocol

    Directory of Open Access Journals (Sweden)

    Ankita Goyal

    2013-09-01

    Full Text Available -Industrial automation is a sector having vast possibilities for major improvements. The system described in this paper consists of a console master computer (CMC which will monitor various physical nodes usually found in a large industry. The proposed work analyzes the capability of CAN networking which includes data traffic management. The CMC is designed using MATLAB 7.12; the CAN networking is supported using the Vehicular Network Toolbox. The proposed system using CAN has the advantages of being simple in its design which contributes to the overall low cost. The novelty of the work lies in the low cost approach, and fails safe methodology of CAN communication. The proposed system is capable of sending and receiving signals with the additional benefit of feedback mechanism .The proposed work is implementable in any industry with the cost advantage of CAN interface. The proposed work can be used as a cheaper and robust alternative to native technologies like PLC (Programmable Logic Controller. Moreover, the CAN network system is immune from the electrical interferences.

  15. Energy-efficient MAC protocols for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Li De-liang; Peng Fei

    2009-01-01

    Designing energy-efficient Medium Access Control (MAC) protocols has a significant influence on the energy performance of wireless sensor network (WSN). In this paper we present a survey of the recent typical MAC protocols regarding energy efficiency for WSN. According to channel access policies, we classify these protocols into four categories: contention-based, TDMA-based, hybrid, and cross layer protocols, in which the advantages and disadvantages in each class of MAC protocols are discussed. Finally, we point out open research issues that need to carry on to achieve high energy efficiency for the design of MAC protocols in WSN.

  16. Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic

    CERN Document Server

    Monowar, Muhammad Mostafa; Pathan, Al-Sakib Khan; Hong, Choong Seon

    2008-01-01

    Heterogeneous applications could be assimilated within the same wireless sensor network with the aid of modern motes that have multiple sensor boards on a single radio board. Different types of data generated from such types of motes might have different transmission characteristics in terms of priority, transmission rate, required bandwidth, tolerable packet loss, delay demands etc. Considering a sensor network consisting of such multi-purpose nodes, in this paper we propose Prioritized Heterogeneous Traffic-oriented Congestion Control Protocol (PHTCCP) which ensures efficient rate control for prioritized heterogeneous traffic. Our protocol uses intra-queue and inter-queue priorities for ensuring feasible transmission rates of heterogeneous data. It also guarantees efficient link utilization by using dynamic transmission rate adjustment. Detailed analysis and simulation results are presented along with the description of our protocol to demonstrate its effectiveness in handling prioritized heterogeneous traf...

  17. Acupuncture for dry eye: a randomised controlled trial protocol

    Directory of Open Access Journals (Sweden)

    Kim Ae-Ran

    2009-12-01

    Full Text Available Abstract Background Dry eye is usually managed by conventional medical interventions such as artificial tears, anti-inflammatory drugs and surgical treatment. However, since dry eye is one of the most frequent ophthalmologic disorders, safer and more effective methods for its treatment are necessary, especially for vulnerable patients. Acupuncture has been widely used to treat patients with dry eye. Our aim is to evaluate the effectiveness and safety of acupuncture for this condition. Methods/Design A randomised, patient-assessor blinded, sham (non-acupuncture point, shallow acupuncture controlled study was established. Participants allocated to verum acupuncture and sham acupuncture groups will be treated three times weekly for three weeks for a total of nine sessions per participant. Seventeen points (GV23; bilateral BL2, GB4, TE23, Ex1 (Taiyang, ST1 and GB20; and left SP3, LU9, LU10 and HT8 for men, right for women have been selected for the verum acupuncture; for the sham acupuncture, points have been selected that do not coincide with a classical acupuncture point and that are located close to the verum points, except in the case of the rim of the eye. Ocular surface disease index, tear film breakup time, the Schirmer I test, medication quantification scale and general assessment of improvement will be used as outcome variables for evaluating the effectiveness of acupuncture. Safety will also be assessed at every visit. Primary and secondary outcomes will be assessed four weeks after screening. All statistical analyses will be performed using analysis of covariance. Discussion The results of this trial will be used as a basis for clarifying the efficacy of acupuncture for dry eye. Trial registration ClinicalTrials.gov NCT00969280.

  18. Dynamic Postural Control in Female Athletes and Nonathletes After a Whole-Body Fatigue Protocol.

    Science.gov (United States)

    Baghbani, Fatemeh; Woodhouse, Linda J; Gaeini, Abbas A

    2016-07-01

    Baghbani, F, Woodhouse, LJ, and Gaeini, AA. Dynamic postural control in female athletes and nonathletes after a whole-body fatigue protocol. J Strength Cond Res 30(7): 1942-1947, 2016-Postural control is a crucial element in regular training of athletes, development of complex technical movement, and injury prevention; however, distributing factor of the postural control such as fatigue has been neglected by athletic trainers in novice and inexperienced athletes. The objective of this study was to compare changes in dynamic postural control of young female athletes and nonathletes after a fatigue protocol. Thirty females (15 athletes and 15 nonathletes) with no orthopedic problems were recruited to participate in this study. All participants completed the pre-SEBT (star excursion balance test) in 8 directions at baseline; then, they performed a 20-minute fatigue protocol after which post-SEBT was measured. Rating of perceived exertion was measured using the Borg scale immediately before, mid-way through (i.e., after the third station), and after performing the fatigue protocol (i.e., immediately before the post-SEBT). Female nonathlete groups had significant differences in dynamic balance performance after fatigue in the medial, posteromedial, and posterior directions (p postural control of the novice with progressing the exercise time. Our findings could also help coaches to develop trainings focused on the 3 directions of medial, posteromedial, and posterior directions and aimed at exercises increasing fatigue resistance.

  19. Streamlining tasks and roles to expand treatment and care for HIV: randomised controlled trial protocol

    Directory of Open Access Journals (Sweden)

    van Vuuren Cloete

    2008-04-01

    Full Text Available Abstract Background A major barrier to accessing free government-provided antiretroviral treatment (ART in South Africa is the shortage of suitably skilled health professionals. Current South African guidelines recommend that only doctors should prescribe ART, even though most primary care is provided by nurses. We have developed an effective method of educational outreach to primary care nurses in South Africa. Evidence is needed as to whether primary care nurses, with suitable training and managerial support, can initiate and continue to prescribe and monitor ART in the majority of ART-eligible adults. Methods/design This is a protocol for a pragmatic cluster randomised trial to evaluate the effectiveness of a complex intervention based on and supporting nurse-led antiretroviral treatment (ART for South African patients with HIV/AIDS, compared to current practice in which doctors are responsible for initiating ART and continuing prescribing. We will randomly allocate 31 primary care clinics in the Free State province to nurse-led or doctor-led ART. Two groups of patients aged 16 years and over will be included: a 7400 registering with the programme with CD4 counts of ≤ 350 cells/mL (mainly to evaluate treatment initiation and b 4900 already receiving ART (to evaluate ongoing treatment and monitoring. The primary outcomes will be time to death (in the first group and viral suppression (in the second group. Patients' survival, viral load and health status indicators will be measured at least 6-monthly for at least one year and up to 2 years, using an existing province-wide clinical database linked to the national death register. Trial registration Controlled Clinical Trials ISRCTN46836853

  20. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  1. An Access Control Model of Virtual Machine Security

    Directory of Open Access Journals (Sweden)

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  2. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  3. RFID card based access control system with counter for Indus Complex

    International Nuclear Information System (INIS)

    As per norms of the Atomic energy regulatory board (AERB) to operate a facility in round the clock which has a potential of radiation exposure, radiation safety rules are to be followed. Indus -1 and Indus-2 are synchrotron radiation sources which are open for various users round the clock. To monitor the persons inside the defined zone at any given time, a system is setup consisting of RF ID cards and their readers along with dedicated software. Software is developed in Visual Basic and uses UDP network protocol for receiving data from readers installed at various locations and connected to local area network. The paper describes the access control scheme followed in Indus Accelerator Complex. (author)

  4. Joint Implementation under the Kyoto Protocol. Together on the road towards a better, controllable environment

    International Nuclear Information System (INIS)

    The main questions to be answered in this report concern the control on the compliance of the most important obligations as formulated in the Kyoto Protocol. Also attention is paid to the monitoring and reporting requirements of so-called flexible mechanisms, in particular joint implementation. 29 refs

  5. Brief intervention to reduce risky drinking in pregnancy: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Wilson Graeme B

    2012-09-01

    Full Text Available Abstract Background Risky drinking in pregnancy by UK women is likely to result in many alcohol-exposed pregnancies. Studies from the USA suggest that brief intervention has promise for alcohol risk reduction in antenatal care. However, further research is needed to establish whether this evidence from the USA is applicable to the UK. This pilot study aims to investigate whether pregnant women can be recruited and retained in a randomized controlled trial of brief intervention aimed at reducing risky drinking in women receiving antenatal care. Methods The trial will rehearse the parallel-group, non-blinded design and procedures of a subsequent definitive trial. Over 8 months, women aged 18 years and over (target number 2,742 attending their booking appointment with a community midwife (n = 31 in north-east England will be screened for alcohol consumption using the consumption questions of the Alcohol Use Disorders Identification Test (AUDIT-C. Those screening positive, without a history of substance use or alcohol dependence, with no pregnancy complication, and able to give informed consent, will be invited to participate in the trial (target number 120. Midwives will be randomized in a 1:1 ratio to deliver either treatment as usual (control or structured brief advice and referral for a 20-minute motivational interviewing session with an alcohol health worker (intervention. As well as demographic and health information, baseline measures will include two 7-day time line follow-back questionnaires and the EuroQoL EQ-5D-3 L questionnaire. Measures will be repeated in telephone follow-ups in the third trimester and at 6 months post-partum, when a questionnaire on use of National Health Service and social care resources will also be completed. Information on pregnancy outcomes and stillbirths will be accessed from central health service records before the follow-ups. Primary outcomes will be rates of eligibility, recruitment, intervention

  6. Impact of Transport Control Protocol on Full Duplex Performance in 5G Networks

    DEFF Research Database (Denmark)

    Gatnau, Marta; Berardinelli, Gilberto; Mahmood, Nurul Huda;

    2016-01-01

    Full duplex (FD) communication has attracted the attention of the industry and the academia as an important feature in the design of the future 5th generation (5G) wireless communication system. Such technology allows a device to simultaneously transmit and receive in the same frequency band......, with the potential of providing higher throughput and lower latency compared to traditional half duplex (HD) systems. In this paper, the interaction between Transport Control Protocol (TCP) and FD in 5G ultra-dense small cell networks is studied. TCP is a well-known transport layer protocol for providing reliability...

  7. Advent of Biometric Sensors in Field of Access Control

    Directory of Open Access Journals (Sweden)

    Ali Anas

    2015-09-01

    Full Text Available Biometrics is the science of measuring and analyzing biological data. It is used to uniquely identify individuals by their physical characteristics or personal behavior traits.The results from scrutiny of various themes including unimodal, multimodal, physiological, behavioural bio-metrics. Bio-metrics, Physiological and behavioural are compared in the review. The article addresses a particular aspect of utilizing biometrics for authentication, identification and access control. The use of systems like fingerprint, face recognition, hand geometry, Palm print, DNA analysis, iris recognition, retina and odour/scent will be dealt with herewith. This study deals with various applications of this technology, like surveillance, employee identification, device access etc with mentions respective of hardware used. The influence of such features is yet to be documented properly, but it is safe to say that it has been a huge step towards better information security and identification control.Over the course of this text, we will try to bring to light our analysis of the subject and provide an in-depth examination of contemporary and futuristic technologies pertaining to this field.

  8. Extending a Role Graph for Role-Based Access Control

    Science.gov (United States)

    Asakura, Yoshiharu; Nakamoto, Yukikazu

    Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.

  9. Stream Control Transmission Protocol as a Transport for SIP: a case study

    Directory of Open Access Journals (Sweden)

    Giuseppe De Marco

    2004-06-01

    Full Text Available The dominant signalling protocol both in future wireless and wired networks will be the Session Initiation Protocol (SIP, as pointed out in the 3G IP-based mobile networks specifications, entailing a fully Internet integrated network. The use of SIP in the IP Multimedia Subsytem (IMS of Release 5 involves the development of servers capable to handle a large number of call requests. The signaling traffic associated to such requests could explode, if an intelligent congestion control were not introduced. Stream Control Transmission Protocol (SCTP was born to support transport of SS7 signaling messages. However, many of the SCTP features are also useful for transport of SIP messages, as: congestion control mechanism, good separation among independent messages, multihoming. Indeed, adoption of SCTP as transport of SIP signaling might prove useful in some situations where usual transport protocols, like TCP and UDP, suffer performance degradation. In this paper, we analyse the general framework wherein SIP operates and we discuss the benefits of using SCTP as a transport for SIP, toward fair sharing of network resources. This study is carried on in the context of the implementation of an high-performance SIP Proxy Server. We also present some preliminar results of an implementation of SIP over SCTP/UDP in a real LAN environment.

  10. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-06-01

    Full Text Available At the center of core technologies for a future cyber world, such as Internet of Things (IoT or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC-based electronic payments. Near-field Communication (NFC integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.

  11. On shaky ground - A study of security vulnerabilities in control protocols

    International Nuclear Information System (INIS)

    The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large number of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)

  12. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal...

  13. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-01-26

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... market access to customers or other persons, to implement risk management controls and supervisory... pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access),\\10\\ and thus could...

  14. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  15. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  16. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10 a.m.-4..., Airport Security Access Control Systems. The agenda will include the following: February 9, 2012...

  17. The Deployment of Routing Protocols in Distributed Control Plane of SDN

    Directory of Open Access Journals (Sweden)

    Zhou Jingjing

    2014-01-01

    Full Text Available Software defined network (SDN provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo’s two levels of controllers based on ideological inspiration of RCP (routing control platform. Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies.

