WorldWideScience

Sample records for access control transportation

  1. Transport Accessibility In Light Of The DEA Method

    Directory of Open Access Journals (Sweden)

    Górniak Joanna

    2014-12-01

    Full Text Available The development of transport infrastructure and increasing the efficiency of transport services are major factors of economic growth. The concept of transport accessibility can be analysed in various aspects. This article focuses on the accessibility of freight transport by road and rail, measured with infrastructure equipment. The primary objective of this study is to determine the efficiency of selected European countries in 2000, 2005 and 2010 in terms of transport accessibility for given expenditures and results. The efficiency will be measured with the Data Envelopment Analysis, which assesses the efficiency with which a given economy transforms expenditures into results. The hypothesis assumes the existence of differences between the efficiency in terms of transport accessibility in European countries and a possibility to increase this efficiency by using the experience of countries with a high efficiency level.

  2. The concept of and factors affecting transport accessibility of seaports

    Directory of Open Access Journals (Sweden)

    Janusz Dąbrowski

    2012-03-01

    Full Text Available Transport accessibility of seaports is a frequently studied area in economic research. In practice, port operators and authorities use it to promote their services and compete in the market. Up to this day, theoretical basis of seaports transport accessibility has not been properly described. The article attempts to systematize and expend the knowledge in this field. New definitions of transport availability from wider and narrower perspectives were suggested; different types of accessibility and their mutual relations were explained. These ideas were complemented by introducing classification of factors affecting transport accessibility of seaports.

  3. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    requirements with the aim of maximising accessibility in products and services. A review of ID literature has mainly developed in the arena of product design and design for assistive technology. Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design...... for accessibility or ID in this area. How is accessibility and the needs of users accounted for in rail transport design? This paper analyses interviews with rolling stock producers, operators and design consultancies. These conducted to determine if ID design methods are used explicitly and the extent to which...

  4. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  5. Perceived Accessibility of Public Transport as a Potential Indicator of Social Inclusion

    Directory of Open Access Journals (Sweden)

    Katrin Lättman

    2016-06-01

    Full Text Available Perceived accessibility has been acknowledged as an important aspect of transport policy since the 70s. Nevertheless, very few empirical studies have been conducted in this field. When aiming to improve social inclusion, by making sustainable transport modes accessible to all, it is important to understand the factors driving perceived accessibility. Unlike conventional accessibility measures, perceived accessibility focuses on the perceived possibilities and ease of engaging in preferred activities using different transport modes. We define perceived accessibility in terms of how easy it is to live a satisfactory life with the help of the transport system, which is not necessarily the same thing as the objective standard of the system. According to previous research, perceived accessibility varies with the subjectively-rated quality of the mode of transport. Thus, improvements in quality (e.g. trip planning, comfort, or safety increase the perceived accessibility and make life easier to live using the chosen mode of transport. This study (n=750 focuses on the perceived accessibility of public transport, captured using the Perceived Accessibility Scale PAC (Lättman, Olsson, & Friman, 2015. More specifically, this study aims to determine how level of quality affects the perceived accessibility in public transport. A Conditional Process Model shows that, in addition to quality, feeling safe and frequency of travel are important predictors of perceived accessibility. Furthermore, elderly and those in their thirties report a lower level of perceived accessibility to their day-to-day activities using public transport. The basic premise of this study is that subjective experiences may be as important as objective indicators when planning and designing for socially inclusive transport systems.

  6. Individual Public Transportation Accessibility is Positively Associated with Self-Reported Active Commuting.

    Science.gov (United States)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette; Glümer, Charlotte

    2014-01-01

    Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age, and gender. Twenty-eight thousand nine hundred twenty-eight commuters in The Capital Region of Denmark reported self-reported time spent either walking or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multi-modal network in a GIS. Multilevel logistic regression was used to analyze the association between accessibility, expressed as access area, and being an active commuter. Public transport accessibility area based on all stops within walking and cycling distance was positively associated with being an active commuter. Distance to work, age, and gender modified the associations. Residing within 10 km commute distance and in areas of high accessibility was associated with being an active commuter and meeting the recommendations of physical activity. For the respondents above 29 years, individual public transportation accessibility was positively associated with being an active commuter. Women having high accessibility had significantly higher odds of being an active commuter compared to having a low accessibility. For men, the associations were insignificant. This study extends the knowledge about the driving forces of using public transportation for commuting by examining the individual public transportation accessibility. Findings suggest that transportation accessibility supports active commuting and planning of improved public transit accessibility

  7. Accessibility, equity and efficiency. Challenges for Transport and Public Services

    NARCIS (Netherlands)

    Geurs, Karst Teunis; Patuelli, Roberto; Dentinho, T.

    2016-01-01

    In this book, leading researchers from around the world show the importance of accessibility in contemporary issues such as rural depopulation, investments in public services and public transport, and transport infrastructure investments in Europe. The trade-offs between accessibility, economic

  8. DIFABLE PERCEPTION FOR ACCESSIBILITY AND INFORMATION OF PUBLIC TRANSPORT IN JAKARTA

    Directory of Open Access Journals (Sweden)

    Mochdiana Hernawan

    2015-02-01

    Full Text Available Every human being has equal right for accessing to the transportation. Difable persons that have different ability also have the same right. The provision of the accessibility and information facility in public transport is not fully meet difable need and therefore difable persons have difficulties in accessibility and information while using public transports. This research will investigate the difable perceptions about accessibility and traveler information for the public transport in Jakarta. Questionnaire method will be used for this purpose and then analyzed by Importance Performance Analysis. The improvement for the transport infrastructure and information system will be elaborated. The findings of the research could be used as input for the local authority while planning or re-construction public transport infrastructure and information system so that difable persons become more accessible and convenience. The study results show that the average value of the perceived performance for the accessibility is 2.78 from 5 scales. This means the performance of the accessibility in overall is fairly. For the information facility, the average performance is 3.11 that meaning the performance in overall is good. The respondents required the provision of waiting room for difable persons as a priority. The information about the departure of the vehicle should been improved as priority to be increased. Furthermore, it is obtained that the Customer Satisfaction Index (CSI value for accessibility is 56%. This indicates the entire respondents satisfied sufficiently with the accessibility facility. Also, 62% of the CSI value shows that the respondents satisfied sufficiently with the provided information.

  9. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  10. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  11. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...... from a travel planner into a multimodal network model using simple SQL (structured query language) programming and standard GIS. The method presented here integrates all parts of travelling by public transportation from individual home addresses to all reachable transit stops within different travel....... The accessibility areas are created at morning rush hour for a study population of 29 447 individuals and a few examples of accessibility areas are presented. The results show a big difference in individual public transportation accessibility in the region. In addition, how the transit network is accessed, whether...

  12. Transportation Accessibility and Location Choice of Japanese-Funded Electronic Information Manufacturing Firms in Shanghai

    Directory of Open Access Journals (Sweden)

    Haining Jiang

    2018-02-01

    Full Text Available With the rapid development of globalization, information communication and transportation, it is argued that the effect of transportation accessibility in the location choice of manufacturing firms has diminished. However, comprehensive and systematic research on the impact of transportation accessibility on firm location choice in cities remains scarce. Taking Shanghai as the research area, this paper uses a catalog of Japanese-funded electronic information manufacturing firms to explore the influence of transportation accessibility on their location choice. The paper first describes firm distribution using the nuclear density estimation method. The Poisson regression model is then used to estimate the significance of transportation accessibility in influencing firm location. The empirical results show that most of the firms are concentrated in the inner suburbs of Shanghai, with only a small number in the outer suburban areas. The spatial coupling relationship between firm distribution and transportation accessibility is significant. These firms tend to choose areas with good accessibility to transportation infrastructure, and, in particular, the effect of airport accessibility is significant. Compared with the joint venture enterprises, wholly-owned Japanese enterprises are more inclined to be in areas with better transportation accessibility.

  13. Perceived Accessibility of Public Transport as a Potential Indicator of Social Inclusion

    OpenAIRE

    Lättman, Katrin; Friman, Margareta; Olsson, Lars E

    2016-01-01

    Perceived accessibility has been acknowledged as an important aspect of transport policy since the 70s. Nevertheless, very few empirical studies have been conducted in this field. When aiming to improve social inclusion, by making sustainable transport modes accessible to all, it is important to understand the factors driving perceived accessibility. Unlike conventional accessibility measures, perceived accessibility focuses on the perceived possibilities and ease of engaging in preferr...

  14. The U.S. Rural Population and Scheduled Intercity Transportation in 2010 : A Five-Year Decline in Transportation Access.

    Science.gov (United States)

    2011-02-01

    Between 2005 and 2010, 3.5 million rural residents lost access to scheduled intercity transportation, increasing the percent of rural residents without access to intercity transportation from 7 to 11 percent. In 2005, 5.4 million rural residents lack...

  15. 47 CFR 69.123 - Density pricing zones for special access and switched transport.

    Science.gov (United States)

    2010-10-01

    ... switched transport. 69.123 Section 69.123 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... for special access and switched transport. (a)(1) Incumbent local exchange carriers not subject to... at least 15 percent of that carrier's special access and transport revenues within that study area...

  16. The accessibility of Poland’s Space to the Trans-European Transport Network

    Directory of Open Access Journals (Sweden)

    Wiśniewski Szymon

    2017-09-01

    Full Text Available The aim of the article is to analyse the land transport accessibility of two trans-European corridors within the boundaries of Poland. The adjustment of the course of transport routes to the distribution of the population and the country’s land development (including economic potential and logistic infrastructure was outlined using measurements of cumulative accessibility. The results were presented in both cartographic form (isochrone approach and tabular form (cumulative approach. Research was conducted adopting different forms of transport used for relocation (including foot traffic, car, rail and multimodal transport and both the current and target layout of the transport network. This made it possible to determine the changes that will effectively run the process of investment in transport infrastructure on Polish territory. This allowed the identification of the areas of Poland which are particularly conveniently located in relation to domestic connections (in terms of the international network and those for which the European transport network remains difficult to access.

  17. Factors influencing the transport accessibility level - seniors point of view

    Energy Technology Data Exchange (ETDEWEB)

    Zakowska, L.; Pulawska-Obiedowska, S.

    2016-07-01

    The growing group of European older inhabitants, namely senior citizens (aged + 65) belong to the most vulnerable group to social exclusion. Transport accessibility is a concept, that can lead to enhancing life quality of seniors, which is shown based on the case study of Cracow, Poland as a European city. 100 seniors, that are living in different areas (urban, suburban), were asked for define different aspects that may influence their travel behaviour. Respondents were indicating their individual concerns connected with travelling, the existing barriers and expected solutions.The goal of the paper is to present the main outcomes of the conducted surveys, in order to present the concept of transport accessibility in the context of the most important factors influencing seniors life quality. The accessibility conditions and barriers, which can affect mobility possibilities and different activities of senior citizens in urban areas, are indicated in the paper. The identification of the crucial aspects of accessibility play an important role in development of sustainable transport system together with sustainable urban design, that will be friendly for all citizens in aging society. (Author)

  18. Accessibility measures: review and applications. Evaluation of accessibility impacts of land-use transportation scenarios, and related social and economic impact

    OpenAIRE

    Geurs KT; Ritsema van Eck JR; Universiteit Utrecht-URU; LAE

    2001-01-01

    This report describes an extensive literature study and three case studies aimed at reviewing accessibility measures for their ability to evaluate the accessibility impacts of national land-use and transport scenarios, and related social and economic impacts. Several activity- and utility-based accessibility measures were computed to analyse job accessibility by car and public transport in the Netherlands for: (1) the (base) year 1995, (2) a Trend, or business-as-usual, scenario, representing...