  18. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  19. Exploring Round Trip Time fairness for Adaptive Layered Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    V.Kavidha

    2010-05-01

    Full Text Available High performance data transfer services is needed in long distance high-speed networks. In this paper Adaptive Layered Transmission Control Protocol (ALTCP is proposed, which is used for making more scalability in highspeed networks. ALTCP is a simple adaptive layering technique for making the Additive Increase Multiplicative Decrease (AIMD algorithms used by TCP more efficient in probing for the available link bandwidth. ALTCP uses a three-dimensional congestion control framework. First the macroscopic control is employed to layer quickly and made efficient by using available link bandwidth, second microscopic control is used for extends the existing AIMD algorithm of TCP to determine the per acknowledgement behavior. Third the intermediate control is employed for decoupling the aggregate throughout from the number of opened TCP flows in parallel. In this research paper ALTCP protocol is designed and analyzed based on ns-2 simulations. The results show that ALTCP has faster magnitude than TCP in utilizing high bandwidth links. ALTCP has better TCP friendliness and Round Trip Time (RTT fairness compared with high-speed protocols namely High-speed TCP and Scalable TCP.

  20. Interaction Control Protocols for Distributed Multi-user Multi-camera Environments

    Directory of Open Access Journals (Sweden)

    Gareth W Daniel

    2003-10-01

    Full Text Available Video-centred communication (e.g., video conferencing, multimedia online learning, traffic monitoring, and surveillance is becoming a customary activity in our lives. The management of interactions in such an environment is a complicated HCI issue. In this paper, we present our study on a collection of interaction control protocols for distributed multiuser multi-camera environments. These protocols facilitate different approaches to managing a user's entitlement for controlling a particular camera. We describe a web-based system that allows multiple users to manipulate multiple cameras in varying remote locations. The system was developed using the Java framework, and all protocols discussed have been incorporated into the system. Experiments were designed and conducted to evaluate the effectiveness of these protocols, and to enable the identification of various human factors in a distributed multi-user and multi-camera environment. This work provides an insight into the complexity associated with the interaction management in video-centred communication. It can also serve as a conceptual and experimental framework for further research in this area.

  1. Trust-based Access Control in Virtual Learning Community

    Science.gov (United States)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  2. Whole Body Vibration Exercise Protocol versus a Standard Exercise Protocol after ACL Reconstruction: A Clinical Randomized Controlled Trial with Short Term Follow-Up

    Directory of Open Access Journals (Sweden)

    Gereon Berschin

    2014-09-01

    Full Text Available The suitability and effectiveness of whole body vibration (WBV exercise in rehabilitation after injury of the anterior cruciate ligament (ACL was studied using a specially designed WBV protocol. We wanted to test the hypothesis if WBV leads to superior short term results regarding neuromuscular performance (strength and coordination and would be less time consuming than a current standard muscle strengthening protocol. In this prospective randomized controlled clinical trial, forty patients who tore their ACL and underwent subsequent ligament reconstruction were enrolled. Patients were randomized to the whole body vibration (n=20 or standard rehabilitation exercise protocol (n=20. Both protocols started in the 2nd week after surgery. Isometric and isokinetic strength measurements, clinical assessment, Lysholm score, neuromuscular performance were conducted weeks 2, 5, 8 and 11 after surgery. Time spent for rehabilitation exercise was reduced to less than a half in the WBV group. There were no statistically significant differences in terms of clinical assessment, Lysholm score, isokinetic and isometric strength. The WBV group displayed significant better results in the stability test. In conclusion, preliminary data indicate that our whole body vibration muscle exercise protocol seems to be a good alternative to a standard exercise program in ACL-rehabilitation. Despite of its significant reduced time requirement it is at least equally effective compared to a standard rehabilitation protocol.

  3. Protocol of an expertise based randomized trial comparing surgical Venae Sectio versus radiological Puncture of Vena Subclavia for insertion of Totally Implantable Access Port in oncological patients

    Directory of Open Access Journals (Sweden)

    Radeleff Boris

    2008-10-01

    Full Text Available Abstract Background Totally Implantable Access Ports (TIAP are being extensively used world-wide and can be expected to gain further importance with the introduction of new neoadjuvant and adjuvant treatments in oncology. Two different techniques for the implantation can be selected: A direct puncture of a central vein and the utilization of a Seldinger device or the surgical Venae sectio. It is still unclear which technique has the optimal benefit/risk ratio for the patient. Design A single-center, expertise based randomized, controlled superiority trial to compare two different TIAP implantation techniques. 100 patients will be included and randomized pre-operatively. All patients aged 18 years or older scheduled for primary elective implantation of a TIAP under local anesthesia who signed the informed consent will be included. The primary endpoint is the primary success rate of the randomized technique. Control Intervention: Venae Sectio will be employed to insert a TIAP by a surgeon; Experimental intervention: Punction of V. Subclavia will be used to place a TIAP by a radiologist. Duration of study: Approximately 10 months, follow up time: 90 days. Organisation/Responsibility The PORTAS 2 – Trial will be conducted in accordance with the protocol and in compliance with the moral, ethical, and scientific principles governing clinical research as set out in the Declaration of Helsinki (1989 and Good Clinical Practice (GCP. The Center of Clinical Trials at the Department of Surgery, University Hospital Heidelberg is responsible for design and conduct of the trial including randomization and documentation of patients' data. Data management and statistical analysis will be performed by the independent Institute for Medical Biometry and Informatics (IMBI, University of Heidelberg. Trial Registration The trial is registered at ClinicalTrials.gov (NCT00600444.

  4. A Semantic Context-Based Model for MobileWeb Services Access Control

    OpenAIRE

    Haibo Shen; Yu Cheng

    2011-01-01

    As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic context-based access control model (called SCBAC) to be applied in mobile web services environment by combining ...

  5. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    OpenAIRE

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  6. Safety systems and access control in the National Ignition Facility.

    Science.gov (United States)

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  7. Variable TDMA MAC Protocol For WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Minsuk; Jung; Yongseok; Chang; Jonghoon; Eom; Sungho; Kim

    2003-01-01

    A MAC(Media Access Control) protocol, one of the most important technologies for an EPON(Ethernet Passive Optical Network), contains a scheduling algorithm to avoid collisions in shared links and assigns an effective bandwidth when ONUs (Optical Network Units) transfer signals upward. The current paper proposes a MAC Protocol that operates a TDMA(Time method with a variable slot assignment to overcome short of bandwidth using by the number of n wavelength., the next generation access network. To verify ...

  8. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    that is suitable for video surveillance systems as well as other domains sharing similar requirements. As the currently dominant access control models – the role-based access control (RBAC) and the attribute-based access control (ABAC) – suffer from limitations while offering features complementary to each other...... while addressing the role- and permission-explosion issues faced in RBAC. Based on our access control model, we then present an access control mechanism for video surveillance systems. Contrary to the existing approaches, the proposed access control mechanism is role-oriented and retains advantages...... associated with role-based access control, yet it allows specification of policies using the metadata associated with the objects as well as the attributes of users and environment. In addition to role hierarchies, the content-based permissions in our model allow derivation of several permissions from...

  9. GMPLS: IP-Centric Control Protocols for Optical Networks(Tutorial)

    Institute of Scientific and Technical Information of China (English)

    Yaohui Jin; Weisheng Hu

    2003-01-01

    Recent advances in optical networking technologies, particularly DWDM and MEMS, promise the transmission and switching of huge bandwidth capacity. The carriers have convinced of that their revenue must be earned from efficient bandwidth management instead of unsophisticated increase in capacity. The distributed control plane can offer more flexibility, reliability and scalability, whose functions include addressing, resource and topology discovery, route computation, provisioning and restoration. Generalized Multi-Protocol Label Switching (GMPLS), an IP-centric control plane, inherit the best features of IP and ATM technologies in terms of QoS and traffic engineering. Besides,GMPLS introduces enhancements to the existing IP routing and signaling protocols by supporting not only packet switching networks (IP) and frame/cell switching networks (ATM), but also networks that perform switching in time (e.g. SDH/SONET, PDH, G.709), wavelength (lambdas), and space (fiber) domain.

  10. Weight-loss intervention using implementation intentions and mental imagery: a randomised control trial study protocol

    OpenAIRE

    Hattar, Anne; Hagger, Martin S.; Pal, Sebely

    2015-01-01

    Background Overweight and obesity are major health problems worldwide. This protocol describes the HEALTHI (Healthy Eating and Active LifesTyle Health Intervention) Program, a 12-week randomised-controlled weight-loss intervention that adopts two theory-based intervention techniques, mental imagery and implementation intentions, a behaviour-change technique based on planning that have been shown to be effective in promoting health-behaviour change in previous research. The effectiveness of go...

  11. Standard values of the upper body posture and postural control: a study protocol

    OpenAIRE

    Ohlendorf, Daniela; Mickel, Christoph; Filmann, Natalie; Wanke, Eileen M; Groneberg, David A

    2016-01-01

    Background Decisions on orthopedic interventions on upper body posture and its control have usually resulted from comparisons with the healthy state. Therefore, practitioners as well as scientists in human movement science or orthopedics need access to such kind of data which are patient-centered and well measured. Until now, these data have been missing concerning upper body posture as well as postural control and their control. That is why the aim of the current project is to measure these ...

  12. Physical aspects of quality assurance in radiotherapy: A protocol for quality control

    International Nuclear Information System (INIS)

    In consistency with the increasing requests from Member States for establishing radiotherapy programmes, an IAEA Technical Co-operation project was initiated in Latin America aimed at improving the physical aspects (as a complement to the clinical issues) of quality assurance in radiotherapy; this ARCAL XXX project (RLA/6/032) was classified as a Model Project of the IAEA. Among the important outcomes of the project were (i) the training of a considerable number of medical physicists in hospitals of the region, (ii) the development of a protocol for quality control procedures, and (iii) the organization of quality audit site visits (to the participant countries) where the implementation in hospitals of the developed quality control procedures is verified. The present publication is the protocol for quality control of the physical aspects of radiotherapy. It contains detailed procedures on what should be measured by a medical physicist in a radiotherapy treatment unit and related equipment, and how this should be made. The latter is made through several appendices, which make the document rather unique. The protocol was developed by medical physicists of the region for the professionals of the region, and it is the first document of this kind ever written in Spanish. A training course was organized in November 1998 (Havana, Cuba) where its practical implementation was taught. There are plans to have this document translated into different languages for the various regions having similar TC projects. (author)

  13. Plasticity-Inducing TMS Protocols to Investigate Somatosensory Control of Hand Function

    Directory of Open Access Journals (Sweden)

    M. Jacobs

    2012-01-01

    Full Text Available Hand function depends on sensory feedback to direct an appropriate motor response. There is clear evidence that somatosensory cortices modulate motor behaviour and physiology within primary motor cortex. However, this information is mainly from research in animals and the bridge to human hand control is needed. Emerging evidence in humans supports the notion that somatosensory cortices modulate motor behaviour, physiology and sensory perception. Transcranial magnetic stimulation (TMS allows for the investigation of primary and higher-order somatosensory cortices and their role in control of hand movement in humans. This review provides a summary of several TMS protocols in the investigation of hand control via the somatosensory cortices. TMS plasticity inducing protocols reviewed include paired associative stimulation, repetitive TMS, theta-burst stimulation as well as other techniques that aim to modulate cortical excitability in sensorimotor cortices. Although the discussed techniques may modulate cortical excitability, careful consideration of experimental design is needed to isolate factors that may interfere with desired results of the plasticity-inducing protocol, specifically events that may lead to metaplasticity within the targeted cortex.

  14. Multi-tag content access control in RFID system

    OpenAIRE

    Xue, Shun

    2010-01-01

    Radio Frequency Identification (RFID) makes great flexibility and high efficiency for data acquisition in industry and daily life. At the other side, it brings the privacy risks and multiple tags collision issue. Current research in RFID system focuses on the security and privacy issue which is based on authentication protocols between a tag and a Reader. There is a need to design a reasonable protocol which takes care of both multi-tag anti-collision and security issue. This thesis presen...

  15. Efficacy of Acute Pain Control Protocol in Triage Department on Analgesics Administration Time and Patients' Satisfaction

    Directory of Open Access Journals (Sweden)

    Seyedhossein Seyyedhoseini Davaraani

    2014-07-01

    Full Text Available Objective: Current study was conducted to develop a pain control protocol by Morphine Sulfate (MS Suppository in triage ward with the main primary outcomes of first analgesic administration time, patients' satisfaction and also the changes in pain intensity.Methods: In this randomized clinical trial, 318 consecutive patients attending to an academic tertiary health care center in Tehran, Iran in 2011 and 2012 were enrolled. The patients were randomly assigned to receive either routine pain control by emergency medicine residents in emergency department (n=132 or pain control protocol in triage level by nurses (n=186. Those with pain in control group were treated with conventional pain control program and those in intervention group with pain intensities higher than four were treated with suppository stat 10 mg dose of MS administered by nurses in triage ward.Results: The mean change in pain intensity was significantly (P<0.0001 higher in intervention group (4.2 versus 0.2 and the first analgesic administration time was significantly different between groups (P<0.05 being less in the intervention group (43.1 versus 4.6. Also the patients' satisfaction was significantly higher in the intervention group (P<0.0001. No drug adverse effects were seen.Conclusions: Totally, according to the obtained results, it may be concluded that acute pain control protocol in triage department by suppository of MS would result in reduced analgesics administration time and higher patients' satisfaction. Keywords: Analgesia; Emergency Department; Pain Control

  16. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel;

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC...... of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...... emergency response scenario which highlights the novel challenges that arise when enforcing access control in an environment with moving subjects and objects. To address a realistic application scenario, we consider movement on road networks, and we identify complex access control decisions relevant...

  17. Cross-layer rate control, medium access control and routing design in cooperative VANET

    OpenAIRE

    Zhou, Liang; Zheng, Baoyu; Geller, Benoit; Wei, Anne; Xu, Shan; Li, Yajun

    2008-01-01

    In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-layer design. At first, we introduce the cooperative communication conception to VANET, and propose an opportunistic cooperation strategy to improve the system performance. And then, we develop a cross-layer solution which consists of the link capacity detection with adjusting persistence probability at the MAC Layer, th...