  19. The association between access to public transportation and self-reported active commuting.

    Science.gov (United States)

    Djurhuus, Sune; Hansen, Henning S; Aadahl, Mette; Glümer, Charlotte

    2014-12-05

    Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928). Access to public transportation measures were computed by combining GIS-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number of transport modes were all positively associated with being an active commuter and with meeting recommendations of physical activity. No significant association was found between bus services at the nearest stop and active commuting. The results highlight the importance of including detailed measurements of access to public transit in order to identify the characteristics that facilitate the use of public transportation and active commuting.

  20. The Association between Access to Public Transportation and Self-Reported Active Commuting

    Directory of Open Access Journals (Sweden)

    Sune Djurhuus

    2014-12-01

    Full Text Available Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928. Access to public transportation measures were computed by combining GIS-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number of transport modes were all positively associated with being an active commuter and with meeting recommendations of physical activity. No significant association was found between bus services at the nearest stop and active commuting. The results highlight the importance of including detailed measurements of access to public transit in order to identify the characteristics that facilitate the use of public transportation and active commuting.

  1. Comparable Measures of Accessibility to Public Transport Using the General Transit Feed Specification

    Directory of Open Access Journals (Sweden)

    Jinjoo Bok

    2016-03-01

    Full Text Available Public transport plays a critical role in the sustainability of urban settings. The mass mobility and quality of urban lives can be improved by establishing public transport networks that are accessible to pedestrians within a reasonable walking distance. Accessibility to public transport is characterized by the ease with which inhabitants can reach means of transportation such as buses or metros. By measuring the degree of accessibility to public transport networks using a common data format, a comparative study can be conducted between different cities or metropolitan areas with different public transit systems. The General Transit Feed Specification (GTFS by Google Developers allows this by offering a common format based on text files and sharing the data set voluntarily produced and contributed by the public transit agencies of many participating cities around the world. This paper suggests a method to assess and compare public transit accessibility in different urban areas using the GTFS feed and demographic data. To demonstrate the value of the new method, six examples of metropolitan areas and their public transit accessibility are presented and compared.

  2. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  3. Making accessibility analyses accessible: A tool to facilitate the public review of the effects of regional transportation plans on accessibility

    OpenAIRE

    Golub, Aaron; Robinson, Glenn; Brendan Nee, Brendan Nee

    2013-01-01

    The regional transportation planning process in the United States has not been easily opened to public oversight even after strengthened requirements for public participation and civil rights considerations. In the effort to improve the public review of regional transportation plans, this paper describes the construction of a proof-of concept web-based tool designed to analyze the effects of regional transportation plans on accessibility to jobs and other essential destinations. The tool allo...

  4. Accessibility of islands: towards a new geography based on transportation modes and choices

    Directory of Open Access Journals (Sweden)

    Sofia Karampela

    2014-11-01

    Full Text Available Accessibility is a multifaceted concept that expresses the case of access between two points in space. For islands, accessibility is a key quality, since isolation and small size considered as inherent characteristics of “islandness”. In this paper, we discuss differences between geographical distance and accessibility potential in the Greek Aegean, combining different transportation modal choice (ferries and airplanes with the use of an accessibility index that incorporates modes and frequency of connection and data of actual usage. The findings indicate that geographical distance is not determining accessibility and new geographies emerge based more on the availability of transport modal choices.

  5. The Association between Access to Public Transportation and Self-Reported Active Commuting

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning S; Aadahl, Mette

    2014-01-01

    Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate...... more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation...... and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928). Access to public transportation measures were computed by combining GIS...

  6. Transportation access to Yucca Mountain: Critical issues

    International Nuclear Information System (INIS)

    Halstead, R.J.; Souleyrette, R.R.; Bartolo, R. di

    1991-01-01

    Transportation planning for a repository at Yucca Mountain is complicated because of uncertainty about the modes and numbers of nuclear waste shipments and because of uncertainty about the routes which will be used. There could be as many as 76,000 truck shipments, or as few as 1,060 dedicated train shipments, during repository operations. The site lacks rail access. Three rail access options currently under study range in length from 120 miles to more than 400 miles. The site is more than 100 miles from the Interstate highway system. The UNLV Transportation Research Center has evaluated three rail and four highway routes using a broad range of impact measures. This preliminary evaluation found that the routing options differ significantly regarding resident and non-resident populations, environmentally sensitive areas, accident rates, and other factors. Crosscutting issues include impacts on Nevada Indian tribes, potential conflicts with US Air Force operations, and future population growth in southern Nevada. Considerable additional analysis will be required prior to environmental impact statement scoping

  7. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  8. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  9. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  10. Transportation constraints to rural health accessibility in Ogun ...

    African Journals Online (AJOL)

    Transportation constraints to rural health accessibility in Ogun Waterside Local Government Area of Ogun State Nigeria. ... Of the 200 questionnaires administered, 182 questionnaires were received for analysis using the Statistical Package for Social Sciences (SPSS). Secondary data was also sourced to serve as ...

  11. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  12. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  13. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  14. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Science.gov (United States)

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  15. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  16. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  17. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  18. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design for accessibility or inclusive design (ID) in this area. This paper sets out to discover what methods are used in the rail sector to achieve accessibility goals and to examine how far...... these methods deviate from user-centred and ID norms. Semi-structured interviews were conducted with nine rolling stock producers, operators and design consultancies. The purpose was to determine if ID design methods are used explicitly and the extent to which the processes used conformed to ID (if at all......). The research found that the role of users in the design process of manufacturers was limited and that compliance with industry standards was the dominant means to achieving accessibility goals. Design consultancies were willing to apply more user-centred design if the client requested it. Where operators were...

  19. Modeling Accessibility of Screening and Treatment Facilities for Older Adults using Transportation Networks.

    Science.gov (United States)

    Zhang, Qiuyi; Northridge, Mary E; Jin, Zhu; Metcalf, Sara S

    2018-04-01

    Increased lifespans and population growth have resulted in an older U.S. society that must reckon with the complex oral health needs that arise as adults age. Understanding accessibility to screening and treatment facilities for older adults is necessary in order to provide them with preventive and restorative services. This study uses an agent-based model to examine the accessibility of screening and treatment facilities via transportation networks for older adults living in the neighborhoods of northern Manhattan, New York City. Older adults are simulated as socioeconomically distinct agents who move along a GIS-based transportation network using transportation modes that mediate their access to screening and treatment facilities. This simulation model includes four types of mobile agents as a simplifying assumption: walk, by car, by bus, or by van (i.e., a form of transportation assistance for older adults). These mobile agents follow particular routes: older adults who travel by car, bus, and van follow street roads, whereas pedestrians follow walkways. The model enables the user to focus on one neighborhood at a time for analysis. The spatial dimension of an older adult's accessibility to screening and treatment facilities is simulated through the travel costs (indicated by travel time or distance) incurred in the GIS-based model environment, where lower travel costs to screening and treatment facilities imply better access. This model provides a framework for representing health-seeking behavior that is contextualized by a transportation network in a GIS environment.

  20. Mapping equality in access : the case of Bogota's sustainable transport initiatives

    NARCIS (Netherlands)

    Teunissen, Thijs; Sarmiento, Olga; Zuidgeest (Former Assistant Professor), Mark; Brussel, M.J.G.

    2015-01-01

    To enhance social equity, three important sustainable transportation initiatives have been introduced in Bogotá. Spatial information and GIS have been used to analyze levels of inequality in access to these initiatives. The results show that the TransMilenio BRT offers equal access for all

  1. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail ...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  2. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  3. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail...... and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  4. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  5. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  6. Accessible Transportation Technologies Research Initiative (ATTRI) : User Needs Assessment: Stakeholder Engagement Report.

    Science.gov (United States)

    2016-05-01

    The Accessible Transportation Technologies Research Initiative (ATTRI) is a joint U.S. Department of Transportation (U.S. DOT) initiative that is co-led by the Federal Highway Administration (FHWA) and the Federal Transit Administration (FTA). ATTRI ...

  7. 77 FR 50068 - Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles

    Science.gov (United States)

    2012-08-20

    ... ARCHITECTURAL AND TRANSPORTATION BARRIERS COMPLIANCE BOARD 36 CFR Part 1192 [Docket No. ATBCB 2010-0004] RIN 3014-AA38 Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles AGENCY: Architectural and Transportation Barriers Compliance Board. ACTION: Notice of public...

  8. 77 FR 56590 - Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles

    Science.gov (United States)

    2012-09-13

    ... ARCHITECTURAL AND TRANSPORTATION BARRIERS COMPLIANCE BOARD 36 CFR Part 1192 [Docket No. ATBCB 2010-0004] RIN 3014-AA38 Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles AGENCY: Architectural and Transportation Barriers Compliance Board. ACTION: Notice of information...

  9. 75 FR 54543 - Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles

    Science.gov (United States)

    2010-09-08

    ... ARCHITECTURAL AND TRANSPORTATION BARRIERS COMPLIANCE BOARD 36 CFR Part 1192 [Docket No. ATBCB 2010-0004] RIN 3014-AA38 Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles AGENCY: Architectural and Transportation Barriers Compliance Board. ACTION: Notice of public...

  10. The Efficiency and Public Transport Accessibility of Indirect State Administration in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Vrabková Iveta

    2016-06-01

    Full Text Available This paper examines the efficiency and public transport accessibility of indirect (devolved state administration performed by municipalities with extended powers (hereinafter MEPs in the Czech Republic. Our aim is to evaluate the efficiency of the revenues made by municipalities with extended powers, through performing powers delegated to them by the state administration, and those municipalities’ public transport accessibility as of 31 December, 2014. The rate of efficiency is tested on an output-oriented Free Disposable Hull model. One input variable is selected - the operating expenses of the municipal offices recalculated per inhabitant of the municipality’s administrative district - and two output variables are selected: contribution to the performance of state administration, recalculated per inhabitant of the municipality’s administrative district, and revenues from administrative fees per inhabitant of the municipality’s administrative district. The municipality’s offices’ transport accessibility is evaluated via network analysis using ArcGIS software. The article investigates the hypothesis that public administration deconcentration practices logically result in higher security costs and therefore inefficiency. The results reveal that only 66 of the country’s 205 MEPs are efficient and that operating expenses and state contributions for the performance of state administrative tasks play a significant role in these results. Efficiency is less significantly influenced by administrative fee revenues. Public transport accessibility is analyzed for two time intervals - 6:00 to 8:00 am and 1:00 to 2:00 pm - on Tuesdays. The degree of accessibility is defined using a six-point scale of accessibility. The results show that the best accessibility is in the morning hours, when the offices are accessible for 68.8% of the population aged 15+ in the Czech Republic; the worst accessibility is in the afternoon hours when only 2% of the

  11. The alternating access mechanism of transport as observed in the sodium-hydantoin transporter Mhp1

    International Nuclear Information System (INIS)

    Weyand, Simone; Shimamura, Tatsuro; Beckstein, Oliver; Sansom, Mark S. P.; Iwata, So; Henderson, Peter J. F.; Cameron, Alexander D.

    2011-01-01

    Crystal structures of a membrane protein transporter in three different conformational states provide insights into the transport mechanism. Secondary active transporters move molecules across cell membranes by coupling this process to the energetically favourable downhill movement of ions or protons along an electrochemical gradient. They function by the alternating access model of transport in which, through conformational changes, the substrate binding site alternately faces either side of the membrane. Owing to the difficulties in obtaining the crystal structure of a single transporter in different conformational states, relatively little structural information is known to explain how this process occurs. Here, the structure of the sodium-benzylhydantoin transporter, Mhp1, from Microbacterium liquefaciens, has been determined in three conformational states; from this a mechanism is proposed for switching from the outward-facing open conformation through an occluded structure to the inward-facing open state

  12. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  13. Alternating access mechanisms of LeuT-fold transporters: trailblazing towards the promised energy landscapes.

    Science.gov (United States)

    Kazmier, Kelli; Claxton, Derek P; Mchaourab, Hassane S

    2017-08-01

    Secondary active transporters couple the uphill translocation of substrates to electrochemical ion gradients. Transporter conformational motion, generically referred to as alternating access, enables a central ligand binding site to change its orientation relative to the membrane. Here we review themes of alternating access and the transduction of ion gradient energy to power this process in the LeuT-fold class of transporters where crystallographic, computational and spectroscopic approaches have converged to yield detailed models of transport cycles. Specifically, we compare findings for the Na + -coupled amino acid transporter LeuT and the Na + -coupled hydantoin transporter Mhp1. Although these studies have illuminated multiple aspects of transporter structures and dynamics, a number of questions remain unresolved that so far hinder understanding transport mechanisms in an energy landscape perspective. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Using the GTFS format to improve public transport data accessibility in Gauteng

    CSIR Research Space (South Africa)

    Koetsier, Sumarie

    2017-10-01

    Full Text Available Public transport plays an important role in cities. It is a less expensive option than private transport and could reduce congestion and improve accessibility to jobs. However, ridership could be hampered when information regarding an operator’s...

  15. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  16. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  17. Transportation barriers to accessing health care for urban children.

    Science.gov (United States)

    Yang, Serena; Zarr, Robert L; Kass-Hout, Taha A; Kourosh, Atoosa; Kelly, Nancy R

    2006-11-01

    The Texas Children's Hospital Residents' Primary Care Group Clinic provides primary care to urban low-income children. The objective of this cross-sectional study was to investigate the impact of transportation problems on a family's ability to keep an appointment. One hundred eighty-three caregivers of children with an appointment were interviewed. Caregivers who kept their appointment were compared with those who did not with respect to demographic and transportation-related characteristics. Logistic regression modeling predicted caregivers with the following characteristics were more likely not to keep an appointment: not using a car to the last kept appointment, not keeping an appointment in the past due to transportation problems, having more than two people in the household, and not keeping an appointment in the past due to reasons other than transportation problems. Future research should focus on developing interventions to help low-income urban families overcome non-financial access barriers, including transportation problems.

  18. Accessibility measures: review and applications. Evaluation of accessibility impacts of land-use transportation scenarios, and related social and economic impact

    NARCIS (Netherlands)

    Geurs KT; Ritsema van Eck JR; Universiteit Utrecht-URU; LAE

    2001-01-01

    This report describes an extensive literature study and three case studies aimed at reviewing accessibility measures for their ability to evaluate the accessibility impacts of national land-use and transport scenarios, and related social and economic impacts. Several activity- and utility-based

  19. Effects of Improved Access to Transportation on Emergency obstetric ...

    African Journals Online (AJOL)

    Reduction in maternal mortality has not been appreciable in most low-income countries. Improved access to transport for mothers is one way to improve maternal health. This study evaluated a free-of-charge 24-hour ambulance and communication services intervention in Oyam district using 'Caesarean section rate' (CSR) ...

  20. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  1. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  2. Accessibility-Based Transportation Planning : Literature and Applications for Shrinking Cities.

    Science.gov (United States)

    2014-07-01

    For 15 years, scholars have claimed that accessibility-based transportation planning was at the brink of becoming a new paradigm, and yet this hope remains unrealized. Its implementation may lag due to vague definitions when compared to mobility, or ...

  3. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  4. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  5. Pullman transportation plan : a transportation and access plan for Pullman National Monument and the surrounding neighborhood

    Science.gov (United States)

    2017-09-01

    The Pullman Transportation Plan provides a holistic set of recommendations to improve access to and from Pullman National Monument and its surrounding neighborhoods for both visitors and residents. In this plan, we identify short-, medium-, and long-...

  6. Individual public transportation accessibility is positively associated with self-reported active commuting

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2014-01-01

    BACKGROUND: Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between...... individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age, and gender. METHODS: Twenty-eight thousand nine hundred twenty-eight commuters in The Capital Region of Denmark reported self-reported time spent either walking...... or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multi-modal network in a GIS. Multilevel logistic regression was used...

  7. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  8. Remote controlled transport device

    International Nuclear Information System (INIS)

    Nakahira, Masataka; Oka, Kiyoshi; Ito, Akira; Tada, Eisuke; Sato, Masaki

    1998-01-01

    The present invention provides a device for transporting equipments for maintenance and parts between a maintenance port and a facility for maintenance by remote control in a radioactive material handling facility such as a nuclear power plant. Namely, a power supply bus bar is disposed along a transferring path in order to supply power to a transporting means, and is divided into every region having a predetermined length. Each of the power supply bus bar regions is controlled for the power supply by a control device. Accordingly, the transporting means can be moved and driven successively being independent on every power supply bus bar region. Accordingly, a plurality of transporting means can be operated independently in a transferring path without laying around power cables and control signal cables. (I.S.)

  9. Geographic Access Modeling of Emergency Obstetric and Neonatal Care in Kigoma Region, Tanzania: Transportation Schemes and Programmatic Implications.

    Science.gov (United States)

    Chen, Yi No; Schmitz, Michelle M; Serbanescu, Florina; Dynes, Michelle M; Maro, Godson; Kramer, Michael R

    2017-09-27

    Access to transportation is vital to reducing the travel time to emergency obstetric and neonatal care (EmONC) for managing complications and preventing adverse maternal and neonatal outcomes. This study examines the distribution of travel times to EmONC in Kigoma Region, Tanzania, using various transportation schemes, to estimate the proportion of live births (a proxy indicator of women needing delivery care) with poor geographic access to EmONC services. The 2014 Reproductive Health Survey of Kigoma Region identified 4 primary means of transportation used to travel to health facilities: walking, cycling, motorcycle, and 4-wheeled motor vehicle. A raster-based travel time model was used to map the 2-hour travel time catchment for each mode of transportation. Live birth density distributions were aggregated by travel time catchments, and by administrative council, to estimate the proportion of births with poor access. Of all live births in Kigoma Region, 13% occurred in areas where women can reach EmONC facilities within 2 hours on foot, 33% in areas that can be reached within 2 hours only by motorized vehicles, and 32% where it is impossible to reach EmONC facilities within 2 hours. Over 50% of births in 3 of the 8 administrative councils had poor estimated access. In half the councils, births with poor access could be reduced to no higher than 12% if all female residents had access to motorized vehicles. Significant differences in geographic access to EmONC in Kigoma Region, Tanzania, were observed both by location and by primary transportation type. As most of the population may only have good EmONC access when using mechanized or motorized vehicles, bicycles and motorcycles should be incorporated into the health transportation strategy. Collaboration between private transportation sectors and obstetric service providers could improve access to EmONC services among most populations. In areas where residents may not access EmONC facilities within 2 hours

  10. Modelling of radionuclide transport along the underground access structures of deep geological repositories

    Energy Technology Data Exchange (ETDEWEB)

    Poller, A. [National Cooperative for the Disposal of Radioactive Waste (NAGRA), Wettingen (Switzerland); Smith, P. [SAM Switzerland GmbH, Zuerich (Switzerland); Mayer, G.; Hayek, M. [AF-Consult Switzerland AG, Baden (Switzerland)

    2014-08-15

    The arrangement and sealing of the access routes to a deep geological repository for radioactive waste should ensure that any radionuclide release from the emplacement rooms during the post closure phase does not by-pass the geological barriers of the repository system to a significant extent. The base case of the present study, where realistic values for the hydraulic properties of the seals and the associated excavation damage zones were assumed, assesses to what extent this is actually the case for different layout variants (ramp and shaft access and shaft access only). Furthermore, as a test of robustness of system performance against uncertainties related to such seals and the associated excavation damage zones, the present study also considers a broad spectrum of calculation cases including the hypothetical possibility that the seals perform much more poorly than expected and to check whether, consequently, the repository tunnel system and the access structures may provide significant release pathways. The study considers a generic repository system for high-level waste (HLW repository) and for low- and intermediate-level waste (L/ILW repository), both with Opalinus Clay as the host rock. It also considers the alternative possibilities of a ramp or a shaft as the access route for material transport (waste packages, etc.) to the underground facilities. Additional shafts, e.g. for the transport of persons and for ventilation, are included in both cases. The overall modelling approach consists of three broad steps: (a) the network of tunnels and access structures is implemented in a flow model, which serves to calculate water flow rates along the tunnels and through the host rock; (b) all relevant transport paths are implemented in a radionuclide release and transport model, the water flow rates being obtained from the preceding flow model calculations; (c) individual effective dose rates arising from the radionuclides released from the considered repository

  11. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  12. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  13. Costs and benefits of employment transportation for low-wage workers: an assessment of job access public transportation services.

    Science.gov (United States)

    Thakuriah Vonu, Piyushimita; Persky, Joseph; Soot, Siim; Sriraj, P S

    2013-04-01

    This paper focuses on an evaluation of public transportation-based employment transportation (ET) services to transport low-wage workers to jobs in the US. We make an attempt to capture a more comprehensive range of intended and unintended outcomes of ET services than those traditionally considered in the case of public transportation services. Using primary data from 23 locations across the country, we present a framework to evaluate how transportation improvements, in interaction with labor markets, can affect users' short-run economic welfare, users' long-run human capital accumulation and non-users' short-run economic welfare. These services were partially funded by a specialized program - the Job Access and Reverse Commute (JARC) program - which was consolidated into larger transit funding programs by recent legislation. In the sites examined, we found that low wage users benefited from self-reported increased access to jobs, improvements in earnings potential, as well as from savings in transport cost and time. Simulations show the potential of users to accrue long-term worklife benefits. At the same time, users may have accrued changes in leisure time as a result of transitioning from unemployment to employment, and generated a range of societal impacts on three classes of non-users: the general tax-paying public, the general commuting public in the service operating area and other low-wage workers in local labor markets. Copyright © 2012 Elsevier Ltd. All rights reserved.

  14. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  15. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  16. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  17. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  18. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Science.gov (United States)

    2012-12-10

    ... Manager at [email protected]us.army.mil . References: Department of Defense Instruction number 8520.2... DEPARTMENT OF DEFENSE Department of the Army Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access Electronic Transportation Acquisition (ETA) AGENCY: Department of...

  19. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  20. Accessibility-based evaluation of transportation and land-use planning : from laboratory to practice : USDOT Region V Regional University Transportation Center final report.

    Science.gov (United States)

    2016-12-16

    The concept of accessibility has made inroads into planning practice, largely at the system level. That is, accessibility is measured or modeled for current or future regional transportation and land-use scenarios for evaluation or broad policy guida...