  18. How to Improve the Accessibility and Reduce the Total Cost of Ownership with Ecolig Protocol and Android in Mobile Learning

    Directory of Open Access Journals (Sweden)

    Samira Muhammad Ismail

    2011-10-01

    Full Text Available A new electronic learning device generation can be created from a new paradigm in human sense and efferent resources. The brain computer interfaces (BCI with ECOLIG protocol can be used to get the advantages from “Near To Eye” and “Augmented Reality” technologies. In this way, this paper describes the results from an experiment using a mobile phone emulator system, a BCI and ECOLIG protocol to demonstrate the benefits in eliminating the use of touch screen and keyboards features. Finally, it concludes that ECOLIG can be a long life time communication technology between Human and Machines especially in a Singularity world.

  19. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R. Beulah Jayakumari

    2015-01-01

    Full Text Available Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol.

  20. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Jayakumari, R Beulah; Senthilkumar, V Jawahar

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol. PMID:26504898

  1. Road and street smart lighting control systems as a new application area of the hot-potato protocol

    DEFF Research Database (Denmark)

    Kiedrowski, Piotr; Gutierrez Lopez, Jose Manuel; Boniewicz, Piotr;

    2014-01-01

    This paper presents the new application area of the hot-potato routing protocol, which is a “last-mile” communication network for controlling systems of road and street lighting. Four variants of the hot-potato protocol are analyzed with use of the graph theory. For the assessment of the traffic ...

  2. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  3. Access Control Mechanisms for Semantic Web services-A Discussion on Requirements & Future Directions

    CERN Document Server

    Gondara, Mandeep Kaur

    2011-01-01

    Semantic Web is an open, distributed, and dynamic environment where access to resources cannot be controlled in a safe manner unless the access decision takes into account during discovery of web services. Security becomes the crucial factor for the adoption of the semantic based web services. An access control means that the users must fulfill certain conditions in order to gain access over web services. Access control is important in both perspectives i.e. legal and security point of view. This paper discusses important requirements for effective access control in semantic web services which have been extracted from the literature surveyed. I have also discussed open research issues in this context, focusing on access control policies and models in this paper.

  4. Implementing the Kyoto protocol in Europe: Interactions between international and Community controls

    International Nuclear Information System (INIS)

    This bibliographical note presents a book which discusses the coexistence of the Kyoto protocol and of a regional regime within the European Union for the actual application of rules requiring mechanisms of control. The international regime implements a continuous monitoring which combines conventional techniques and more intrusive procedures. The European Community introduced a non-contentious mechanism with a large and strong law basis and sanction ability. The author assesses the ability of the monitoring system as a whole to ensure the very credibility of the Protocol. She also assesses the reliability of international and community economic tools which aim at reducing greenhouse gas emissions at a minimum cost. She also discusses the desirable evolutions of the regime of struggle against climate changes

  5. Throughput Analysis of Power Control B-MAC Protocol In WSN

    Directory of Open Access Journals (Sweden)

    Ramchand V

    2012-07-01

    Full Text Available This paper presents a new methodology for energy consumption of nodes and throughput analysis has been performed through simulation for B-MAC protocol in Wireless Sensor Networks. The design includes transmission power control and multi-hop transmission of frames through adjusted transmitted power level. Proposed model reduces collision with contention level notification. The proposed model has been simulated using MATLAB. The simulations reveal better results for throughput of the proposed model as compared to B-MAC protocol. In this model we have included a mechanism for node discovery to find the location of the node before transmission of data to it. This increases the throughput of the network since the position of a dislocated node has been found, that results into successful transmission of frames.However, the energy consumption of a node increases due to energy consumed in node discovery.

  6. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  7. Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Directory of Open Access Journals (Sweden)

    Adebukola Onashoga

    2014-02-01

    Full Text Available Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as it relates to access control, a Role based Examination System (RBES was designed, developed and evaluated. RBES attempted to solve the security issue by the combination of two authentication techniques: text-based authentication and graphical password authentication. The Text-based authentication utilizes two text-based parameters namely the username and password. The graphical password authentication makes use of a finite set of controls (RBES chooses radio buttons which are identified by numbers. These numbers constitute the password used for graphical authentication. To improve on resource sharing among users in the examination system, RBES proposes role management (role creation, role update, role removal and user management (user creation, user update and user removal. The developed system made use of asp.net, C#, IIS server, WAMP server, Mysql and other tools for its development. RBES was tested by some legitimate and illegitimate users and the performance of the system was found to be satisfactory, hence RBES shows an efficient and reliable scheme that can be deployed in any examination or e-learning system. Finally the potential threats to the system were modeled and the use of weak passwords was found to be the most likely threat the system could be vulnerable to.

  8. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels

    Directory of Open Access Journals (Sweden)

    Seung Min Hur

    2009-06-01

    Full Text Available We study the problem of how to alleviate the exposed terminal effect in multihop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that schedules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multihop wireless networks.

  9. HIERARCHICAL ACCESS CONTROL IN DYNAMIC PEER GROUPS USING SYMMETRIC POLYNOMIAL AND TREE BASED GROUP ELLIPTIC CURVE DIFFIE HELLMAN SCHEME

    Directory of Open Access Journals (Sweden)

    Nafeesa Begum Jeddy

    2014-01-01

    Full Text Available Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inherently has hierarchical structures for functioning, where providing security by efficient group key management is a big challenging issue. While preserving centralized methods for hierarchical access control, it is difficult to achieve efficiency as a single membership change will result in lot of changes which are difficult to maintain. So, using distributed key agreement techniques is more appropriate for this scenario. This study explore on novel group key agreement approach, which combines both the symmetric polynomial scheme and Tree Based Group elliptic Curve key exchange. Also, it yields a secure protocol suite that is good in fault-tolerant and simple. The efficiency of SP-TGECDH is better than many other schemes. Using TGECDH makes the scheme suitable small Low powered devices.

  10. EVCP: a convergence time improved high-speed transport congestion control protocol

    Institute of Scientific and Technical Information of China (English)

    LU Guang; WANG Yong-chao; ZHU Miao-liang

    2007-01-01

    The Internet evolves to incorporate very-high-bandwidth optical links and more large-delay satellite links. TCP faces new challenges in this unique environment. Theory and experiments showed that TCP becomes inefficient and is prone to be unstable as the per-flow product of bandwidth and latency increases, regardless of the queuing scheme. Variable-structure congestion Control Protocol (VCP) is proposed to address these problems. However, VCP has problem in terms of convergence time,i.e., it takes a long time for a new VCP flow to achieve fair bandwidth allocation if the existing VCP flows have large congestion windows. This paper proposed an Extended Variable-structure congestion Control Protocol (EVCP), which adopted a convergence controller. The basic idea of convergence controller is that if a flow has larger window than its fair window, its congestion window should be decreased more aggressively than usual in Multiplicative Decrease (MD) phase. Simulations showed that EVCP has better performance in terms of convergence time while keeping the advantages of VCP.

  11. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  12. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  13. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    Science.gov (United States)

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  14. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access... Prescriptions § 1311.125 Requirements for establishing logical access control—Individual practitioner. (a) At... his two-factor authentication credential to satisfy the logical access controls. The second...

  15. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  16. Wi-Fi Networks Security and Accessing Control

    Directory of Open Access Journals (Sweden)

    Tarek S. Sobh

    2013-06-01

    Full Text Available As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

  17. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  18. Role-based access control through on-demand classification of electronic health record.

    Science.gov (United States)

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority.

  19. Role-based access control through on-demand classification of electronic health record.

    Science.gov (United States)

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  20. A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    OAM (Operations, Administration and Maintenance) system is a very important component of 3G cellular network. In order to acquire overall management, fast response and steady operation, an SCTP (Stream Control Transmission Protocol) based OAM, i. e. , SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its transport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experimental results prove the proposed SOAM system achieves better performance on signaling transmission compared with conventional TCP based OAM system.

  1. Perioperative Glycemic Control in Plastic Surgery: Review and Discussion of an Institutional Protocol.

    Science.gov (United States)

    Dortch, John D; Eck, Dustin L; Ladlie, Beth; TerKonda, Sarvam P

    2016-07-01

    Perioperative hyperglycemia is a well-known risk factor for surgical morbidity such as wound healing, infection, and prolonged hospitalization. This association has been reported for a number of surgical subspecialties, including plastic surgery. Specialty-specific guidelines have become increasingly available in the literature. Currently, glucose management guidelines for plastic surgery are lacking. Recognizing that multiple approaches exist for perioperative glucose, protocol-based models provide the necessary structure and guidance for approaching glycemic control. In this article, we review the influence of diabetes on outcomes in plastic surgery patients and propose a practical approach to perioperative blood glucose management based on current Endocrine Society and Mayo Clinic institutional guidelines. PMID:27301370

  2. APPLICATION OF NEWTON RAPHSON ALGORITHM FOR OPTIMIZING TRANSMISSION CONTROL PROTOCOL PERFORMANCE

    Directory of Open Access Journals (Sweden)

    J. Viji Priya

    2013-01-01

    Full Text Available Wireless networks are growing rapidly. TCP is the most widely-used protocol on Internet and so optimizing TCP performance is very important for fast efficient data transfer. The different existing TCP variants and solutions they have not been analyzed together to identify the bottlenecks in wireless networks. TCP has a major problem in its congestion control algorithm which does not allow the flow to achieve the full available bandwidth on fast long-distance links. This problem has been studied in this study using a new high speed congestion control TCP protocol based on the Newton Raphson algorithm This study further analyses involving six TCP performance evaluation constraints namely, TCP full bandwidth utilization, throughput, packet loss rate, fairness in sharing bandwidth, friendliness in short-RTT and long-RTT and these constraints are used to evaluate the proposed Newton Raphson Congestion Control (NRC-TCP performance. This study shows that the proposed algorithm performs better compared with the other methods of application.

  3. The "Healthy Habits, Healthy Girls" randomized controlled trial for girls: study design, protocol, and baseline results.

    Science.gov (United States)

    Leme, Ana Carolina Barco; Philippi, Sonia Tucunduva

    2015-07-01

    The purpose of this article is to describe the study design, protocol, and baseline results of the "Healthy Habits, Healthy Girls" program. The intervention is being evaluated through a randomized controlled trial in 10 public schools in the city of São Paulo, Brazil. Data on the following variables were collected and assessed at baseline and will be reevaluated at 7 and 12 months: body mass index, waist circumference, dietary intake, nutrition, physical activity, social cognitive mediators, physical activity level, sedentary behaviors, self-rated physical status, and overall self-esteem. According to the baseline results, 32.4% and 23.4% of girls were overweight in the intervention and control groups, respectively, and in both groups a higher percentage failed to meet daily recommendations for moderate and vigorous physical activity and maximum screen time (TV, computer, mobile devices). There were no significant differences between the groups for most of the variables, except age (p = 0.000) and waist circumference (p = 0.014). The study showed a gap in the Brazilian literature on protocols for randomized controlled trials to prevent obesity among youth. The current study may thus be an important initial contribution to the field. PMID:26248094

  4. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  5. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  6. A Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Bhagyashree S kayarkar

    2014-12-01

    Full Text Available In mobile ad hoc networks (MANET congestion can take place between the two intermediate nodes, when the packet is transferred from the source to the destination. The congestion in MANET is mainly due to frequent change to topology and high mobility of nodes, which lead to high loss of packet. In ad hoc network the congestion control techniques with TCP becomes difficult to handle since in ad hoc network there is high density of nodes in the network and there is frequent change to topology in the network. In this paper to control the congestion in proactive source routing protocol an error message is generated by the receiver to reduce the packet sending rate. We are using a new control message i.e., Packet Error Announcing Message called (PEAM messages.

  7. "hCG priming" effect in controlled ovarian stimulation through a long protocol

    Directory of Open Access Journals (Sweden)

    Antsaklis Aris

    2009-08-01

    Full Text Available Abstract Background Recently, it has been demonstrated that, in patients down-regulated by GnRH analogues (GnRHa, a short-term pre-treatment with recombinant LH (rLH, prior to recombinant FSH (rFSH administration, increases the number of small antral follicle prior to FSH stimulation and the yield of normally fertilized embryos. However, no data exist in the literature regarding the potential beneficial effect of "hCG priming" in controlled ovarian hyperstimulation (COH through a long GnRH-a protocol, which binds the same receptor (LH/hCGR, though it is a much more potent compared to LH. The primary aims of this study were to assess the effect of short-term pre-rFSH administration of hCG in women entering an ICSI treatment cycle on follicular development, quality of oocytes and early embryo development. The secondary endpoints were to record the effects on endometrial quality and pregnancy rate. Methods Patients with a history of at least one previous unsuccessful ICSI cycle were randomly assigned into two groups to receive treatment with either a long protocol with rFSH (control group or a long protocol with rFSH and pre-treatment with hCG (hCG group. In particular, in the latter group, a fixed 7 days course of 200 IU/day hCG was administered as soon as pituitary desensitization was confirmed. Results The mean number of oocytes retrieved was not significantly different between the two treatment groups, although the percentage of mature oocytes tended to be higher but not significantly different in hCG-treated patients. The percentage of patients with more than one grade 3 embryos was higher in the pre-treatment group, which also showed a higher pregnancy rate. Conclusion All the above clinical observations, in conjunction with previous data, suggest a point towards a beneficial "hCG priming" effect in controlled ovarian hyperstimulation through a long GnRH-a down-regulation protocol, particularly in patients with previous ART failures.

  8. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  9. An effective access control approach to support mobility in IPv6 networks

    Science.gov (United States)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  10. Sensors on speaking terms : schedule-based medium access control protocols for wireless sensor networks

    NARCIS (Netherlands)

    Hoesel, van Lodewijk Frans Willem

    2007-01-01

    Wireless sensor networks make the previously unobservable, observable. The basic idea behind these networks is straightforward: all wires are cut in traditional sensing systems and the sensors are equipped with batteries and radio’s to virtually restore the cut wires. The resulting sensors can be pl

  11. Efficacy of smoking prevention program 'Smoke-free Kids': study protocol of a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    van Schayck Onno CP

    2009-12-01

    Full Text Available Abstract Background A strong increase in smoking is noted especially among adolescents. In the Netherlands, about 5% of all 10-year olds, 25% of all 13-year olds and 62% of all 17-year olds report ever smoking. In the U.S., an intervention program called 'Smoke-free Kids' was developed to prevent children from smoking. The present study aims to assess the effects of this home-based smoking prevention program in the Netherlands. Methods/Design A randomized controlled trial is conducted among 9 to 11-year old children of primary schools. Participants are randomly assigned to the intervention and control conditions. The intervention program consists of five printed activity modules designed to improve parenting skills specific to smoking prevention and parent-child communication regarding smoking. These modules will include additional sheets with communication tips. The modules for the control condition will include solely information on smoking and tobacco use. Initiation of cigarette smoking (first instance of puffing on a lighted cigarette, susceptibility to cigarette smoking, smoking-related cognitions, and anti-smoking socialization will be the outcome measures. To collect the data, telephone interviews with mothers as well as with their child will be conducted at baseline. Only the children will be examined at post-intervention follow-ups (6, 12, 24, and 36 months after the baseline. Discussion This study protocol describes the design of a randomized controlled trial that will evaluate the effectiveness of a home-based smoking prevention program. We expect that a significantly lower number of children will start smoking in the intervention condition compared to control condition as a direct result of this intervention. If the program is effective, it is applicable in daily live, which will facilitate implementation of the prevention protocol. Trial registration Netherlands Trial Register NTR1465

  12. On the Decidability of the Safety Problem for Access Control Policies

    OpenAIRE

    Kleiner, Eldar; Newcomb, Tom

    2006-01-01

    An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is not obvious via human inspection; there is, therefore, a need for automated verification techniques that can check whether a policy does indeed implement some desired security requirement. Thirty years ago, a formalisation of access control presented a model and a safety specification for which satisfaction is undecida...

  13. Physical aspects of radiotherapy quality assurance: quality control protocol - Update of IAEA TECDOC-1151

    International Nuclear Information System (INIS)

    An International Atomic Energy Agency (IAEA) regional project for Latin America (ARCAL XXX) entitled ''Improvement of Quality Assurance in Radiotherapy'' was completed in 2000. One of its more relevant contributions was the development of a quality control protocol for radiotherapy physics, published as an IAEA TECDOC. This was the first document of this type published entirely in Spanish, having a marked practical approach, and focused on the situation of the radiotherapy in Latin America at that time. The document found broad application and was widely adopted in the region. The recommendations and guidelines of the document were also applied in other countries having a similar level of development in radiotherapy. Since the publication of TECDOC-1151, the status of radiotherapy has changed significantly in many of the radiotherapy institutions in the Latin American region. Technological advances and improvements have created the need for a thorough revision of the protocol to reflect the current situation regarding radiotherapy equipment and techniques, keeping it a suitable and practical tool to guarantee high quality in the nowadays rather complex radiotherapy treatments. To fulfill this goal, a specific task was included in the IAEA regional project ''Improvements in Quality Assurance in Radiotherapy in the Latin American Region'' (ARCAL XC), running during the period 2007-2009, where a group of experts was formed and commissioned with the document revision. The general criteria and procedures given in TECDOC-1151 are still valid for basic radiotherapy equipment, widely disseminated and playing an important role in clinical practice in the region. It was then considered to develop additional criteria and recommendations for the new advanced technologies in the form of a supplement to the existing protocol. The supplement describes procedures and provides recommendations for newly introduced radiotherapy equipment, followed by a series of appendixes where

  14. 单兵作战系统中信息监听冲突消除技术研究%Conflict-Eliminated Channel Access of MAC Protocol in IISCS

    Institute of Scientific and Technical Information of China (English)

    杨令兴; 张喜斌; 魏小龙; 马二涛; 冯文斌

    2013-01-01

    The static slot allocation TDMA channel access algorithms used in Integrated Individual Soldier Combat System ( IISCS ) are not adaptable to the demand of large battlefield network and autonomous operation.To solve the problem,we proposed a dynamic slot allocation TDMA access algorithm of MAC protocol,named C-TDMA,based on consumption algorithm and binary tree slot allocation algorithm .The access conflicts are eliminated in the control slot by multiple RTS/CTS.The consumption arithmetic is used to control the data flow and improve fairness access of different services on the basis of delay quality,and the binary tree slot allocation algorithm is used for distributed network environment .The simulation results indicate that real-time services can be supported by C-TDMA protocol in heavy-load and mixed-service in IISCS,which presents good performance on access efficiency .%针对当前单兵作战系统通信网络中所采用的固定分配TDMA算法不能适应大型战场环境和自组织运行需求的问题,提出一种基于消费算法和二叉树时隙分配算法的动态时隙分配TDMA算法,即C-TDMA算法,通过多组载波监听消除接入冲突,在保证延时的基础上使用消费算法控制节点分组发送量,提高信道接入公平性,同时通过二叉树时隙分配算法支持网络分布式运行。仿真结果表明,对于负载较重、传输混合业务且时延敏感的单兵作战系统网络,该算法可以消除接入冲突,提高信道吞吐率。

  15. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class...... Barring solution. We then provide a brief overview of the Load Control solutions provided by the Enhanced Packet Core (EPC) Network and how they intertwine with the Extended Access Barring at the Enhanced Universal Terrestrial Radio Access Network (E-UTRAN). We also provide an outlook on the current 3GPP...... efforts in regards to MTC related load control issues....

  16. Implementation of the quality control protocol in Crawls; Puesta en marcha del protocolo de control de calidad en rastreos

    Energy Technology Data Exchange (ETDEWEB)

    Ambroa Rey, E. M.; Gimenez Insua, M.; Vazquez Vazquez, R.; Sanchez Garcia, M.; Luna Vega, V.; Mosquera Suero, J.; Otero Martinez, C.; Lobato Busto, R.; Pombar Camean, M.

    2013-07-01

    Bone scintigraphy is a test widely used in Nuclear Medicine of our service. 33% of the tests performed are of this type, so it is necessary to develop a specific quality control protocol for the tracking of the gamma camera acquisitions. This type of procurement means the mechanical movement of the stretcher, with a static initial phase in which the movement of the stretcher is replaced by the gradual opening of the field of view (electronic window). This creates the density of accounts to be uniform throughout the study. The presence of a movement mechanical and co-registration with the static phase implies the need for specific tests. (Author)

  17. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  18. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, Mohsen; Sadighi, Babak

    2010-01-01

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based admin

  19. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  20. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13, 2012... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security...

  1. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security...

  2. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15, 2012... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security...

  3. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from 9... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security...

  4. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  5. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  6. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28, 2012... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security...

  7. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10, 2013... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security...

  8. A Secure Time-Stamp Based Concurrency Control Protocol For Distributed Databases

    Directory of Open Access Journals (Sweden)

    Shashi Bhushan

    2007-01-01

    Full Text Available In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper we presented a secure concurrency control protocol (SCCP based on the timestamp ordering, which provides concurrency control and maintains security. We also implemented SCCP and a comparison of SCCP is presented in three cases (High, Medium and Low security levels. In this experiment, It is observed that throughput of the system decreases as the security level of the transaction increases, i.e., there is tradeoff between the security level and the throughput of the system.

  9. Medium access control and hardware prototype designs for low-energy wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Kohvakka, M.

    2009-07-01

    A Wireless Sensor Network (WSN) is an emerging technology consisting of small, cheap, and ultra-low energy sensor nodes, which cooperatively monitor physical quantities, actuate, and perform data processing tasks. A deployment may comprise thousands of randomly distributed autonomous nodes, which must self-configure and create a multi-hop network topology.This thesis focuses on low-energy WSNs targeting to long network lifetime. The main research problem is the combination of adaptive and scalable multi-hop networking with constrained energy budget, processing power, and communication bandwidth. The research problem is approached by energy-efficient protocols and low-power sensor node platforms. The main contribution of this thesis is an energy-efficient Medium Access Control (MAC) design for TUTWSN (Tampere University of Technology Wireless Sensor Network). The design comprises channel access and networking mechanisms, which specify data exchange, link synchronization, network self-configuration, and neighbor discovery operations. The second outcome are several low-power sensor node platforms, which have been designed and implemented to evaluate the performance of the MAC design and hardware components in real deployments. The third outcome are the performance models and analysis of several MAC designs including TUTWSN, IEEE 802.15.4, and the most essential research proposals.The results and conclusion of this Thesis indicate that it is possible to implement multi-hop WSNs in harsh and dynamic operation conditions with years of lifetime using current low-cost components and batteries. Energy analysis results indicate that the lowest energy consumption is achieved by using simple and high data-rate transceivers. It is also critical to minimize sleep mode power consumption of all components and to use accurate wake-up timers. However, the selection of components constitutes only a minor part of the solution, and an energy-efficient MAC layer design being able to

  10. Monitoring of high voltage supply using the Controller Area Network protocol

    Energy Technology Data Exchange (ETDEWEB)

    Luz, Igo Amauri dos S.; Farias, Paulo Cesar M.A.; Guedes, Germano P. [Universidade Estadual de Feira de Santana (UEFS), BA (Brazil)

    2011-07-01

    Full text: In recent years, experimental physics has made great progress in the investigation of the phenomenology of neutrinos, with significant contribution from experiments using nuclear reactors as source of particles. In this context, The Neutrinos Angra Project proposes the use of an anti-neutrinos detector with ability to monitor parameters related to the activity of nuclear reactors. One of the tasks defined in the project is the development of a system to control and to monitor the high voltage supply units used by the photomultiplier tubes (PMTs) of the detector. The solution proposed in this work is based on the use of microcontrollers, from Microchip PIC family to adjust the operating point of the high voltage supply units and to acquire the current and output voltage data. Analysis of these data allows the effective control of the gain of the PMTs and to identify anomalous operational conditions. In this work is proposed the study of the Controller Area Network (CAN) protocol and the implementation of a laboratory network to reproduce the typical operations of data acquisition and information transfer between the nodes. The development of this network is divided in two stages. The first part consisted of the setup of a CAN network, using the PIC18F2680 microcontroller, which has the CAN protocol internally implemented. This network serves as a reduced model of the final system, allowing simulation of typical situations of data acquisition and transmission between the nodes and a computer. In the second part of the work, the PIC18F4550 microcontroller was associated with the external CAN controller MCP2515 to develop a CAN/USB converter. This converter provides a new communication channel between network nodes and the computer, in addition to the RS232 interface. (author)

  11. An Access Control Metamodel for Web Service-Oriented Architecture

    OpenAIRE

    Emig, Christian; Brandt, Frank; Abeck, Sebastian; Biermann, Jürgen; Klarl, Heiko

    2008-01-01

    With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web service-oriented architecture (WSOA) has been established. Considering the momentum observable by the growing number of specifications in the web service domain for the indispensable cross-cutting concern of identity management (IdM) it is still an open issue how a WSOA-aware IdM architecture is built and how it is link...

  12. A dynamic access control method based on QoS requirement

    Science.gov (United States)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  13. The Study of Access Control for Service-Oriented Computing in Internet of Things

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2012-06-01

    Full Text Available In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC, and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  14. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.;

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  15. Exploring the impact of a decision support intervention on vascular access decisions in chronic hemodialysis patients: study protocol

    Directory of Open Access Journals (Sweden)

    Donnelly Sandra

    2011-02-01

    Full Text Available Abstract Background In patients with Stage 5 Chronic Kidney Disease who require renal replacement therapy a major decision concerns modality choice. However, many patients defer the decision about modality choice or they have an urgent or emergent need of RRT, which results in them starting hemodialysis with a Central Venous Catheter. Thereafter, efforts to help patients make more timely decisions about access choices utilizing education and resource allocation strategies met with limited success resulting in a high prevalent CVC use in Canada. Providing decision support tailored to meet patients' decision making needs may improve this situation. The Registered Nurses Association of Ontario has developed a clinical practice guideline to guide decision support for adults living with Chronic Kidney Disease (Decision Support for Adults with Chronic Kidney Disease. The purpose of this study is to determine the impact of implementing selected recommendations this guideline on priority provincial targets for hemodialysis access in patients with Stage 5 CKD who currently use Central Venous Catheters for vascular access. Methods/Design A non-experimental intervention study with repeated measures will be conducted at St. Michaels Hospital in Toronto, Canada. Decisional conflict about dialysis access choice will be measured using the validated SURE tool, an instrument used to identify decisional conflict. Thereafter a tailored decision support intervention will be implemented. Decisional conflict will be re-measured and compared with baseline scores. Patients and staff will be interviewed to gain an understanding of how useful this intervention was for them and whether it would be feasible to implement more widely. Quantitative data will be analyzed using descriptive and inferential statistics. Statistical significance of difference between means over time for aggregated SURE scores (pre/post will be assessed using a paired t-test. Qualitative analysis

  16. The mPED randomized controlled clinical trial: applying mobile persuasive technologies to increase physical activity in sedentary women protocol

    Directory of Open Access Journals (Sweden)

    Fukuoka Yoshimi

    2011-12-01

    Full Text Available Abstract Background Despite the significant health benefits of regular physical activity, approximately half of American adults, particularly women and minorities, do not meet the current physical activity recommendations. Mobile phone technologies are readily available, easily accessible and may provide a potentially powerful tool for delivering physical activity interventions. However, we need to understand how to effectively apply these mobile technologies to increase and maintain physical activity in physically inactive women. The purpose of this paper is to describe the study design and protocol of the mPED (mobile phone based physical activity education randomized controlled clinical trial that examines the efficacy of a 3-month mobile phone and pedometer based physical activity intervention and compares two different 6-month maintenance interventions. Methods A randomized controlled trial (RCT with three arms; 1 PLUS (3-month mobile phone and pedometer based physical activity intervention and 6-month mobile phone diary maintenance intervention, 2 REGULAR (3-month mobile phone and pedometer based physical activity intervention and 6-month pedometer maintenance intervention, and 3 CONTROL (pedometer only, but no intervention will be conducted. A total of 192 physically inactive women who meet all inclusion criteria and successfully complete a 3-week run-in will be randomized into one of the three groups. The mobile phone serves as a means of delivering the physical activity intervention, setting individualized weekly physical activity goals, and providing self-monitoring (activity diary, immediate feedback and social support. The mobile phone also functions as a tool for communication and real-time data capture. The primary outcome is objectively measured physical activity. Discussion If efficacy of the intervention with a mobile phone is demonstrated, the results of this RCT will be able to provide new insights for current behavioral