  1. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  2. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  3. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  4. Understanding the tariff. Access to the public power transportation network

    International Nuclear Information System (INIS)

    2002-01-01

    Since the European directive of December 19, 1996 about the common rules of the European power market, the eligible companies can chose their power supplier anywhere in Europe. The manager of the French power transportation network (RTE) supplies a network access to these companies according to a tariff fixed by the decree no. 2002-1014 from July 19, 2002. The aim of this document is to explain this tariff: tariffing principles ('mail-stamp' principle, voltage domain, subscribed output power tariffs, input power tariffs), tariffing elements (access to the grid, elements of output tariffs (subscribed power, overload, emergency tariffs, modifications etc..)), invoicing modalities, output tariffs, definitions. (J.S.)

  5. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  6. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  7. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  8. Operational Control of Internal Transport

    NARCIS (Netherlands)

    J.R. van der Meer (Robert)

    2000-01-01

    textabstractOperational Control of Internal Transport considers the control of guided vehicles in vehicle-based internal transport systems found in facilities such as warehouses, production plants, distribution centers and transshipment terminals. The author's interest of research having direct use

  9. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  10. Disk access controller for Multi 8 computer

    International Nuclear Information System (INIS)

    Segalard, Jean

    1970-01-01

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  11. Evaluating transportation equity : an intermetropolitan comparison of regional accessibility and urban form.

    Science.gov (United States)

    2013-06-01

    The concept of accessibility is used as the measurement tool to assess the link between social equity and the built environment because : it simultaneously accounts for both land-use patterns and a transportation system. This study compares 25 metrop...

  12. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  14. Intelligent urban public transportation for accessibility dedicated to people with disabilities.

    Science.gov (United States)

    Zhou, Haiying; Hou, Kun-Mean; Zuo, Decheng; Li, Jian

    2012-01-01

    The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB) passengers. In this paper, based on advanced information & communication technologies (ICT) and green technologies (GT) concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line '2' in the city of Clermont-Ferrand (France). The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor.

  15. Intelligent Urban Public Transportation for Accessibility Dedicated to People with Disabilities

    Science.gov (United States)

    Zhou, Haiying; Hou, Kun-Mean; Zuo, Decheng; Li, Jian

    2012-01-01

    The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB) passengers. In this paper, based on advanced information & communication technologies (ICT) and green technologies (GT) concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line ‘2’ in the city of Clermont-Ferrand (France). The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor. PMID:23112622

  16. Intelligent Urban Public Transportation for Accessibility Dedicated to People with Disabilities

    Directory of Open Access Journals (Sweden)

    Jian Li

    2012-08-01

    Full Text Available The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB passengers. In this paper, based on advanced information & communication technologies (ICT and green technologies (GT concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line ‘2’ in the city of Clermont-Ferrand (France. The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor.

  17. Access control based on attribute certificates for medical intranet applications.

    Science.gov (United States)

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  18. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  19. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  20. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  1. The use of modern information technology in research on transport accessibility

    Directory of Open Access Journals (Sweden)

    Bartosz BARTOSIEWICZ

    2015-09-01

    Full Text Available Transport accessibility can be analyzed using a number of different methods. The problem with each of them is the difficulty of obtaining data to measure this phenomenon The focus of this article and its main goal are to present methods and tools for gathering data on road traffic; thanks to modern information technology, it is possible to collect real data without the need for large-scale and highly capital-intensive measurements. The application of modern information technology (IT presented in the article, such as computer programs and applications like Google Maps Traffic Overlay and TomTom Live Traffic, enable research to be conducted on a scale that has thus far been unattainable, and allows information to be collected on such criteria as traffic volume, flow, average traffic speed, and actual journey time. Such innovative means of gathering data on automobile traffic open up new perspectives for assessing transport accessibility in terms of automobile traffic by providing high-quality data that meet the requirements for use in primary research.

  2. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  3. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  4. Locating stations of public transportation vehicles for improving transit accessibility

    Directory of Open Access Journals (Sweden)

    H. Ziari

    2007-06-01

    Full Text Available Since transportation is one of the most complicated and the basic problem of urban life in developing countries at the present time and in various dimensions, so it is necessary to view it more scientifically-practically. Reducing travelling time is one way to reduce its cost. In public transportation system, it is important to determine proper travelling costs. There are various methods to determine the distances between stations. One of these methods used in England is based on logical and calculative relations in mathematics. In this paper, in addition to studying this method some changes have been made in order to reduce and modify required variables for calculation of those relations. A numerical example is designed to demonstrate the effectiveness of the method and thus developed to optimize the public transportation stop location problem. The sensitivity of the total travel time, access, speed and the effect of the parameters on the optimum stop location are analyzed and discussed.

  5. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  6. Role based access control design using Triadic concept analysis

    Institute of Scientific and Technical Information of China (English)

    Ch Aswani Kumar; S Chandra Mouliswaran; LI Jin-hai; C Chandrasekar

    2016-01-01

    Role based access control is one of the widely used access control models. There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis (FCA), description logics, and Ontology for representing access control mechanism. However, while using FCA, investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. This transformation is mainly to derive the formal concepts, lattice structure and implications to represent role hierarchy and constraints of RBAC. In this work, we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts. Our discussion is on two lines of inquiry. We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.

  7. Open access natural gas transportation: A progress report on FERC implementation

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    This article is a progress report on the Federal Energy Regulatory Commission's implementation of a US Court of Appeals decision upholding open access natural gas transportation. The five issues addressed by the court are identified and discussed. Take or Pay (TOP) contract modification, the crediting mechanism, pregranted abandonment, contract demand reduction, TOP cost passthrough are also discussed

  8. Nanoengineered membranes for controlled transport

    Science.gov (United States)

    Doktycz, Mitchel J [Oak Ridge, TN; Simpson, Michael L [Knoxville, TN; McKnight, Timothy E [Greenback, TN; Melechko, Anatoli V [Oak Ridge, TN; Lowndes, Douglas H [Knoxville, TN; Guillorn, Michael A [Knoxville, TN; Merkulov, Vladimir I [Oak Ridge, TN

    2010-01-05

    A nanoengineered membrane for controlling material transport (e.g., molecular transport) is disclosed. The membrane includes a substrate, a cover definining a material transport channel between the substrate and the cover, and a plurality of fibers positioned in the channel and connected to an extending away from a surface of the substrate. The fibers are aligned perpendicular to the surface of the substrate, and have a width of 100 nanometers or less. The diffusion limits for material transport are controlled by the separation of the fibers. In one embodiment, chemical derivitization of carbon fibers may be undertaken to further affect the diffusion limits or affect selective permeability or facilitated transport. For example, a coating can be applied to at least a portion of the fibers. In another embodiment, individually addressable carbon nanofibers can be integrated with the membrane to provide an electrical driving force for material transport.

  9. Accessible Transportation, Geographic Elevation, and Masticatory Ability Among Elderly Residents of a Rural Area.

    Science.gov (United States)

    Hamano, Tsuyoshi; Tominaga, Kazumichi; Takeda, Miwako; Sundquist, Kristina; Nabika, Toru

    2015-06-26

    Given that public transportation networks are often worse in rural areas than in urban areas, rural residents who do not drive can find it difficult to access health-promoting goods, services, and resources related to masticatory ability. Moreover, geographical location, assessed by elevation, could modify this association. The aim of this study was to test whether the association between access to transportation and masticatory ability varied by elevation. Data were collected from a cross-sectional study conducted in Mizuho and Iwami counties, Japan. Objective masticatory ability was evaluated using a test gummy jelly and elevation was estimated by the geographic information systems according to the participant's address. After excluding subjects with missing data, 672 subjects (Mizuho = 401 and Iwami = 271) were analyzed. After adjustment for potential confounders, being a driver was not significantly associated with masticatory ability among elderly people living at low elevation (≤313 m) in Mizuho county. However, after the same adjustment, being a driver remained significantly associated with increased masticatory ability among elderly at high elevations. Similar findings were observed in Iwami county. Accessible transportation was significantly associated with increased mastication ability in elderly people living at high elevations, but not in those living at low elevations.

  10. Accessible Transportation, Geographic Elevation, and Masticatory Ability Among Elderly Residents of a Rural Area

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Hamano

    2015-06-01

    Full Text Available Given that public transportation networks are often worse in rural areas than in urban areas, rural residents who do not drive can find it difficult to access health-promoting goods, services, and resources related to masticatory ability. Moreover, geographical location, assessed by elevation, could modify this association. The aim of this study was to test whether the association between access to transportation and masticatory ability varied by elevation. Data were collected from a cross-sectional study conducted in Mizuho and Iwami counties, Japan. Objective masticatory ability was evaluated using a test gummy jelly and elevation was estimated by the geographic information systems according to the participant’s address. After excluding subjects with missing data, 672 subjects (Mizuho = 401 and Iwami = 271 were analyzed. After adjustment for potential confounders, being a driver was not significantly associated with masticatory ability among elderly people living at low elevation (≤313 m in Mizuho county. However, after the same adjustment, being a driver remained significantly associated with increased masticatory ability among elderly at high elevations. Similar findings were observed in Iwami county. Accessible transportation was significantly associated with increased mastication ability in elderly people living at high elevations, but not in those living at low elevations.

  11. Control of internal transport barriers on Alcator C-Mod

    International Nuclear Information System (INIS)

    Fiore, C.L.; Bonoli, P.T.; Ernst, D.R.; Hubbard, A.E.; Greenwald, M.J.; Lynn, A.; Marmar, E.S.; Phillips, P.; Redi, M.H.; Rice, J.E.; Wolfe, S.M.; Wukitch, S.J.; Zhurovich, K.

    2004-01-01

    Recent studies of internal transport and double transport barrier regimes in the Alcator C-Mod [I. H. Hutchinson et al., Phys. Plasmas 1, 1511 (1994)] have explored the limits for forming, maintaining, and controlling these plasmas. The C-Mod provides a unique platform for studying such discharges: the ions and electrons are tightly coupled by collisions and the plasma has no internal particle or momentum sources. The double-barrier mode comprised of an edge barrier with an internal transport barrier (ITB) can be induced at will using off-axis ion cyclotron range of frequency (ICRF) injection on either the low or high field side of the plasma with either of the available ICRF frequencies (70 or 80 MHz). When an enhanced D α high confinement mode (EDA H-mode) is accessed in Ohmic plasmas, the double barrier ITB forms spontaneously if the H-mode is sustained for ∼2 energy confinement times. The ITBs formed in both Ohmic and ICRF heated plasmas are quite similar regardless of the trigger method. They are characterized by strong central peaking of the electron density, and a reduction of the core particle and energy transport. The control of impurity influx and heating of the core plasma in the presence of the ITB have been achieved with the addition of central ICRF power in both the Ohmic H-mode and ICRF induced ITBs. The radial location of the particle transport barrier is dependent on the toroidal magnetic field but not on the location of the ICRF resonance. A narrow region of decreased electron thermal transport, as determined by sawtooth heat pulse analysis, is found in these plasmas as well. Transport analysis indicates that a reduction of the particle diffusivity in the barrier region allows the neoclassical pinch to drive the density and impurity accumulation in the plasma center. An examination of the gyrokinetic stability at the trigger time for the ITB suggests that the density and temperature profiles are inherently stable to ion temperature gradient and

  12. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, M.; Sadighi, Babak

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based

  13. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  14. Towards an Approach of Semantic Access Control for Cloud Computing

    Science.gov (United States)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  15. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  16. ROSA P : The National Transportation Library’s Repository and Open Science Access Portal

    Science.gov (United States)

    2018-01-01

    The National Transportation Library (NTL) was founded as an all-digital repository of US DOT research reports, technical publications and data products. NTLs primary public offering is ROSA P, the Repository and Open Science Access Portal. An open...

  17. O Impacto do Sistema de Transporte sobre o Espaço Urbano e seu Controle

    Directory of Open Access Journals (Sweden)

    Andreina Nigriello

    1992-12-01

    Full Text Available The control of the impact caused by improvements made in the transportation system on urban areas presumes the recognition of the interaction between soil utilization and occupation and access thereto. Said interaction and its effects can be found in statistical studies concerned with the impact caused by São Paulo subway North-South line on urban areas, and the purpose thereof is to: develop a greater sense of social equity in the distribution of indirect benefits associated with public investments in the transportation sector; create new financing sources for said sector; and reduce the withdrawal of poor people from areas directly served by improved transportation system

  18. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  19. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  20. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  1. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  2. The accessibility in the external part of the TM5 of the glutamate transporter EAAT1 is conformationally sensitive during the transport cycle.

    Directory of Open Access Journals (Sweden)

    Xiuping Zhang

    Full Text Available BACKGROUND: Excitatory amino acid transporter 1 (EAAT1 is a glutamate transporter which is a key element in the termination of the synaptic actions of glutamate. It serves to keep the extracellular glutamate concentration below neurotoxic level. However the functional significance and the change of accessibility of residues in transmembrane domain (TM 5 of the EAAT1 are not clear yet. METHODOLOGY/PRINCIPAL FINDINGS: We used cysteine mutagenesis with treatments with membrane-impermeable sulfhydryl reagent MTSET [(2-trimethylammonium methanethiosulfonate] to investigate the change of accessibility of TM5. Cysteine mutants were introduced from position 291 to 300 of the cysteine-less version of EAAT1. We checked the activity and kinetic parameters of the mutants before and after treatments with MTSET, furthermore we analyzed the effect of the substrate and blocker on the inhibition of the cysteine mutants by MTSET. Inhibition of transport by MTSET was observed in the mutants L296C, I297C and G299C, while the activity of K300C got higher after exposure to MTSET. V(max of L296C and G299C got lower while that of K300C got higher after treated by MTSET. The L296C, G299C, K300C single cysteine mutants showed a conformationally sensitive reactivity pattern. The sensitivity of L296C to MTSET was potentiated by glutamate and TBOA,but the sensitivity of G299C to MTSET was potentiated only by TBOA. CONCLUSIONS/SIGNIFICANCE: All these facts suggest that the accessibility of some positions of the external part of the TM5 is conformationally sensitive during the transport cycle. Our results indicate that some residues of TM5 take part in the transport pathway during the transport cycle.

  3. Output feedback control of heat transport mechanisms in parabolic distributed solar collectors

    KAUST Repository

    Elmetennani, Shahrazed

    2016-08-05

    This paper presents an output feedback control for distributed parabolic solar collectors. The controller aims at forcing the outlet temperature to track a desired reference in order to manage the produced heat despite the external disturbances. The proposed control strategy is derived using the distributed physical model of the system to avoid the loss of information due to model approximation schemes. The system dynamics are driven to follow reference dynamics defined by a transport equation with a constant velocity, which allows to control the transient behavior and the response time of the closed loop. The designed controller depends only on the accessible measured variables which makes it easy for real time implementation and useful for industrial plants. Simulation results show the efficiency of the reference tracking closed loop under different working conditions.

  4. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  5. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    Science.gov (United States)

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  6. Accessibility of Real Estate by Transportation as a Determinant of the Development of Suburban Real Estate Markets – Case Study

    Directory of Open Access Journals (Sweden)

    Wolny Ada

    2016-03-01

    Full Text Available The aim of this article is to show the accessibility of real estate by transportation as a factor that significantly determines the decision to acquire it. Direct access to a public road, or access to an internal road that provides communication with the public road, are a factor affecting the value of real estate. In addition, this factor is taken into account in the process of changing the function of the area, especially in determining zoning and land use. The decision of purchasing real estate often depends on transportation accessibility, because it has an impact on developing the selected plot.

  7. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  8. Accessibility appraisal of integrated land-use/transport policy strategies: more than just adding up travel time savings

    NARCIS (Netherlands)

    Geurs, Karst Teunis; Zondag, Barry; de Jong, Gerard; de Bok, Michiel

    2010-01-01

    We examine the accessibility benefits associated with some land-use policy strategies for the Netherlands that anticipate on expected climate change. A disaggregate logsum accessibility measure using the Dutch national land-use/transport interaction model TIGRIS XL is used to compute changes in

  9. Control system of fuel transporting device

    International Nuclear Information System (INIS)

    Yokota, Minoru.

    1981-01-01

    Purpose: To effectively avoid an obstacle in a fuel transporting device by reading the outputs of absolute position detectors mounted on movable trucks, controlling the movements of the trucks, and thereby smoothly and accurately positioning the fuel transporting device at predetermined position and providing a contact detector thereat. Method: The outputs from absolute position detectors which are mounted on a longitudinally movable truck and a laterally movable truck are input to an input/output control circuit. The input/output control circuit serves to compare, the position a fuel transporting device is to be moved to, with the present position on the basis of said input detection signal and a command signal from an operator console, to calculate the amount of movement to be driven, to produce an operation signal therefor to a control panel, and to drive and control the drive motors which are respectively mounted on the trucks for the fuel transfer device. On the other hand, in case that the transfer device comes into contact with an obstacle, the contact detector will immediately operate to produce a stop command through the control panel to the transporting device, and avoid a collision with the obstacle. (Yoshino, Y.)

  10. Logistic control in automated transportation networks

    NARCIS (Netherlands)

    Ebben, Mark

    2001-01-01

    Increasing congestion problems lead to a search for alternative transportation systems. Automated transportation networks, possibly underground, are an option. Logistic control systems are essential for future implementations of such automated transportation networks. This book contributes to the

  11. Foundation for a Time Interval Access Control Model

    National Research Council Canada - National Science Library

    Afinidad, Francis B; Levin, Timothy E; Irvine, Cynthia E; Nguyen, Thuy D

    2005-01-01

    A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a time interval access graph...

  12. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  13. Delayed feedback control in quantum transport.

    Science.gov (United States)

    Emary, Clive

    2013-09-28

    Feedback control in quantum transport has been predicted to give rise to several interesting effects, among them quantum state stabilization and the realization of a mesoscopic Maxwell's daemon. These results were derived under the assumption that control operations on the system are affected instantaneously after the measurement of electronic jumps through it. In this contribution, I describe how to include a delay between detection and control operation in the master equation theory of feedback-controlled quantum transport. I investigate the consequences of delay for the state stabilization and Maxwell's daemon schemes. Furthermore, I describe how delay can be used as a tool to probe coherent oscillations of electrons within a transport system and how this formalism can be used to model finite detector bandwidth.

  14. Web-based Traffic Noise Control Support System for Sustainable Transportation

    Science.gov (United States)

    Fan, Lisa; Dai, Liming; Li, Anson

    Traffic noise is considered as one of the major pollutions that will affect our communities in the future. This paper presents a framework of web-based traffic noise control support system (WTNCSS) for a sustainable transportation. WTNCSS is to provide the decision makers, engineers and publics a platform to efficiently access the information, and effectively making decisions related to traffic control. The system is based on a Service Oriented Architecture (SOA) which takes the advantages of the convenience of World Wide Web system with the data format of XML. The whole system is divided into different modules such as the prediction module, ontology-based expert module and dynamic online survey module. Each module of the system provides a distinct information service to the decision support center through the HTTP protocol.

  15. Supermarket access, transport mode and BMI: the potential for urban design and planning policy across socio-economic areas.

    Science.gov (United States)

    Murphy, Maureen; Koohsari, Mohammad Javad; Badland, Hannah; Giles-Corti, Billie

    2017-12-01

    To investigate dietary intake, BMI and supermarket access at varying geographic scales and transport modes across areas of socio-economic disadvantage, and to evaluate the implementation of an urban planning policy that provides guidance on spatial access to supermarkets. Cross-sectional study used generalised estimating equations to investigate associations between supermarket density and proximity, vegetable and fruit intake and BMI at five geographic scales representing distances people travel to purchase food by varying transport modes. A stratified analysis by area-level disadvantage was conducted to detect optimal distances to supermarkets across socio-economic areas. Spatial distribution of supermarket and transport access was analysed using a geographic information system. Melbourne, Australia. Adults (n 3128) from twelve local government areas (LGA) across Melbourne. Supermarket access was protective of BMI for participants in high disadvantaged areas within 800 m (P=0·040) and 1000 m (P=0·032) road network buffers around the household but not for participants in less disadvantaged areas. In urban growth area LGA, only 26 % of dwellings were within 1 km of a supermarket, far less than 80-90 % of dwellings suggested in the local urban planning policy. Low public transport access compounded disadvantage. Rapid urbanisation is a global health challenge linked to increases in dietary risk factors and BMI. Our findings highlight the importance of identifying the most appropriate geographic scale to inform urban planning policy for optimal health outcomes across socio-economic strata. Urban planning policy implementation in disadvantaged areas within cities has potential for reducing health inequities.

  16. Assessing Accessibility and Transport Infrastructure Inequities in Administrative Units in Serbia’s Danube Corridor Based on Multi-Criteria Analysis and Gis Mapping Tools

    Directory of Open Access Journals (Sweden)

    Ana VULEVIC

    2018-02-01

    Full Text Available The Danube Regions, especially the sub-national units of governance, must be ready to play an active role in spatial development policies. A precondition for this is good accessibility and the coordinated development of all transport systems in the Danube corridor. The main contribution of this paper is to provide a multi-criteria model for potential decision making related to the evaluation of transportation accessibility in Serbia’s Danube Corridor. Geographic Information Systems (GIS, based on maps, indicate the existing counties’ transport infrastructures inequities (between well-connected and isolated counties in terms of accessibility to central places. Through the research, relevant indicators have been identifi ed. This provides an outline of transportation perspectives regarding the development achieved and also fosters the increase of transportation accessibility in some peripheral Serbian Danube administrative units – counties (Nomenclature of Territorial Units for Statistics level 3 – NUTS 3.

  17. Transportation Limitation Access to the Small Islands (Case Study: Banggai Laut Regency)

    Science.gov (United States)

    Sunarti, S.

    2018-02-01

    Indonesia is as an archipelago and maritime country, the large number of Islands owned and scattered in all directions makes a challenge for the Government in equitable development. Development in Indonesia has not been spread evenly and tends to focus on the big island, while the smaller islands are still far behind and lack of government attention. One of them is the lack of infrastructure especially the access to the small islands. Among the small islands in Indonesia with minimal maritime infrastructure or transportation is Banggai Laut Regency, Central Sulawesi Province. This Regency is a new regency that separate itself from its previous regency that is Banggai Kepulauan Regency in about 4 years ago. For the development of the Banggai Laut Regency, access to reach that regency is quite difficult. Therefore, the aim of this research is to find infrastructure development strategy to support the development of Banggai Laut Regency. The research method used was the concurrent model mixed method. Data collection method was done with primary data through field observation and interview, secondary data through literature and document review. Analytical techniques used are qualitative descriptive and Map Overlay techniques using GIS to describe the characteristics of study areas and spatial relationships between islands. The results of this research conclude that the Banggai Laut Regency requires infrastructure development particularly maritime transportation to enhance accessibility of the community headed to Banggi Laut Regency or headed to another island from the Banggai Laut Regency.