  17. CIRS: A State-Conscious Concurrency Control Protocol for Replicated Real-Time Databases

    Directory of Open Access Journals (Sweden)

    Vishal Pathak,

    2011-01-01

    Full Text Available Replication [5] is the technique of using multiple copies of a server or a resource for better availability and performance.Each copy is called a replica. The main goal of replication is to improve availability, since a service is available even if some of its replicas are not. This helps mission critical services, such as many financial systems or reservation systems, where even a short outage can be very disruptive and expensive.A prerequisite for realizing the banefits of replication, however, is the devlopement of high erformance concurrency machenism. Current applications, such as Web-based services, electronic commerce, mobile telecommunication system, etc., are distributed in nature and manipulate time-critical databases. In order to enhance the performance and the availability of such applications, one of the main techniques is to replicate data on multiple sites of the network. Therefore, the major issue is to develop efficient replica concurrency control protocols that are able to tolerate the overload of the distributed system. In fact, if the system is not designed to handle overloads, the effects can be catastrophic and some primordial transactions of the application can miss their deadlines. In this paper we present CIRS (Concurrency control In Replicated realtime Systems a state conscious concurrency control protocol in replicated distributed environment which is specially for firm realtime database system. CIRS mechanism uses S2PL (Static Two Phase Locking for deadlock free environment.It also includes veto power given to a cohort after receiving PREPARE message from its coordinator. Also with some more assumptions like sending an extra message in execution phase but after completionof execution at local copy which is described later in this paper the proposed mechanism has a significant increased performance over O2PL and MIRROR in decreasing execution time of the current transaction and it also decreases the waiting time of

  18. Risk access control model for Hadoop%面向Hadoop的风险访问控制模型

    Institute of Scientific and Technical Information of China (English)

    李甲帅; 彭长根; 朱义杰; 马海峰

    2016-01-01

    Traditional access control models are hard to restrain the malicious behavior of authorized users. Accord-ingly, Hadoop platform with this access control model is difficult to prevent the risk of privacy disclosure. A model of access control based on risk was proposed. A risk function of information entropy was designed from users’ his-torical behavior based on setting the tags of subject and object. Furthermore, the tracking chain of risk was built, which could adjust the users’ access authority dynamically according to the risk value and its volatility. Combining with access token and risk supervision, the risk access control mechanism for big data privacy protection was real-ized, which could be applied to enhance the security of Hadoop Kerberos protocol. Finally, the experiment result shows that the model can constrain the authorized users’ access behavior effectively.%传统的访问控制机制难以约束授权用户的恶意行为,使得采用这种访问控制机制的Hadoop平台面临着大数据隐私泄露的风险。提出了一种基于风险的访问控制模型,该模型通过对主体和客体标签的设定,根据用户的历史行为记录构造信息熵风险值计算函数,并进一步建立风险值波动的追踪链,通过风险值及其波动幅度动态调整用户的访问权限。将该模型应用于Hadoop的Kerberos认证协议的改进,结合访问令牌及风险监测实现大数据隐私保护风险访问控制机制。最后,针对医疗大数据进行应用仿真,实验表明该模型可以有效约束大数据应用平台中授权用户的访问行为。

  19. Multi-channel MAC Protocol in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Yongli Sun

    2013-11-01

    Full Text Available Since cognitive wireless network (CRN has the characteristic of secondary use, it can enable the device to dynamically access available spectrum without interference to primary users (PUs, which can effectively alleviate contradiction between the lack of spectrum resources and the growing demand for wireless access. However, Medium Access Control (MAC protocol as CRN core components, can achieve competition access of the licensed spectrum and coordination control, which will maximize spectrum utilization efficiency and network throughput. The contribution of this survey is threefold. First, we analyze the characteristics of the existed multi- channel MAC protocol in CRN; Second, according to the different ways of spectrum access in CRNs, the multi-channel MAC protocols are classified into time-slotted based MAC protocol, control channel based MAC protocol and hybrid MAC protocol, and the paper emphatically analyzed the advantages and disadvantages of these multi-channel MAC protocols; Finally, the paper explores the difficulties and the challenges of multi-channel MAC protocols design in cognitive wireless network.

  20. Genetic test feedback with weight control advice: study protocol for a randomized controlled trial

    OpenAIRE

    Meisel Susanne F; Beeken Rebecca J; van Jaarsveld Cornelia HM; Wardle Jane

    2012-01-01

    Abstract Background Genetic testing for risk of weight gain is already available over the internet despite uncertain benefits and concerns about adverse emotional or behavioral effects. Few studies have assessed the effect of adding genetic test feedback to weight control advice, even though one of the proposed applications of genetic testing is to stimulate preventive action. This study will investigate the motivational effect of adding genetic test feedback to simple weight control advice i...

  1. Genetic test feedback with weight control advice: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Meisel Susanne F

    2012-12-01

    Full Text Available Abstract Background Genetic testing for risk of weight gain is already available over the internet despite uncertain benefits and concerns about adverse emotional or behavioral effects. Few studies have assessed the effect of adding genetic test feedback to weight control advice, even though one of the proposed applications of genetic testing is to stimulate preventive action. This study will investigate the motivational effect of adding genetic test feedback to simple weight control advice in a situation where weight gain is relatively common. Methods/design First-year university students (n = 800 will be randomized to receive either 1 their personal genetic test result for a gene (FTO related to weight gain susceptibility in addition to a leaflet with simple weight control advice (‘Feedback + Advice’ group, FA, or 2 only the leaflet containing simple weight control advice (‘Advice Only’ group, AO. Motivation to avoid weight gain and active use of weight control strategies will be assessed one month after receipt of the leaflet with or without genetic test feedback. Weight and body fat will be measured at baseline and eight months follow-up. We will also assess short-term psychological reactions to the genetic test result. In addition, we will explore interactions between feedback condition and gene test status. Discussion We hope to provide a first indication of the clinical utility of weight-related genetic test feedback in the prevention context. Trial registration Current controlled trials ISRCTN91178663

  2. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    CERN Document Server

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  3. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  4. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    CERN Document Server

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  5. Design of Active Queue Management for Robust Control on Access Router for Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Åhlund Christer

    2011-01-01

    Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.

  6. Development of SRS.php, a Simple Object Access Protocol-based library for data acquisition from integrated biological databases.

    Science.gov (United States)

    Barbosa-Silva, A; Pafilis, E; Ortega, J M; Schneider, R

    2007-12-11

    Data integration has become an important task for biological database providers. The current model for data exchange among different sources simplifies the manner that distinct information is accessed by users. The evolution of data representation from HTML to XML enabled programs, instead of humans, to interact with biological databases. We present here SRS.php, a PHP library that can interact with the data integration Sequence Retrieval System (SRS). The library has been written using SOAP definitions, and permits the programmatic communication through webservices with the SRS. The interactions are possible by invoking the methods described in WSDL by exchanging XML messages. The current functions available in the library have been built to access specific data stored in any of the 90 different databases (such as UNIPROT, KEGG and GO) using the same query syntax format. The inclusion of the described functions in the source of scripts written in PHP enables them as webservice clients to the SRS server. The functions permit one to query the whole content of any SRS database, to list specific records in these databases, to get specific fields from the records, and to link any record among any pair of linked databases. The case study presented exemplifies the library usage to retrieve information regarding registries of a Plant Defense Mechanisms database. The Plant Defense Mechanisms database is currently being developed, and the proposal of SRS.php library usage is to enable the data acquisition for the further warehousing tasks related to its setup and maintenance.

  7. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  8. MULTI - TRACER CONTROL ROOM AIR INLEAKAGE PROTOCOL AND SIMULATED PRIMARY AND EXTENDED MULTI - ZONE RESULTS.

    Energy Technology Data Exchange (ETDEWEB)

    DIETZ,R.N.

    2002-01-01

    The perfluorocarbon tracer (PFT) technology can be applied simultaneously to the wide range in zonal flowrates (from tens of cfms in some Control Rooms to almost 1,000,000 cfm in Turbine Buildings), to achieve the necessary uniform tagging for subsequent determination of the desired air inleakage and outleakage from all zones surrounding a plant's Control Room (CR). New types of PFT sources (Mega sources) were devised and tested to handle the unusually large flowrates in a number of HVAC zones in power stations. A review of the plans of a particular nuclear power plant and subsequent simulations of the tagging and sampling results confirm that the technology can provide the necessary concentration measurement data to allow the important ventilation pathways involving the Control Room and its air flow communications with all adjacent zones to be quantitatively determined with minimal uncertainty. Depending on need, a simple single or 3-zone scheme (involving the Control Room alone or along with the Aux. Bldg. and Turbine Bldg.) or a more complex test involving up to 7 zones simultaneously can be accommodated with the current revisions to the technology; to test all the possible flow pathways, several different combinations of up to 7 zones would need to be run. The potential exists that for an appropriate investment, in about 2 years, it would be possible to completely evaluate an entire power plant in a single extended multizone test with up to 12 to 13 separate HVAC zones. With multiple samplers in the Control Room near each of the contiguous zones, not only will the prevalent inleakage or outleakage zones be documented, but the particular location of the pathway's room of ingress can be identified. The suggested protocol is to perform a 3-zone test involving the Control Room, Aux. Bldg., and Turbine Bldg. to (1) verify CR total inleakage and (2) proportion that inleakage to distinguish that from the other 2 major buildings and any remaining untagged

  9. Multi-agent controlled teleportation of multi-qubit quantum information via two-step protocol

    Institute of Scientific and Technical Information of China (English)

    Yang Jie

    2005-01-01

    Utilizing both the general quantum teleportation and the two-step protocol, a new method is presented by which multi-qubit quantum information can be teleported in a much easier way from a sender Alice to a receiver Bob via the control of many agents in a network than by Yang et al's method. In this method, only all the agents collaborate with Bob can the unknown states in Alice's qubits be fully reconstructed in Bob's qubits. Comparisons between the method and Yang et al's method are made. Results show that, in this method, the preparation difficulty of initial states and the identification difficulty of entangled states are considerably reduced, new method is more feasible in technique, and Hadamard operations are not needed at all.

  10. Craniosacral therapy for migraine: Protocol development for an exploratory controlled clinical trial

    Directory of Open Access Journals (Sweden)

    Coeytaux Remy R

    2008-06-01

    have withdrawn from the study after giving consent. Conclusion This report endorses the feasibility of undertaking a rigorous randomized clinical trial of CST for migraine using a standardized CST protocol and an innovative control protocol developed for the study. Subjects are able and willing to complete detailed headache diaries during an 8-week baseline period, with few dropouts during the study period, indicating the acceptability of both interventions. Trial Registration ClinicalTrials.gov NCT00665236

  11. Immediate vs. delayed insertion of intrauterine contraception after second trimester abortion: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Soon Judith A

    2011-06-01

    Full Text Available Abstract Background We describe the rationale and protocol for a randomized controlled trial (RCT to assess whether intrauterine contraception placed immediately after a second trimester abortion will result in fewer pregnancies than current recommended practice of intended placement at 4 weeks post-abortion. Decision analysis suggests the novel strategy could substantially reduce subsequent unintended pregnancies and abortions. This paper highlights considerations of design, implementation and evaluation of a trial expected to provide rigorous evidence for appropriate insertion timing and health economics of intrauterine contraception after second trimester abortion. Methods/Design Consenting women choosing to use intrauterine contraception after abortion for a pregnancy of 12 to 24 weeks will be randomized to insertion timing groups either immediately (experimental intervention or four weeks (recommended care post abortion. Primary outcome measure is pregnancy rate at one year. Secondary outcomes include: cumulative pregnancy rates over five year follow-up period, comprehensive health economic analyses comparing immediate and delayed insertion groups, and device retention rates, complication rates (infection, expulsion and, contraceptive method satisfaction. Web-based Contraception Satisfaction Questionnaires, clinical records and British Columbia linked health databases will be used to assess primary and secondary outcomes. Enrolment at all clinics in the province performing second trimester abortions began in May 2010 and is expected to complete in late 2011. Data on one year outcomes will be available for analysis in 2014. Discussion The RCT design combined with access to clinical records at all provincial abortion clinics, and to information in provincial single-payer linked administrative health databases, birth registry and hospital records, offers a unique opportunity to evaluate such an approach by determining pregnancy rate at one

  12. Cooperative MIMO Transmissions in WSN Using Threshold Based MAC Protocol

    OpenAIRE

    Vidhya, J.; Dananjayan, P.

    2010-01-01

    Sensor networks require robust and efficient communication protocols to maximise the network lifetime.Radio irregularity, channel fading and interference results in larger energy consumption and latency forpacket transmission over wireless channel. Cooperative multi-input multi-output (MIMO) schemes whenincorporated in wireless senor network (WSN) can significantly improve the communicationperformance. An inefficiently designed medium access control (MAC) protocol however, may diminishthe per...

  13. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  14. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  15. A Semantic Context-Based Model for MobileWeb Services Access Control

    Directory of Open Access Journals (Sweden)

    Haibo Shen

    2011-02-01

    Full Text Available As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic context-based access control model (called SCBAC to be applied in mobile web services environment by combining semantic web technologies with context-based access control mechanism. The proposed model is a context-centric access control solutions, context is the first-class principle that explicitly guides both policy specification and enforcement process. In order to handle context information in the model, this paper proposes a context ontology to represent contextual information and employ it in the inference engine. As well as, this paper specifies access control policies as rules over ontologies representing the concepts introduced in the SCBAC model, and uses semantic web rule language (SWRL to form policy rule and infer those rules by JESS inference engine. The proposed model can also be applied to context-aware applications.

  16. Anonymous authentication protocol for multi-services in wireless environments

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.

  17. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    Science.gov (United States)

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  18. Peer mentorship to promote effective pain management in adolescents: study protocol for a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Hayes Loran P

    2011-05-01

    Full Text Available Abstract Background This protocol is for a study of a new program to improve outcomes in children suffering from chronic pain disorders, such as fibromyalgia, recurrent headache, or recurrent abdominal pain. Although teaching active pain self-management skills through cognitive-behavioral therapy (CBT or a complementary program such as hypnotherapy or yoga has been shown to improve pain and functioning, children with low expectations of skill-building programs may lack motivation to comply with therapists' recommendations. This study will develop and test a new manualized peer-mentorship program which will provide modeling and reinforcement by peers to other adolescents with chronic pain (the mentored participants. The mentorship program will encourage mentored participants to engage in therapies that promote the learning of pain self-management skills and to support the mentored participants' practice of these skills. The study will examine the feasibility of this intervention for both mentors and mentored participants, and will assess the preliminary effectiveness of this program on mentored participants' pain and functional disability. Methods This protocol will recruit adolescents ages 12-17 with chronic pain and randomly assign them to either peer mentorship or a treatment-as-usual control group. Mentored participants will be matched with peer mentors of similar age (ages 14-18 who have actively participated in various treatment modalities through the UCLA Pediatric Pain Program and have learned to function successfully with a chronic pain disorder. The mentors will present information to mentored participants in a supervised and monitored telephone interaction for 2 months to encourage participation in skill-building programs. The control group will receive usual care but without the mentorship intervention. Mentored and control subjects' pain and functioning will be assessed at 2 months (end of intervention for mentored participants and

  19. The development of the cell cryopreservation protocol with controlled rate thawing.

    Science.gov (United States)

    Gurina, Tatyana M; Pakhomov, Alexandr V; Polyakova, Anna L; Legach, Evgeniy I; Bozhok, Galyna A

    2016-06-01

    Thawing in the water bath is often considered as a standard procedure. The thermal history of samples thawed in this way is poorly controlled, but cryopreservation and banking of cell-based products require standardization, automation and safety of all the technological stages including thawing. The programmable freezers allow implementation of the controlled cooling as well as the controlled thawing. As the cell damage occurs during the phase transformation that takes place in the cryoprotectant medium in the process of freezing-thawing, the choice of warming rates within the temperature intervals of transformations is very important. The goal of the study was to investigate the influence of warming rates within the intervals of the phase transformations in the DMSO-based cryoprotectant medium on the cell recovery and to develop a cryopreservation protocol with controlled cooling and warming rates. The temperature intervals of phase transformations such as melting of the eutectic mixture of the cryoprotectant solution (MEMCS), melting of the eutectic salt solution (MESS), melting of the main ice mass (MMIM), recrystallization before MEMCS, recrystallization before MESS and recrystallization before MMIM were determined by thermo-mechanical analysis. The biological experiments were performed on the rat testicular interstitial cells (TIC). The highest levels of the cell recovery and metabolic activity after cryopreservation were obtained using the protocol with the high (20 °C/min) warming rate in the temperature intervals of crystallization of the eutectics as well as recrystallizations and the low (1 °C/min) warming rate in the temperature intervals of melting of the eutectics as well as MMIM. The total cell recovery was 65.3 ± 2.1 %, the recovery of the 3-beta-HSD-positive (Leydig) cells was 82.9 ± 1.8 %, the MTT staining was 32.5 ± 0.9 % versus 42.1 ± 1.7 %; 57.4 ± 2.1 % and 24.0 ± 1.1 % respectively, when compared to the thawing in

  20. 'PhysioDirect' telephone assessment and advice services for physiotherapy: protocol for a pragmatic randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Hopper Cherida

    2009-08-01

    Full Text Available Abstract Background Providing timely access to physiotherapy has long been a problem for the National Health Service in the United Kingdom. In an attempt to improve access some physiotherapy services have introduced a new treatment pathway known as PhysioDirect. Physiotherapists offer initial assessment and advice by telephone, supported by computerised algorithms, and patients are sent written self-management and exercise advice by post. They are invited for face-to-face treatment only when necessary. Although several such services have been developed, there is no robust evidence regarding clinical and cost-effectiveness, nor the acceptability of PhysioDirect. Methods/Design This protocol describes a multi-centre pragmatic individually randomised trial, with nested qualitative research. The aim is to determine the effectiveness, cost-effectiveness, and acceptability of PhysioDirect compared with usual models of physiotherapy based on patients going onto a waiting list and receiving face-to-face care. PhysioDirect services will be established in four areas in England. Adult patients in these areas with musculoskeletal problems who refer themselves or are referred by a primary care practitioner for physiotherapy will be invited to participate in the trial. About 1875 consenting patients will be randomised in a 2:1 ratio to PhysioDirect or usual care. Data about outcome measures will be collected at baseline and 6 weeks and 6 months after randomisation. The primary outcome is clinical improvement at 6 months; secondary outcomes include cost, waiting times, time lost from work and usual activities, patient satisfaction and preference. The impact of PhysioDirect on patients in different age-groups and with different conditions will also be examined. Incremental cost-effectiveness will be assessed in terms of quality adjusted life years in relation to cost. Qualitative methods will be used to explore factors associated with the success or failure of

  1. Total ankle replacement versus arthrodesis (TARVA): protocol for a multicentre randomised controlled trial

    Science.gov (United States)

    Goldberg, Andrew J; Zaidi, Razi; Thomson, Claire; Doré, Caroline J; Cro, Suzie; Round, Jeff; Molloy, Andrew; Davies, Mark; Karski, Michael; Kim, Louise; Cooke, Paul

    2016-01-01

    Introduction Total ankle replacement (TAR) or ankle arthrodesis (fusion) is the main surgical treatments for end-stage ankle osteoarthritis (OA). The popularity of ankle replacement is increasing while ankle fusion rates remain static. Both treatments have efficacy but to date all studies comparing the 2 have been observational without randomisation, and there are no published guidelines as to the most appropriate management. The TAR versus arthrodesis (TARVA) trial aims to compare the clinical and cost-effectiveness of TAR against ankle arthrodesis in the treatment of end-stage ankle OA in patients aged 50–85 years. Methods and analysis TARVA is a multicentre randomised controlled trial that will randomise 328 patients aged 50–85 years with end-stage ankle arthritis. The 2 arms of the study will be TAR or ankle arthrodesis with 164 patients in each group. Up to 16 UK centres will participate. Patients will have clinical assessments and complete questionnaires before their operation and at 6, 12, 26 and 52 weeks after surgery. The primary clinical outcome of the study is a validated patient-reported outcome measure, the Manchester Oxford foot questionnaire, captured preoperatively and 12 months after surgery. Secondary outcomes include quality-of-life scores, complications, revision, reoperation and a health economic analysis. Ethics and dissemination The protocol has been approved by the National Research Ethics Service Committee (London, Bloomsbury 14/LO/0807). This manuscript is based on V.5.0 of the protocol. The trial findings will be disseminated through peer-reviewed publications and conference presentations. Trial registration number NCT02128555. PMID:27601503

  2. Increasing organ donation via anticipated regret (INORDAR: protocol for a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    O'Carroll Ronan E

    2012-03-01

    Full Text Available Abstract Background Throughout the world there is an insufficient supply of donor organs to meet the demand for organ transplantations. This paper presents a protocol for a randomised controlled trial, testing whether a simple, theory-based anticipated regret manipulation leads to a significant increase in posthumous organ donor registrations. Methods We will use a between-groups, prospective randomised controlled design. A random sample of 14,520 members of the adult Scottish general public will be contacted via post. These participants will be randomly allocated into 1 of the 4 conditions. The no questionnaire control (NQC group will simply receive a letter and donor registration form. The questionnaire control (QC arm will receive a questionnaire measuring their emotions and non-cognitive affective attitudes towards organ donation. The theory of planned behavior (TPB group will complete the emotions and affective attitudes questionnaire plus additional items assessing their cognitive attitudes towards organ donation, perceived control over registration and how they think significant others view this action. Finally, the anticipated regret (AR group will complete the same indices as the TPB group, plus two additional anticipated regret items. These items will assess the extent to which the participant anticipates regret for not registering as an organ donor in the near future. The outcome variable will be NHS Blood and Transplant verified registrations as an organ donor within 6 months of receiving our postal intervention. Discussion This study will assess whether simply asking people to reflect on the extent to which they may anticipate regret for not registering as an organ donor increases organ donor registration 6 months later. If successful, this simple and easy to administer theory-based intervention has the potential to save lives and money for the NHS by reducing the number of people receiving treatments such as dialysis. This

  3. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  4. Role-Based Access Control for the Large Hadron Collider at CERN

    CERN Document Server

    Yastrebov, I

    2010-01-01

    Large Hadron Collider (LHC) is the largest scientific instrument ever created. It was built with the intention of testing the most extreme conditions of the matter. Taking into account the significant dangers of LHC operations, European Organization for Nuclear Research (CERN) has developed multi-pronged approach for machine safety, including access control system. This system is based on role-based access control (RBAC) concept. It was designed to protect from accidental and unauthorized access to the LHC and injector equipment. This paper introduces the new model of the role-based access control developed at CERN and gives detailed mathematical description of it. We propose a new technique called dynamic authorization that allows deploying RBAC gradually in the large systems. Moreover, we show how the protection for the very large distributed equipment control system may be implemented in efficient way. This paper also describes motivation of the project, requirements and overview of the main components: au...

  5. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    XACML (eXtensible Access Control Markup Language) is a prominent access control language that is widely adopted both in industry and academia. XACML is an international standard in the field of information security. The problem with XACML is that its specification is described in natural language...... (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0. The...... main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...

  6. Energy harvesting aware hybrid MAC protocol for WBANs

    OpenAIRE

    Ibarra, Ernesto; Antonopoulos, Angelos; KARTSAKLI, Elli; Verikoukis, Christos

    2013-01-01

    In this paper, we propose a hybrid polling Medium Access Control (MAC) protocol with Human Energy Harvesting capabilities, called HEH-BMAC, designed for Wireless Body Area Networks (WBANs). The proposed protocol uses a dynamic schedule algorithm to combine User Identification polling (ID) and Probabilistic Contention (PC) random access, adapting the network operation to the random, time-varying nature of the human energy harvesting sources. HEH-BMAC offers different levels of node priorities ...

  7. Internet Protocol Display Sharing Solution for Mission Control Center Video System

    Science.gov (United States)

    Brown, Michael A.

    2009-01-01

    With the advent of broadcast television as a constant source of information throughout the NASA manned space flight Mission Control Center (MCC) at the Johnson Space Center (JSC), the current Video Transport System (VTS) characteristics provides the ability to visually enhance real-time applications as a broadcast channel that decision making flight controllers come to rely on, but can be difficult to maintain and costly. The Operations Technology Facility (OTF) of the Mission Operations Facility Division (MOFD) has been tasked to provide insight to new innovative technological solutions for the MCC environment focusing on alternative architectures for a VTS. New technology will be provided to enable sharing of all imagery from one specific computer display, better known as Display Sharing (DS), to other computer displays and display systems such as; large projector systems, flight control rooms, and back supporting rooms throughout the facilities and other offsite centers using IP networks. It has been stated that Internet Protocol (IP) applications are easily readied to substitute for the current visual architecture, but quality and speed may need to be forfeited for reducing cost and maintainability. Although the IP infrastructure can support many technologies, the simple task of sharing ones computer display can be rather clumsy and difficult to configure and manage to the many operators and products. The DS process shall invest in collectively automating the sharing of images while focusing on such characteristics as; managing bandwidth, encrypting security measures, synchronizing disconnections from loss of signal / loss of acquisitions, performance latency, and provide functions like, scalability, multi-sharing, ease of initial integration / sustained configuration, integration with video adjustments packages, collaborative tools, host / recipient controllability, and the utmost paramount priority, an enterprise solution that provides ownership to the whole

  8. The RFID smart card management application for the hotel access control

    OpenAIRE

    Kreslin, Robert

    2011-01-01

    In this thesis we wanted to present the project that was made for a smaller hotel in Nova Gorica. The goal was to create an application for managing access control according to customer's wishes as well as to introduce the system into the existent infrastructure. The first step was to define what access control actually means. In broad terms it is divided into RFID – radio-frequency identification and biometric identification. Both have their strengths and their weaknesses. Next step was choo...

  9. A New Access Control Scheme for Facebook-style Social Networks

    OpenAIRE

    Pang, Jun; Zhang, Yang

    2013-01-01

    The popularity of online social networks (OSNs) makes the protection of users' private information an important but scientifically challenging problem. In the literature, relationship-based access control schemes have been proposed to address this problem. However, with the dynamic developments of OSNs, we identify new access control requirements which cannot be fully captured by the current schemes. In this paper, we focus on public information in OSNs and treat it as a new dimension which u...

  10. Access Control in the ATLAS TDAQ Online Cluster

    CERN Document Server

    Leahu, Marius Constantin; Stoichescu, D A; Lehmann Miotto, G

    ATLAS (A Toroidal LHC Apparatus) is a general-purpose detector for studying high-energy particle interactions: it is the largest particle detector experiment at CERN and it is built around one of the interaction points of the proton beams accelerated by the Large Hadron Collider (LHC). The detector generates an impressive amount of raw data: 64 TB per second as a result of 40 MHz proton-proton collision rate with 1.6 MB data for each such event. The handling of such data rate is managed by a three levels Trigger and Data Acquisition (TDAQ) system, which filters out the events not relevant from physics research point of view and selects in the end in the order of 1000 events per second to be stored for offline analyses. This system comprises a significant number of hardware devices, software applications and human personnel to supervise the experiment operation. Their protection against damages as a result of misuse and their optimized exploitation by avoiding the conflicting accesses to resources are key requ...

  11. Comparison of CSMA based MAC protocols of wireless sensor networks

    CERN Document Server

    singh, Himanshu

    2012-01-01

    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.

  12. TEMPORAL, DELEGABLE AND CHEAP UPDATE ACCESS CONTROL TO PUBLISHED XML DOCUMENTS

    Directory of Open Access Journals (Sweden)

    Waleed Halboob

    2013-01-01

    Full Text Available Providing access control for published XML documents on the Web is an important topic. It involves the use of cryptographic techniques, addressing different requirements and, as a result, facing several challenges. Existing solutions still have some weaknesses such as system update cost, number of required secret encryption/decryption keys, size of encrypted document and supporting temporal and delegable access. This study propose a push--based access control policy enforcement mechanism for addressing these issues using a Dynamic Key Management Table (DKMT and based on Identity Based Encryption (IBE. The proposed mechanism addresses the existing challenges and provides a more acceptable solution.