  18. Transport and Access to Inclusive Education in Mashonaland West Province, Zimbabwe

    Directory of Open Access Journals (Sweden)

    Maria Kett

    2016-06-01

    Full Text Available Lack of accessible transportation is considered a major barrier to education for children with disabilities—children already far less likely to attend school. While millions of children face challenges with getting to school, including long distances, poor roads, lack of transport and safety issues, these can be compounded for children with disabilities. Yet there is little data from low and middle-income countries on the nature and extent of this exclusion, or on attempted solutions. This paper explores some practical options for improving transport as part of providing inclusive education for children with disabilities in low income countries, as well applying concepts of transport-related social exclusion in such contexts. The paper reviews a project designed to improve sustainable transportation to school for children with disabilities in four districts in Mashonaland West Province, Zimbabwe. The most common solution was three wheel motorbikes (tricycles with trailers. Whilst not been unproblematic, teachers, parents and the wider communities overwhelmingly agree that they have supported children with disabilities to attend school. Obviously tricycles are not the only component needed for an inclusive education system, but they are a start. The paper also highlights some crucial gaps in current approaches, key among which is the fact the most government departments work in silos. Whilst inclusive education is strongly supported by the Zimbabwean Government, there is a lack of joined up thinking between transport and education ministries. Without stronger collaboration across ministries children with disabilities will continue to experience avoidable barriers and transport-related social exclusion.

  19. The Practice of Hospital Intranet Terminal Access Control Solution

    Institute of Scientific and Technical Information of China (English)

    QI Shi-tao; TANG Li-ming

    2016-01-01

    Along with the increasingly urgent management needs of intranet terminals in hospital, and large scaled deployment of terminal management system, terminal access control has become one of the standard functions of terminal management. This paper mainly aims at some simple research for the system construction of hospital intranet terminal access control.

  20. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  1. Urban development control based on transportation carrying capacity

    Science.gov (United States)

    Miharja, M.; Sjafruddin, A. H.

    2017-06-01

    Severe transportation problems in Indonesian urban areas are stimulated by one fundamental factor, namely lack of awareness on transportation carrying capacity in these areas development control. Urban land use development towards more physical coverage is typically not related with the capability of transportation system to accommodate additional trips volume. Lack of clear connection between development permit with its implication on the transportation side has led to a phenomenon of exceeding transport demand over supply capacity. This paper discusses the concept of urban land use development control which will be related with transport carrying capacity. The discussion would cover both supply and demand sides of transportation. From supply side, the analysis regarding the capacity of transport system would take both existing as well as potential road network capacity could be developed. From demand side, the analysis would be through the control of a maximum floor area and public transport provision. Allowed maximum floor area for development would be at the level of generating traffic at reasonable volume. Ultimately, the objective of this paper is to introduce model to incorporate transport carrying capacity in Indonesian urban land use development control.

  2. Experience with ActiveX control for simple channel access

    International Nuclear Information System (INIS)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-01-01

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls

  3. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  4. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  5. The stakes of gas and electricity transport: the fixing of access charges; Les enjeux du transport pour le gaz et l'electricite: la fixation des charges d'acces

    Energy Technology Data Exchange (ETDEWEB)

    Percebois, J.; David, L.

    2001-05-01

    The goal of opening of network industries to competition is the lowering of the tariffs paid by the end-user. This opening is accompanied by a bookkeeping separation and sometimes a legal un-bundling between the different segments of activities (production, transport, distribution, commercialization). When natural monopolies exist, a system of access to the network by third parties must be implemented and controlled by an independent regulation authority. The main question remains the fixing of a just, efficient, transparent and non-discriminatory tariff of access which allows a long-term viability of this network activity. This paper presents first, the lessons of the economical theory and then, the practical experience in France, UK and the USA and the difficult arbitrations with their perverse side effects. (J.S.)

  6. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  7. Mandatory and Location-Aware Access Control for Relational Databases

    Science.gov (United States)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  8. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  9. Does public transportation improve the accessibility of primary dental care in São Paulo, Brazil?

    Science.gov (United States)

    Yuen, Aidan; Martins Rocha, Carla; Kruger, Estie; Tennant, Marc

    2018-06-01

    Advances in geospatial technologies have recognized the role of geographic distance as a barrier to healthcare accessibility. Frequent transportation is supposed to buffer issues with distance, while infrequent services impede the uptake of care. The role of public transportation on the accessibility of health care-including oral health care-is not well elucidated in the context of megacities, such as the municipality of São Paulo, Brazil. This study aimed to compare the supply of public transportation to primary dental clinics and the population between advantaged and disadvantaged areas in São Paulo city. A total of 4101 primary dental clinics in São Paulo city were identified and geocoded. Geographic coordinates were also retrieved for the 19 242 bus stops, 56 commuter rail stations and 64 rapid transit stations. Clinic locations and transport points were integrated with the city's 19 128 constituent census tracts-each containing sociodemographic data on the 11 252 204 residents-using Geographic Information Systems (GIS). Almost all clinics were located within 0.5 km of public transportation. Half of all clinics were within 0.5 km of high-frequency transport points, and three-quarters were within 1 km. Likewise, 99% of the population resided within 0.5 km of any public transportation. However, only 22% were within 0.5 km of high-frequency options, and half were within 1 km. Those within 0.5 km of high-frequency points had higher average monthly household incomes and lower illiteracy rates, with lower proportions of children and ethnic minorities, and higher proportions of older people. Clinics and populations in sociodemographically disadvantaged tracts have poorer public transportation links in São Paulo city. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  10. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  11. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  12. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  13. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  14. Public Housing Relocations and Relationships of Changes in Neighborhood Disadvantage and Transportation Access to Unmet Need for Medical Care.

    Science.gov (United States)

    Haley, Danielle F; Linton, Sabriya; Luo, Ruiyan; Hunter-Jones, Josalin; Adimora, Adaora A; Wingood, Gina M; Bonney, Loida; Ross, Zev; Cooper, Hannah L

    2017-01-01

    Cross-sectional research suggests that neighborhood characteristics and transportation access shape unmet need for medical care. This longitudinal analysis explores relationships of changes in neighborhood socioeconomic disadvantage and trans- portation access to unmet need for medical care. We analyzed seven waves of data from African American adults (N = 172) relocating from severely distressed public housing complexes in Atlanta, Georgia. Surveys yielded individual-level data and admin- istrative data characterized census tracts. We used hierarchical generalized linear models to explore relationships. Unmet need declined from 25% pre-relocation to 12% at Wave 7. Post-relocation reductions in neighborhood disadvantage were inversely associated with reductions in unmet need over time (OR = 0.71, 95% CI = 0.51-0.99). More frequent transportation barriers predicted unmet need (OR = 1.16, 95% CI = 1.02-1.31). These longitudinal findings support the importance of neighborhood environments and transportation access in shaping unmet need and suggest that improvements in these exposures reduce unmet need for medical care in this vulnerable population.

  15. Optimizing pipeline transportation using a fuzzy controller

    Energy Technology Data Exchange (ETDEWEB)

    Aramaki, Thiago L.; Correa, Joao L. L.; Montalvoa, Antonio F. F. [National Control and Operation Center Tranpetro, Rio de Janeiro, (Brazil)

    2010-07-01

    The optimization of pipeline transportation is a big concern for the transporter companies. This paper is the third of a series of three articles which investigated the application of a system to simulate the human ability to operate a pipeline in an optimized way. The present paper presents the development of a proportional integral (PI) fuzzy controller, in order to optimize pipeline transportation capacity. The fuzzy adaptive PI controller system was developed and tested with a hydraulic simulator. On-field data were used from the OSBRA pipeline. The preliminary tests showed that the performance of the software simulation was satisfactory. It varied the set-point of the conventional controller within the limits of flow meters. The transport capacity of the pipe was maximize without compromising the integrity of the commodities transported. The system developed proved that it can be easily deployed as a specialist optimizing system to be added to SCADA systems.

  16. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  17. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  18. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  19. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  20. Public Transport Versus Private Car: GIS-Based Estimation of Accessibility Applied to the Tel Aviv Metropolitan Area - www-publicatie

    NARCIS (Netherlands)

    Benenson, I.; Martens, C.J.C.M.; Rofe, Y.; Kwartler, A.

    2011-01-01

    The increasing interest in sustainable development has underlined the importance of accessibility as a key indicator to assess transport investments, urban policy, and urban form. From both the environmental and the equity component of sustainability, a comparison of accessibility by car versus

  1. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  2. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  3. Resonance controlled transport in phase space

    Science.gov (United States)

    Leoncini, Xavier; Vasiliev, Alexei; Artemyev, Anton

    2018-02-01

    We consider the mechanism of controlling particle transport in phase space by means of resonances in an adiabatic setting. Using a model problem describing nonlinear wave-particle interaction, we show that captures into resonances can be used to control transport in momentum space as well as in physical space. We design the model system to provide creation of a narrow peak in the distribution function, thus producing effective cooling of a sub-ensemble of the particles.

  4. Control of radioactive material transport in sodium-cooled reactors

    International Nuclear Information System (INIS)

    Brehm, W.F.

    1980-03-01

    The Radioactivity Control Technology (RCT) program was established by the Department of Energy to develop and demonstrate methods to control radionuclide transport to ex-core regions of sodium-cooled reactors. This radioactive material is contained within the reactor heat transport system with any release to the environment well below limits established by regulations. However, maintenance, repair, decontamination, and disposal operations potentially expose plant workers to radiation fields arising from radionuclides transported to primary system components. This paper deals with radioactive material generated and transported during steady-state operation, which remains after 24 Na decay. Potential release of radioactivity during postulated accident conditions is not discussed. The control methods for radionuclide transport, with emphasis on new information obtained since the last Environmental Control Symposium, are described. Development of control methods is an achievable goal

  5. Report of the experts group on the taxation of the access to gas transport and distribution network

    International Nuclear Information System (INIS)

    2001-04-01

    In the framework of a new french gas industry organization (directive of the 22 june 1998), a concerting mission has been realized on prices taxation for the transport and distribution facilities. The following topics have been debated: the integration and competition of the european gas market, the gas market liberalization consistency and the taxation of transport and distribution network access. (A.L.B.)