  13. Engineering platform and experimental protocol for design and evaluation of a neurally-controlled powered transfemoral prosthesis.

    Science.gov (United States)

    Zhang, Fan; Liu, Ming; Harper, Stephen; Lee, Michael; Huang, He

    2014-01-01

    To enable intuitive operation of powered artificial legs, an interface between user and prosthesis that can recognize the user's movement intent is desired. A novel neural-machine interface (NMI) based on neuromuscular-mechanical fusion developed in our previous study has demonstrated a great potential to accurately identify the intended movement of transfemoral amputees. However, this interface has not yet been integrated with a powered prosthetic leg for true neural control. This study aimed to report (1) a flexible platform to implement and optimize neural control of powered lower limb prosthesis and (2) an experimental setup and protocol to evaluate neural prosthesis control on patients with lower limb amputations. First a platform based on a PC and a visual programming environment were developed to implement the prosthesis control algorithms, including NMI training algorithm, NMI online testing algorithm, and intrinsic control algorithm. To demonstrate the function of this platform, in this study the NMI based on neuromuscular-mechanical fusion was hierarchically integrated with intrinsic control of a prototypical transfemoral prosthesis. One patient with a unilateral transfemoral amputation was recruited to evaluate our implemented neural controller when performing activities, such as standing, level-ground walking, ramp ascent, and ramp descent continuously in the laboratory. A novel experimental setup and protocol were developed in order to test the new prosthesis control safely and efficiently. The presented proof-of-concept platform and experimental setup and protocol could aid the future development and application of neurally-controlled powered artificial legs. PMID:25079449

  14. Demonstration of IP based control and management for a reconfigurable photonic access network

    NARCIS (Netherlands)

    Teune, Ronald; Roy, Rajeev; Etten, van Wim

    2008-01-01

    An implementation of control and management for a reconfigurable photonic access network is presented. An out of band control channel is used on which an IP communication is established to communicate with remote elements. A Headend based master controller communicates with a far end embedded proces

  15. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures that... develop, test, and implement the relevant risk management controls and supervisory procedures...

  16. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-11-15

    ... Exchange Commission 17 CFR Part 240 Risk Management Controls for Brokers or Dealers With Market Access... Regulations#0;#0; ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls.... The required financial risk management controls and supervisory procedures must be reasonably...

  17. Counter-proposal: A Multi-Agent Negotiation Protocol for Resolving Resource Contention in Open Control Systems

    DEFF Research Database (Denmark)

    Sørensen, Jan Corfixen; Jørgensen, Bo Nørregaard

    2010-01-01

    The resource contention problem in control systems based on software agents occurs when agents with different goals compete with each other, to control a shared resource. In this paper we propose the counter-proposal protocol, a negotiation protocol that resolves the resource contention problem...... in control systems based on software agents. The protocol is evaluated by an example of a real control problem. The evaluation of the example demonstrates that the protocol is able to find acceptable solutions between competing software agents, if they exist. The focus of this paper is to present the design...

  18. Mindfulness for irritable bowel syndrome: protocol development for a controlled clinical trial

    Directory of Open Access Journals (Sweden)

    Garland Eric L

    2009-07-01

    Full Text Available Abstract Background Irritable bowel syndrome (IBS, a functional bowel disorder with symptoms of abdominal pain and disturbed defecation experienced by 10% of U.S. adults, results in significant disability, impaired quality of life, and health-care burden. Conventional medical care focusing on pharmacological approaches, diet, and lifestyle management has been partially effective in controlling symptoms. Behavioral treatments, such as cognitive-behavioral therapy and hypnosis, are promising. This paper describes an on-going feasibility study to assess the efficacy of mindfulness training, a behavioral treatment involving directing and sustaining attention to present-moment experience, for the treatment of IBS. Methods/Design The study design involves randomization of adult women with IBS according to Rome II criteria, to either an eight-week mindfulness training group (based on a Mindfulness-based Stress Reduction [MBSR] format or a previously validated IBS social-support group as an attention-control condition. The primary hypothesis is that, compared to Support Group participants, those in the Mindfulness Program will demonstrate significant improvement in IBS symptoms as measured by the IBS Symptom Severity Scale 1. Discussion 214 individuals have been screened for eligibility, of whom 148 were eligible for the study. Of those, 87 were enrolled, with 21 withdrawing after having given consent. 66 have completed or are in the process of completing the interventions. It is feasible to undertake a rigorous randomized clinical trial of mindfulness training for people with IBS, using a standardized MBSR protocol adapted for those experiencing IBS, compared to a control social-support group previously utilized in IBS studies. Trial Registration Clinical Trials.gov Identifier: NCT00680693

  19. A Security Architecture for Data Aggregation and Access Control in Smart Grids

    CERN Document Server

    Ruj, Sushmita; Stojmenovic, Ivan

    2011-01-01

    We propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. We use homomorphic encryption technique to achieve this. The consumer data that is collected is sent to the substations where it is monitored by remote terminal units (RTU). The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. Users can be maintenance units, utility centers, pricing estimator units or analyzing and prediction groups. We solve this problem of access control using cryptographic technique of attribute-based encryption. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The ac...

  20. DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

    Directory of Open Access Journals (Sweden)

    S.R. Kodituwakku

    2010-11-01

    Full Text Available Role Based Access Control is very useful for providing a high level description of access control for organizational applications. This paper proposes a role based framework that deals with security problems in an intranet environment. The proposed framework protects intranet resources from unauthorized users. The salient feature of the framework is that it allows intranet users to access only authorized resources. It consists of two kinds of role hierarchies: global role hierarchy and local role hierarchy, and two levels of permissions: server permission and object permission. They simplify the way of structuring authority and responsibility in the whole intranet and the allocation of privileges for different objects within a particular server. The proposed framework is implemented over Windows platform and tested for the validity. The test results indicated that it can successfully be used to control accessing network objects.

  1. Day case shoulder surgery: satisfactory pain control without regional anaesthesia. A prospective analysis of a perioperative protocol.

    LENUS (Irish Health Repository)

    Daruwalla, Z J

    2009-03-01

    Pain control is an issue which may limit patients\\' acceptance of day case shoulder surgery. This study prospectively examined the outcome of a protocol for day case shoulder surgery to determine if satisfactory pain relief could be achieved without regional anaesthesia.

  2. Technical enforcement of european privacy legislation: an access control approach

    OpenAIRE

    Bekara, Kheira; Laurent, Maryline; Nguyen, Than Ha

    2012-01-01

    Until today, the protection of personal data is mainly left to the legislation by means of guidelines. This paper aims to increase the perceived control by users over their data by helping the user's agent to check the service requests conformity to the legislation. To do so, it discusses the main concepts involved in the legislative privacy principles, and deduces a privacy semantic information model. The proposed model focuses on the main concepts involved in legislative privacy principles....

  3. Individual Cognitive Stimulation Therapy for dementia (iCST: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Orrell Martin

    2012-09-01

    Full Text Available Abstract Background Improving the quality of care for people with dementia and their carers has become a national priority in many countries. Cognitive Stimulation Therapy (CST groups can be beneficial in improving cognition and quality of life for people with dementia. The aim of the current study is to develop and evaluate a home-based individual Cognitive Stimulation Therapy (iCST programme for people with dementia which can be delivered by their family carer. Methods This multi-centre, pragmatic randomised controlled trial (RCT will compare the effectiveness and cost-effectiveness of iCST for people with dementia with a treatment as usual control group. The intervention consists of iCST sessions delivered by a carer for 30 minutes, 3 times a week over 25 weeks. For people with dementia the primary outcome measures are cognition assessed by the ADAS-Cog, and quality of life assessed by QoL-AD. For carers, quality of life using the SF-12 is the primary outcome measure. Using a 5% significance level, comparison of 306 participants will yield 80% power to detect an effect size of 0.35 for cognition as measured by the ADAS-Cog, and quality of life as measured by the QoL-AD. Quality of life for the carer will be measured using the SF-12. The trial will include a cost-effectiveness analysis from a public sector perspective. Discussion The UK Department of Health has recently stressed that improving access to psychological therapies is a national priority, but many people with dementia are unable to access psychological interventions. The development of a home-based individual version of CST will provide an easy to use, widely available therapy package that will be evaluated for effectiveness and cost-effectiveness in a multi centre RCT.

  4. Cross-Layer Active Predictive Congestion Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yinfeng Wu

    2009-10-01

    Full Text Available In wireless sensor networks (WSNs, there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node‟s neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  5. Acupuncture Antiarrhythmic Effects on Drug Refractory Persistent Atrial Fibrillation: Study Protocol for a Randomized, Controlled Trial

    Directory of Open Access Journals (Sweden)

    Jimin Park

    2015-01-01

    Full Text Available Background. Atrial fibrillation (AF is the most common form of arrhythmia. Several trials have suggested that acupuncture may prevent AF. However, the efficacy of acupuncture for AF prevention has not been well investigated. Therefore, we designed a prospective, two-parallel-armed, participant and assessor blinded, randomized, sham-controlled clinical trial to investigate acupuncture in persistent AF (ACU-AF. Methods. A total of 80 participants will be randomly assigned to active acupuncture or sham acupuncture groups in a 1 : 1 ratio. Both groups will take the same antiarrhythmic medication during the study period. Patients will receive 10 sessions of acupuncture treatment once a week for 10 weeks. The primary endpoint is AF recurrence rate. Secondary endpoints are left atrium (LA and left atrial appendage (LAA changes in function and volume, and inflammatory biomarker changes. Ethics. This study protocol was approved by the institutional review boards (IRBs of Kyung Hee University Hospital (number 1335-04. This trial is registered with clinicaltrials.gov NCT02110537.

  6. Variable TDMA MAC Protocol For WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Minsuk Jung; Yongseok Chang; Jonghoon Eom; Sungho Kim

    2003-01-01

    A MAC(Media Access Control) protocol, one of the most important technologies for an EPON(Ethernet Passive Optical Network), contains a scheduling algorithm to avoid collisions in shared links and assigns an effective bandwidth when ONUs (Optical Network Units) transfer signals upward. The current paper proposes a MAC Protocol that operates a TDMA(Time method with a variable slot assignment to overcome short of bandwidth using by the number of n wavelength., the next generation access network. To verify the above, the current study also implements an EPON model using OPNET as the simulation tool.

  7. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group

    NARCIS (Netherlands)

    M. Pradhan; S.A. Brinkman; A. Beatty; A. Maika; E. Satriawan; J. de Ree; A. Hasan

    2013-01-01

    Background This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program w

  8. ER-E2 regulation. Implementation of the national protocol for quality control of instrumentation in nuclear medicine

    International Nuclear Information System (INIS)

    The purpose of this regulation is the adoption and enforcement of the 'Protocol National Quality Control Instrumentation in Nuclear Medicine'; as well as the establishment of an annual program of external audits, which take place on CCEEM, in order to verify compliance with the established considerations into protocols. It is applicable to all entities within the NHS who perform the practice of nuclear medicine in Cuba, both for use 'in vitro' and 'in vivo'.

  9. Acupuncture, Counseling, and Usual care for Depression (ACUDep: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    MacPherson Hugh

    2012-11-01

    Full Text Available Abstract Background The evidence on the effect of acupuncture or counseling for depression is not conclusive yet is sufficient to warrant further research. Our aim is to conduct a full-scale RCT to determine the clinical and cost effectiveness of acupuncture and counseling compared to usual care alone. We will explore the experiences and perspectives of patients and practitioners. Methods/Design Randomized controlled trial with three parallel arms: acupuncture plus usual care, counseling plus usual care, and usual care alone, in conjunction with a nested qualitative study using in-depth interviews with purposive samples of trial participants. Participants: Patients aged over 18 years diagnosed with depression or mood disorder by their GP and with a score of 20 or above on the Beck Depression Inventory (BDI-II. Randomization: Computer randomization by York Trials Unit to acupuncture, counseling, and usual care alone in proportions of 2:2:1, respectively, with secure allocation concealment. Interventions: Patients allocated to acupuncture and counseling groups receive the offer of up to 12 weekly sessions. Both interventions allow flexibility to address patient variation, yet are constrained within defined protocols. Acupuncture is based on traditional Chinese medicine and counseling is non-directive within the humanistic tradition. Outcome: The PHQ-9 is the primary outcome measure, collected at baseline, 3, 6, 9, and 12 months. Also measured is BDI-II, SF-36 Bodily pain subscale, and EQ-5D. Texted mood scores are collected weekly over the first 15 weeks. Health-related resource use is collected over 12 months. Analysis: The sample size target was for 640 participants, calculated for an effect size of 0.32 on the PHQ-9 when comparing acupuncture with counseling given 90% power, 5% significance, and 20% loss to follow-up. Analysis of covariance will be used on an intention-to-treat basis. Thematic analysis will be used for qualitative data. We will

  10. Mobile internet protocol analysis

    OpenAIRE

    Brachfeld, Lawrence J.

    1999-01-01

    Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet while maintaining any current conne...