  6. Controlling Ionic Transport for Device Design in Synthetic Nanopores

    Science.gov (United States)

    Kalman, Eric Boyd

    Polymer nanopores present a number of behaviors not seen in microscale systems, such as ion current rectification, ionic selectivity, size exclusion and potential dependent ion concentrations in and near the pore. The existence of these effects stems from the small size of nanopores with respect to the characteristic length scales of surface interactions at the interface between the nanopore surface and the solution within it. The large surface-to-volume ratio due to the nanoscale geometry of a nanopore, as well as similarity in scale between geometry and interaction demands the solution interact with the nanopore walls. As surfaces in solution almost always carry residual charge, these surface forces are primarily the electrostatic interactions between the charge groups on the pore surface and the ions in solution. These interactions may be used by the experimentalist to control ionic transport through synthetic nanopores, and use them as a template for the construction of devices. In this research, we present our work on creating a number of ionic analogs to seminal electronic devices, specifically diodes, and transistors, by controlling ionic transport through the electrostatic interactions between a single synthetic nanopore and ions. Control is achieved by "doping" the effective charge carrier concentration in specific regions of the nanopore through manipulation of the pore's surface charge. This manipulation occurs through two mechanisms: chemical modification of the surface charge and electrostatic manipulation of the local internal nanopore potential using a gate electrode. Additionally, the innate selectivity of the charged nanopores walls allows for the separation of charges in solution. This well-known effect, which spawns measureable quantities, the streaming potential and current, has been used to create nanoscale water desalination membranes. We attempt to create a device using membranes with large nanopore densities for the desalination of water

  7. MobileCoDaC – A transportable control, data acquisition and communication infrastructure for Wendelstein 7-X

    International Nuclear Information System (INIS)

    Hennig, Christine; Bluhm, Torsten; Kühner, Georg; Laqua, Heike; Lewerentz, Marc; Müller, Ina; Pingel, Steffen; Riemann, Heike; Schacht, Jörg; Spring, Anett; Werner, Andreas; Wölk, Andreas

    2014-01-01

    Highlights: • MobileCoDaC is a transportable CoDaC infrastructure for Wendelstein 7-X. • It allows in situ testing and commissioning of components to be used at W7-X by providing W7-X CoDaC infrastructure. • It has been used successfully for test and commissioning of the HEXOS diagnostic at Forschungszentrum Jülich. - Abstract: MobileCoDaC is a test bed allowing in situ testing and commissioning the control and data acquisition of components to be operated at Wendelstein 7-X. It is a minimized replica of the functionality of the complete W7-X CoDaC infrastructure and can be operated independently. MobileCoDaC contains a set of W7-X CoDaC servers, network infrastructure, and accessories for remote access. All hardware is mounted in a single transportable rack system. Moreover, it provides the software infrastructure and user applications for experiment preparation, experiment operation, trouble shooting and experiment data access. MobileCoDaC has been operated successfully for test and commissioning of the control and data acquisition of the HEXOS (high efficiency extreme ultraviolet overview spectrometer) diagnostic at Forschungszentrum Jülich

  8. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  9. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  10. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  11. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  12. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  13. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  14. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  15. Operating control techniques for maglev transport systems

    Energy Technology Data Exchange (ETDEWEB)

    Kraft, K H; Schnieder, E

    1984-06-01

    The technical and operational possibilities of magnetic levitation transport systems can only be fully exploited by introducing 'intelligent' control systems which ensure automatic and trouble-free train running. The solution of exacting requirements in the fields of traction dynamics, security and control as well as information gathering transmission and processing is an important prior condition in that respect. The authors report here on the present state of research and development in operating control techniques applicable to maglev transport systems.

  16. Prehospital intraosseus access with the bone injection gun by a helicopter-transported emergency medical team.

    NARCIS (Netherlands)

    Gerritse, B.M.; Scheffer, G.J.; Draaisma, J.M.T.

    2009-01-01

    BACKGROUND: To evaluate the use of the bone injection gun to obtain vascular access in the prehospital setting by an Helicopter-Transported Emergency Medical Team. METHODS: Prospective descriptive study to assess the frequency and success rate of the use of the bone injection gun in prehospital care

  17. Safety accessibility and sustainability: The importance of micro-scale outcomes to an equitable design of transport systems

    Directory of Open Access Journals (Sweden)

    N. Tyler

    2017-07-01

    Full Text Available This paper discusses the potential conflicts that can arise when trying to design a transport system to be sustainable, safe and accessible. The paper considers first the overarching vision that drives such an aim and how that determines choices for design and implementation of such schemes. Using the example of a shared space project, Exhibition Road in London, to illustrate how these issues come to arise and how research could help to resolve them, the paper then considers how science is able to support better design and implementation. This raises questions for scientific methods that could support better consideration of such issues, learning from the small-samples analysis of transport safety research to be amplified to include the detailed research that drives accessible design.

  18. Comparison of apical centring ability between incisal-shifted access and traditional lingual access for maxillary anterior teeth.

    Science.gov (United States)

    Yahata, Yoshio; Masuda, Yoshiko; Komabayashi, Takashi

    2017-12-01

    The aim of this study was to compare the apical centring ability of incisal-shifted access (ISA) with that of traditional lingual access (TLA). Fifteen three-dimensional printed resin models were prepared from the computed tomography data for a human maxillary central incisor and divided into ISA (n = 7), TLA (n = 7) and control (n = 1) groups. After access preparation, these models were shaped to the working length using K-files up to #40, followed by step-back procedures. An apical portion of the model was removed at 0.5 mm coronal to the working length. Microscopic images of each cutting surface were taken to measure the preparation area and the distance of transportation. TLA created a larger preparation area than ISA (P < 0.05). The distance of transportation (mean ± standard deviation) was 0.4 ± 0.1 mm for ISA and 0.7 ± 0.1 mm for TLA (P < 0.05). Access cavity preparation has a significant effect on apical centring ability. ISA is beneficial to maintaining apical configuration. © 2017 Australian Society of Endodontology Inc.

  19. Progress towards steady-state operation and real time control of internal transport barriers in JET

    International Nuclear Information System (INIS)

    Litaudon, X.

    2002-01-01

    In JET advanced tokamak research mainly focuses on plasmas with internal transport barriers (ITBs), generated by modifications of the current profile. The formerly developed optimised shear regime with low magnetic shear in the plasma center has been extended to deeply reversed magnetic shear configurations. ITBs occur at much lower access powers. The achievement of high fusion performance is reported in deeply reversed magnetic shear configuration. The generation of plasmas with wide ITBs in this configuration has allowed an extension of the accessible normalised toroidal beta at high magnetic field. We report on the successful sustainment and control of the electron and ion ITB in full current drive operation with a large fraction of bootstrap current. Progress towards the steady state capability of ITB plasmas includes techniques to avoid strong ELM activity and the newly developed real time control of the local ITB strength. Thanks to the real time control of the ITB characteristics the improved confinement state is maintained in a more reproducible and stable manner in quasi-stationary conditions. (author)

  20. Role-Based Access Control in Retrospect

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Wieringa, Roelf J.

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of

  1. Do vehicle grants and vehicle adaptations grants promote transport mobility and community access for children with disabilities in Sweden?

    Science.gov (United States)

    Sjödin, Linda; Buchanan, Angus; Mundt, Beate; Karlsson, Emelie; Falkmer, Torbjörn

    2012-02-01

    A vast majority of the journeys made by children with disabilities in Sweden are in the family car, which usually is bought and adapted for the child with governmental subsidies. Despite the important philosophical views about accessible vehicles, little is known about the impact of vehicle adaptations on families' lives. The aim of the study was to investigate parent views about the impact of vehicle grants and vehicle adaptation grants on their children's transport mobility and community access. In total, 434 parents of children with disabilities in Sweden who had received vehicle grants and/or vehicle adaptation grants between 1998-2007 responded to a questionnaire comprising questions with both pre-selected and open-ended answers. A non-responder analysis was performed. Children with disabilities were found to increase their transport mobility and community access in society as vehicle grants and/or vehicle adaptation grants were given to their parents. Their travel patterns and their travel priorities with their family car indicated that family friends and relatives and leisure activities were frequently visited and prioritised destinations. The grants were linked to access to social and family activities, provided environmental gains and led to increased experienced security. The results also showed that the potential to make spontaneous trips had increased substantially and that families experienced feelings of freedom and enhanced community access. The non-responder analysis confirmed these results. According to parents, vehicle grants and vehicle adaptation grants for children with disabilities have a positive impact on the children's transport mobility and community access. © 2011 The Authors. Australian Occupational Therapy Journal © 2011 Occupational Therapy Australia.

  2. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software...

  3. Requirements for Scalable Access Control and Security Management Architectures

    National Research Council Canada - National Science Library

    Keromytis, Angelos D; Smith, Jonathan M

    2005-01-01

    Maximizing local autonomy has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access control policies and mechanisms...

  4. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  5. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  6. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  7. Sociospatial distribution of access to facilities for moderate and vigorous intensity physical activity in Scotland by different modes of transport

    Directory of Open Access Journals (Sweden)

    Lamb Karen E

    2012-07-01

    Full Text Available Abstract Background People living in neighbourhoods of lower socioeconomic status have been shown to have higher rates of obesity and a lower likelihood of meeting physical activity recommendations than their more affluent counterparts. This study examines the sociospatial distribution of access to facilities for moderate or vigorous intensity physical activity in Scotland and whether such access differs by the mode of transport available and by Urban Rural Classification. Methods A database of all fixed physical activity facilities was obtained from the national agency for sport in Scotland. Facilities were categorised into light, moderate and vigorous intensity activity groupings before being mapped. Transport networks were created to assess the number of each type of facility accessible from the population weighted centroid of each small area in Scotland on foot, by bicycle, by car and by bus. Multilevel modelling was used to investigate the distribution of the number of accessible facilities by small area deprivation within urban, small town and rural areas separately, adjusting for population size and local authority. Results Prior to adjustment for Urban Rural Classification and local authority, the median number of accessible facilities for moderate or vigorous intensity activity increased with increasing deprivation from the most affluent or second most affluent quintile to the most deprived for all modes of transport. However, after adjustment, the modelling results suggest that those in more affluent areas have significantly higher access to moderate and vigorous intensity facilities by car than those living in more deprived areas. Conclusions The sociospatial distributions of access to facilities for both moderate intensity and vigorous intensity physical activity were similar. However, the results suggest that those living in the most affluent neighbourhoods have poorer access to facilities of either type that can be reached on foot

  8. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  9. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  10. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  11. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  12. Provision of servo-controlled cooling during neonatal transport.

    Science.gov (United States)

    Johnston, Ewen D; Becher, Julie-Clare; Mitchell, Anne P; Stenson, Benjamin J

    2012-09-01

    Therapeutic hypothermia is a time critical intervention for infants who have experienced a hypoxic-ischaemic event. Previously reported methods of cooling during transport do not demonstrate the same stability achieved in the neonatal unit. The authors developed a system which allowed provision of servo-controlled cooling throughout transport, and present their first year's experience. Retrospective review of routinely collected patient data. 14 out-born infants were referred for cooling during a 12-month period. Nine infants were managed with the servo-controlled system during transport. Cooling was commenced in all infants before 6 h of life. Median time from team arrival to the infant having a temperature in the target range (33-34°C) was 45 min. Median temperature during transfer was 33.5°C (range 33-34°C). Temperature on arrival at the cooling centre ranged from 33.4°C to 33.8°C. Servo-controlled cooling during transport is feasible and provides an optimal level of thermal control.

  13. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  14. Comparison of adult physical activity levels in three Swiss alpine communities with varying access to motorized transportation.