  11. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  12. A randomised controlled trial linking mental health inpatients to community smoking cessation supports: A study protocol

    Directory of Open Access Journals (Sweden)

    Clancy Richard

    2011-07-01

    Full Text Available Abstract Background Mental health inpatients smoke at higher rates than the general population and are disproportionately affected by tobacco dependence. Despite the advent of smoke free policies within mental health hospitals, limited systems are in place to support a cessation attempt post hospitalisation, and international evidence suggests that most smokers return to pre-admission smoking levels following discharge. This protocol describes a randomised controlled trial that will test the feasibility, acceptability and efficacy of linking inpatient smoking care with ongoing community cessation support for smokers with a mental illness. Methods/Design This study will be conducted as a randomised controlled trial. 200 smokers with an acute mental illness will be recruited from a large inpatient mental health facility. Participants will complete a baseline survey and will be randomised to either a multimodal smoking cessation intervention or provided with hospital smoking care only. Randomisation will be stratified by diagnosis (psychotic, non-psychotic. Intervention participants will be provided with a brief motivational interview in the inpatient setting and options of ongoing smoking cessation support post discharge: nicotine replacement therapy (NRT; referral to Quitline; smoking cessation groups; and fortnightly telephone support. Outcome data, including cigarettes smoked per day, quit attempts, and self-reported 7-day point prevalence abstinence (validated by exhaled carbon monoxide, will be collected via blind interview at one week, two months, four months and six months post discharge. Process information will also be collected, including the use of cessation supports and cost of the intervention. Discussion This study will provide comprehensive data on the potential of an integrated, multimodal smoking cessation intervention for persons with an acute mental illness, linking inpatient with community cessation support. Trial Registration

  13. Prevention of abdominal wound infection (PROUD trial, DRKS00000390: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Heger Ulrike

    2011-11-01

    Full Text Available Abstract Background Wound infection affects a considerable portion of patients after abdominal operations, increasing health care costs and postoperative morbidity and affecting quality of life. Antibacterial coating has been suggested as an effective measure to decrease postoperative wound infections after laparotomies. The INLINE metaanalysis has recently shown the superiority of a slowly absorbable continuous suture for abdominal closure; with PDS plus® such a suture has now been made available with triclosan antibacterial coating. Methods/Design The PROUD trial is designed as a randomised, controlled, observer, surgeon and patient blinded multicenter superiority trial with two parallel groups and a primary endpoint of wound infection during 30 days after surgery. The intervention group will receive triclosan coated polydioxanone sutures, whereas the control group will receive the standard polydioxanone sutures; abdominal closure will otherwise be standardized in both groups. Statistical analysis is based on intention-to-treat population via binary logistic regression analysis, the total sample size of n = 750 is sufficient to ensure alpha = 5% and power = 80%, an interim analysis will be carried out after data of 375 patients are available. Discussion The PROUD trial will yield robust data to determine the effectiveness of antibacterial coating in one of the standard sutures for abdominal closure and potentially lead to amendment of current guidelines. The exploration of clinically objective parameters as well as quality of life holds immediate relevance for clinical management and the pragmatic trial design ensures high external validity. Trial Registration The trial protocol has been registered with the German Clinical Trials Register (DRKS00000390.

  14. (abstract) Experimental Results From Internetworking Data Applications Over Various Wireless Networks Using a Single Flexible Error Control Protocol

    Science.gov (United States)

    Kanai, T.; Kramer, M.; McAuley, A. J.; Nowack, S.; Pinck, D. S.; Ramirez, G.; Stewart, I.; Tohme, H.; Tong, L.

    1995-01-01

    This paper describes results from several wireless field trials in New Jersey, California, and Colorado, conducted jointly by researchers at Bellcore, JPL, and US West over the course of 1993 and 1994. During these trials, applications communicated over multiple wireless networks including satellite, low power PCS, high power cellular, packet data, and the wireline Public Switched Telecommunications Network (PSTN). Key goals included 1) designing data applications and an API suited to mobile users, 2) investigating internetworking issues, 3) characterizing wireless networks under various field conditions, and 4) comparing the performance of different protocol mechanisms over the diverse networks and applications. We describe experimental results for different protocol mechanisms and parameters, such as acknowledgment schemes and packet sizes. We show the need for powerful error control mechanisms such as selective acknowledgements and combining data from multiple transmissions. We highlight the possibility of a common protocol for all wireless networks, from micro-cellular PCS to satellite networks.

  15. Successful implementation of a perioperative glycemic control protocol in cardiac surgery: barrier analysis and intervention using lean six sigma.

    Science.gov (United States)

    Martinez, Elizabeth A; Chavez-Valdez, Raul; Holt, Natalie F; Grogan, Kelly L; Khalifeh, Katherine W; Slater, Tammy; Winner, Laura E; Moyer, Jennifer; Lehmann, Christoph U

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  16. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Directory of Open Access Journals (Sweden)

    Elizabeth A. Martinez

    2011-01-01

    Full Text Available Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  17. A pragmatic multi-centred randomised controlled trial of yoga for chronic low back pain: Trial protocol

    OpenAIRE

    Cox, Helen; Tilbrook, Helen; Aplin, John; Chuang, Ling-Hsiang; Hewitt, Catherine; Jayakody, Shalmini; Semlyen, Anna; Soares, Marta O; Torgerson, David; Trewhela, Alison; Watt, Ian; Worthy, Gill

    2010-01-01

    A systematic review revealed three small randomised controlled trials of yoga for low back pain, all of which showed effects on back pain that favoured the yoga group. To build on these studies a larger trial, with longer term follow-up, and a number of different yoga teachers delivering the intervention is required. This study protocol describes the details of a randomised controlled trial (RCT) to determine the effectiveness and cost-effectiveness of Yoga for chronic Low Back Pain, which is...

  18. A Group-oriented Access Control Scheme for P2P Networks

    OpenAIRE

    Wang Xiaoming; Cheng Fan

    2011-01-01

    A group-oriented access control scheme is proposed for P2P (peer to peer) networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can...

  19. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  20. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover, the......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered to be the...... hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  1. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...... access to the pill is found to be on non-white students, both among men and women. The paper uses Census Data to compare the changes in career plans to actual changes in labor market outcomes. When looking at the actual career outcomes, early access to the pill affects both men and women - shifting...... plans of both men and women, and by separating the effect by level of academic ability, race and family income. The results show that unrestricted access to the pill caused high ability women to move towards occupations with higher wages, higher occupational prestige scores and higher male ratios...

  2. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  3. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  4. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications.

    Science.gov (United States)

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  5. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    Science.gov (United States)

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  6. SparkXS: efficient access control for intelligent and large-scale streaming data applications

    OpenAIRE

    Preuveneers, Davy; Joosen, Wouter

    2015-01-01

    The exponential data growth in intelligent environments fueled by the Internet of Things is not only a major push behind distributed programming frameworks for big data, it also magnifies security and privacy concerns about unauthorized access to data. The huge diversity and the streaming nature of data raises the demand for new enabling technologies for scalable access control that can deal with the growing velocity, volume and variety of volatile data. This paper presents SparkXS, ...

  7. A Model-driven Role-based Access Control for SQL Databases

    OpenAIRE

    Raimundas Matulevičius; Henri Lakk

    2015-01-01

    Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering app...

  8. HEH-BMAC: hybrid polling MAC protocol for WBANs operated by human energy harvesting

    OpenAIRE

    Ibarra, Ernesto; Antonopoulos, Angelos; KARTSAKLI, Elli; Verikoukis, Christos

    2015-01-01

    This paper introduces human energy harvesting medium access control (MAC) protocol (HEH-BMAC), a hybrid polling MAC suitable for wireless body area networks powered by human energy harvesting. The proposed protocol combines two different medium access methods, namely polling (ID-polling) and probabilistic contention access, to adapt its operation to the different energy and state (active/inactive) changes that the network nodes may experience due to their random nature and the time variation ...

  9. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova;

    2015-01-01

    is connected via a communication network to the sensors and actuators on the asset. Such a distributed control scheme may be implemented over a communication network that introduces delay and possibly also message loss. In this paper, we look at the impact of such an imperfect communication network on a wind...... farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance...

  10. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  11. Implementation of the European protocol for quality control of the technical aspects of mammography screening in Bulgaria

    International Nuclear Information System (INIS)

    The results from the national pilot project on implementation of the European protocol for the quality control (QC) of the technical aspects of mammography screening as well as the European protocol for dosimetry in mammography in Bulgaria are presented. A QC programme for mammography equipment and a standardised measurement protocol were created. The full QC programme was tested on four mammography units of different types and ages. A national survey was performed for entrance surface air kerma (ESAK) on 20 units using a 45 mm PMMA standard phantom. Average glandular dose (AGD) was calculated using the conversion coefficients from the European dosimetry protocol. The survey demonstrated considerable differences in the technical condition of the mammography units that resulted in varying image quality. The measured values of ESAK showed significant variations. Doses for ∼45% of the units were found to be below the European reference level. The values for AGD ranged from 0.35 to 3.47 mGy. The main problems found were film processing, optical density (OD) control settings and AEC adjustment. The results showed the importance of film OD measurements parallel to dose measurements. The X-ray mammography in the country needs optimisation. Comprehensive quality assurance programme should be adopted in all departments covering permanent QC of the equipment, image quality and breast dose. (authors)

  12. The observance of the Kyoto Protocol on climate changes: stakes of the international control of compliance with commitments; L'Observance du protocole de Kyoto sur les changements climatiques. Les enjeux du controle international du respect des engagements

    Energy Technology Data Exchange (ETDEWEB)

    Maljean-Dubois, S. [Aix-Marseille-3 Univ. Paul Cezanne, CERIC-UMR 6201, CNRS, 13 - Marseille (France)

    2007-07-01

    The author presents the conclusions of multidisciplinary research which has examined the relationship between the Kyoto protocol's observance mechanisms (control of compliance of commitments and sanction in case of non compliance) and the more conventional mechanisms of international conflict solving. It also examines the peculiar characteristics of these mechanisms, whether legal or not. Finally, the author examines the impact of the adopted procedure, and whether it is constraining.

  13. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  14. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  15. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    The electrical power infrastructure is facing a transition from a largely centralised distribution infrastructure with a few large power plants to an increasingly distributed infrastructure that must incorporate privately owned and operated power generation units based on fuel cells or sustainable...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...

  16. A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2015-01-01

    Full Text Available A digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN. The scheme is founded on the access control scheme on the basis of characteristic expression (named CEB scheme. Data is divided by characteristics and the key for encryption is related to characteristic expression. Only the key matching with characteristic expression can decrypt the data. Meanwhile, three distributed certificate detection methods are designed to prevent the certificate from being misappropriated by hostile anonymous users. When a user starts query, the key access control method can judge whether the query is valid. In this case, the scheme can achieve public certificate of users and effectively protect query privacy as well. The security analysis and experiments show that the proposed scheme is superior in communication overhead, storage overhead, and detection probability.

  17. Peer support in type 2 diabetes: a randomised controlled trial in primary care with parallel economic and qualitative analyses: pilot study and protocol

    Directory of Open Access Journals (Sweden)

    O'Kelly Fergus

    2007-07-01

    Full Text Available Abstract Background Diabetes is a chronic illness, which requires the individual to assume responsibility for their own care with the aim of maintaining glucose and blood pressure levels as close to normal as possible. Traditionally self-management training for diabetes has been delivered in a didactic manner. In recent times alternatives to the traditional delivery of diabetes care have been investigated, for example, the concept of peer support which emphasises patient rather than professional domination. This paper describes the pilot study and protocol for a study that aims to evaluate the effectiveness of a peer support intervention for people with type 2 diabetes in a primary care setting. Methods/Design A pilot study was conducted to access the feasibility of a randomized controlled trial of a peer support intervention. We used the MRC Framework for the evaluation of complex interventions. Elements of the intervention were defined and the study protocol was finalized. In this cluster randomised controlled trial twenty general practices are assigned to control and intervention groups. Each practice compiles a diabetes register and randomly selects 21 patients. All practices implement a standardised diabetes care system. In the intervention group all practices recruit three peer supporters. The peer supporters are trained to conduct nine group meetings in their general practice over a period of two years. Each meeting has a structured component. The primary outcomes are blood pressure, total cholesterol, HBA1c and the Diabetes Well-being score. In addition to biophysical, psychosocial, economic and health service utilization data peer supporter activity and qualitative data are collected. Discussion Peer support is a complex intervention and evaluating such an intervention presents challenges to researchers. This study will evaluate whether a peer support programme for patients with type 2 diabetes improves biophysical and psychosocial

  18. Prednisolone and acupuncture in Bell's palsy: study protocol for a randomized, controlled trial

    Directory of Open Access Journals (Sweden)

    Wang Kangjun

    2011-06-01

    Full Text Available Abstract Background There are a variety of treatment options for Bell's palsy. Evidence from randomized controlled trials indicates corticosteroids can be used as a proven therapy for Bell's palsy. Acupuncture is one of the most commonly used methods to treat Bell's palsy in China. Recent studies suggest that staging treatment is more suitable for Bell's palsy, according to different path-stages of this disease. The aim of this study is to compare the effects of prednisolone and staging acupuncture in the recovery of the affected facial nerve, and to verify whether prednisolone in combination with staging acupuncture is more effective than prednisolone alone for Bell's palsy in a large number of patients. Methods/Design In this article, we report the design and protocol of a large sample multi-center randomized controlled trial to treat Bell's palsy with prednisolone and/or acupuncture. In total, 1200 patients aged 18 to 75 years within 72 h of onset of acute, unilateral, peripheral facial palsy will be assessed. There are six treatment groups, with four treated according to different path-stages and two not. These patients are randomly assigned to be in one of the following six treatment groups, i.e. 1 placebo prednisolone group, 2 prednisolone group, 3 placebo prednisolone plus acute stage acupuncture group, 4 prednisolone plus acute stage acupuncture group, 5 placebo prednisolone plus resting stage acupuncture group, 6 prednisolone plus resting stage acupuncture group. The primary outcome is the time to complete recovery of facial function, assessed by Sunnybrook system and House-Brackmann scale. The secondary outcomes include the incidence of ipsilateral pain in the early stage of palsy (and the duration of this pain, the proportion of patients with severe pain, the occurrence of synkinesis, facial spasm or contracture, and the severity of residual facial symptoms during the study period. Discussion The result of this trial will assess the

  19. Wireless Networks : Analysis, Protocols, Architecture and Towards Convergence

    OpenAIRE

    Kumar, P.R.

    2003-01-01

    International audience We present a brief account of some recent work of our group in four areas: i) Information theoretic limits on how much traffic wireless networks can carry. ii) Information theoretically optimal strategies for operating wireless networks. iii) Protocols for media access control, power control, clustering, and routing. iv) The importance of architecture in the oncoming convergence of control with communication and computing.

  20. 数据报拥塞控制协议(DCCP)研究%A Study of Datagram Congestion Control Protocol(DCCP)

    Institute of Scientific and Technical Information of China (English)

    陈尚兵; 何小燕; 钱积新

    2003-01-01

    Datagram Congestion Control Protocol (DCCP) implements a congestion-controlled, unreliable flow ofdatagrams suitable for use by applications such as streaming media. This paper specifies its background, main ideas,ongoing research and future implementation.