    Science.gov (United States)

    Dombois, Oliver Thommen; Braun-Fahrländer, Charlotte; Martin-Diener, Eva

    2007-09-01

    To compare physical activity levels of residents of three Swiss alpine communities with varying access to motorized transport and to investigate whether socio-demographic factors, the settlement structure or means of transport affect these levels. Between January and February 2004 a computer assisted telephone interview was conducted with 901 randomly selected adults aged 18 years or older living in three Swiss alpine communities. In particular, information on moderate and vigorous intensity physical activities and on transport behaviour was collected. Respondents were categorized as 'sufficiently active' or 'insufficiently active' according to self-reported physical activity. People living in community 1 without access to motorized traffic were significantly more likely to be sufficiently active (Sex- and age-adjusted prevalences of sufficient total physical activity, 43.9% 95% CI: 38.3%-49.8%) compared to individuals living in the other two communities (community 2: 35.9%, 95% CI: 30.6%-41.6%, community 3: 32.7%, 95% CI: 27.5%-38.3%). The differences were due to higher levels of moderate physical activities. Vigorous physical activity levels did not differ between the communities. Community differences were explained by passive means of transport to work and for leisure time activities. Although the environment encountered in the three alpine communities is generally conducive to physical activity the majority of the participants did not achieve recommended activity levels. Passive mode of transport to work and during leisure time was strongly associated with insufficient total physical activity. Walking and cycling for transportation is thus a promising approach to promote health enhancing physical activity.

  15. Optimizing data access in the LAMPF control system

    International Nuclear Information System (INIS)

    Schaller, S.C.; Corley, J.K.; Rose, P.A.

    1985-01-01

    The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation

  16. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    Science.gov (United States)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  17. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  18. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  19. A software architecture for a transportation control tower

    NARCIS (Netherlands)

    Baumgrass, A.; Dijkman, R.M.; Grefen, P.W.P.J.; Pourmirza, S.; Völzer, H.; Weske, M.H.

    2014-01-01

    A Transportation Control Tower is a software application that facilitates transportation planners with easily monitoring and dispatching transportation resources. This paper presents a software architecture for such an application. It focuses in particular on the novel aspects of the software

  20. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  1. An Access Control Model for the Uniframe Framework

    National Research Council Canada - National Science Library

    Crespi, Alexander M

    2005-01-01

    ... security characteristics from the properties of individual components would aid in the creation of more secure systems In this thesis, a framework for characterizing the access control properties...

  2. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  3. Towards convergence of wireless and wireline signal transport in broadband access networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Prince, Kamau; Tafur Monroy, Idelfonso

    2010-01-01

    Hybrid optical wireless access networks are to play an important role in the realization of the vision of delivery of broadband services to the end-user any time, anywhere and at affordable costs. We present results of experiments conducted over a field deployed optical fibre links we successfull...... demonstrated converged wireless and wireline signal transport over a common fibre infrastructure. The type of signal used in this field deployed experiments cover WiMax, Impulse-radio ultra-wideband (UWB) and coherent transmission of baseband QPSK and radio-over-fibre signals....

  4. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  5. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  6. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf...... to such settings. We overview the main technical issues to be addressed, and we describe the architecture for policy decision and enforcement points....

  7. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  8. Accessible triple-phase boundary length: A performance metric to account for transport pathways in heterogeneous electrochemical materials

    Science.gov (United States)

    Nakajo, A.; Cocco, A. P.; DeGostin, M. B.; Peracchio, A. A.; Cassenti, B. N.; Cantoni, M.; Van herle, J.; Chiu, W. K. S.

    2016-09-01

    The performance of materials for electrochemical energy conversion and storage depends upon the number of electrocatalytic sites available for reaction and their accessibility by the transport of reactants and products. For solid oxide fuel/electrolysis cell materials, standard 3-D measurements such as connected triple-phase boundary (TPB) length and effective transport properties partially inform on how local geometry and network topology causes variability in TPB accessibility. A new measurement, the accessible TPB, is proposed to quantify these effects in detail and characterize material performance. The approach probes the reticulated pathways to each TPB using an analytical electrochemical fin model applied to a 3-D discrete representation of the heterogeneous structure provided by skeleton-based partitioning. The method is tested on artificial and real structures imaged by 3-D x-ray and electron microscopy. The accessible TPB is not uniform and the pattern varies depending upon the structure. Connected TPBs can be even passivated. The sensitivity to manipulations of the local 3-D geometry and topology that standard measurements cannot capture is demonstrated. The clear presence of preferential pathways showcases a non-uniform utilization of the 3-D structure that potentially affects the performance and the resilience to alterations due to degradation phenomena. The concepts presented also apply to electrochemical energy storage and conversion devices such as other types of fuel cells, electrolyzers, batteries and capacitors.

  9. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  10. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    Directory of Open Access Journals (Sweden)

    Usama Salama

    2018-05-01

    Full Text Available The presence of the Internet of Things (IoT in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL, which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major challenges in providing safety and security when accessing sensitive health data. This paper presents an access control framework for AAL which considers multi-level access and privacy preservation. We focus on two major points: (1 how to use the data collected from ambient sensors and biometric sensors to perform the high-level task of activity recognition; and (2 how to secure the collected private healthcare data via effective access control. We achieve multi-level access control by extending Public Key Infrastructure (PKI for secure authentication and utilizing Attribute-Based Access Control (ABAC for authorization. The proposed access control system regulates access to healthcare data by defining policy attributes over healthcare professional groups and data classes classifications. We provide guidelines to classify the data classes and healthcare professional groups and describe security policies to control access to the data classes.

  11. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  12. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  13. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  14. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  15. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  16. Nutrient demand and fungal access to resources control the carbon allocation to the symbiotic partners in tripartite interactions of Medicago truncatula.

    Science.gov (United States)

    Kafle, Arjun; Garcia, Kevin; Wang, Xiurong; Pfeffer, Philip E; Strahan, Gary D; Bücking, Heike

    2018-06-02

    Legumes form tripartite interactions with arbuscular mycorrhizal (AM) fungi and rhizobia, and both root symbionts exchange nutrients against carbon from their host. The carbon costs of these interactions are substantial, but our current understanding of how the host controls its carbon allocation to individual root symbionts is limited. We examined nutrient uptake and carbon allocation in tripartite interactions of Medicago truncatula under different nutrient supply conditions, and when the fungal partner had access to nitrogen, and followed the gene expression of several plant transporters of the SUT and SWEET family. Tripartite interactions led to synergistic growth responses and stimulated the phosphate and nitrogen uptake of the plant. Plant nutrient demand but also fungal access to nutrients played an important role for the carbon transport to different root symbionts, and the plant allocated more carbon to rhizobia under nitrogen demand, but more carbon to the fungal partner when nitrogen was available. These changes in carbon allocation were consistent with changes in the SUT and SWEET expression. Our study provides important insights into how the host plant controls its carbon allocation under different nutrient supply conditions and changes its carbon allocation to different root symbionts to maximize its symbiotic benefits. This article is protected by copyright. All rights reserved.

  17. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future beh...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  18. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  19. Internal transport control in pot plant production

    NARCIS (Netherlands)

    Annevelink, E.

    1999-01-01

    Drawing up internal transport schedules in pot plant production is a very complex task. Scheduling internal transport at the operational level and providing control on a day-to-day or even hour-to-hour basis in particular requires a new approach. A hierarchical planning approach based on

  20. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  1. Sprawl and Accessibility

    Directory of Open Access Journals (Sweden)

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  2. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mesay Hailu Dangisso

    2015-11-01

    Full Text Available Background: Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs and treatment outcome in the Sidama Zone, southern Ethiopia. Design: We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results: Over a decade the health service coverage (the health facility–to-population ratio increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km between kebeles (the smallest administrative units and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km. In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001 and altitude (b-estimate=−0.31, p<0.001 increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001 and altitude (b-estimate=−0.30, p<0.001 were inversely associated with treatment success (proportion of treatment completed or cured cases

  3. 49 CFR 633.15 - Access to information.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Access to information. 633.15 Section 633.15 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION PROJECT MANAGEMENT OVERSIGHT Project Management Oversight Services § 633.15 Access to information. A recipient of FTA...

  4. Competing Transport Networks

    NARCIS (Netherlands)

    M.J. van der Leij (Marco)

    2003-01-01

    textabstractIn a circular city model, I consider network design and pricing decisions for a single fast transport connection that faces competition from a slower but better accessible transport mode. To access the fast transport network individuals have to make complementary trips by slow mode. This

  5. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  6. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  7. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  8. Manual Throttles-Only Control Effectivity for Emergency Flight Control of Transport Aircraft

    Science.gov (United States)

    Stevens, Richard; Burcham, Frank W., Jr.

    2009-01-01

    If normal aircraft flight controls are lost, emergency flight control may be attempted using only the thrust of engines. Collective thrust is used to control flightpath, and differential thrust is used to control bank angle. One issue is whether a total loss of hydraulics (TLOH) leaves an airplane in a recoverable condition. Recoverability is a function of airspeed, altitude, flight phase, and configuration. If the airplane can be recovered, flight test and simulation results on several transport-class airplanes have shown that throttles-only control (TOC) is usually adequate to maintain up-and-away flight, but executing a safe landing is very difficult. There are favorable aircraft configurations, and also techniques that will improve recoverability and control and increase the chances of a survivable landing. The DHS and NASA have recently conducted a flight and simulator study to determine the effectivity of manual throttles-only control as a way to recover and safely land a range of transport airplanes. This paper discusses TLOH recoverability as a function of conditions, and TOC landability results for a range of transport airplanes, and some key techniques for flying with throttles and making a survivable landing. Airplanes evaluated include the B-747, B-767, B-777, B-757, A320, and B-737 airplanes.

  9. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  10. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  11. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  12. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  13. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  14. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  15. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  16. Hybrid Predictive Control for Dynamic Transport Problems

    CERN Document Server

    Núñez, Alfredo A; Cortés, Cristián E

    2013-01-01

    Hybrid Predictive Control for Dynamic Transport Problems develops methods for the design of predictive control strategies for nonlinear-dynamic hybrid discrete-/continuous-variable systems. The methodology is designed for real-time applications, particularly the study of dynamic transport systems. Operational and service policies are considered, as well as cost reduction. The control structure is based on a sound definition of the key variables and their evolution. A flexible objective function able to capture the predictive behaviour of the system variables is described. Coupled with efficient algorithms, mainly drawn from the area of computational intelligence, this is shown to optimize performance indices for real-time applications. The framework of the proposed predictive control methodology is generic and, being able to solve nonlinear mixed-integer optimization problems dynamically, is readily extendable to other industrial processes. The main topics of this book are: ●hybrid predictive control (HPC) ...

  17. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  18. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  19. Control of sodium vapor transport in annuli

    International Nuclear Information System (INIS)

    Meadows, G.E.; Bohringer, A.P.

    1983-11-01

    The method used to control sodium vapor transport in the annuli of various components at the Fast Flux Test Facility (FFTF) is a downward purge of the annuli with high purity argon. The purge rates for the FFTF were selected by calculating the gas velocity required to overcome thermal convection transport in the annuli. To evaluate the effectiveness of the gas purge, laboratory apparatus was fabricated which simulated selected annuli in the FFTF In-Vessel Handling Machine (IVHM) and the Instrument Tree (IT) annuli. Tests were conducted at temperatures similar to FFTF conditions. Gas purge rates ranged from zero to 130% of FFTF flow rates. Test results show the effectiveness of a high purity gas purge in decreasing the accumulation of sodium vapor deposits in an annulus. The presence of water vapor and oxygen in the purge gas increased the sodium deposition rate by a factor of three over other tests usig high purity argon. The presence of a vapor control collar used in the IT annulus was shown to be beneficial for controlling vapor transport into the upper region of the annulus

  20. Intelligent Transportation Control based on Proactive Complex Event Processing

    Directory of Open Access Journals (Sweden)

    Wang Yongheng

    2016-01-01

    Full Text Available Complex Event Processing (CEP has become the key part of Internet of Things (IoT. Proactive CEP can predict future system states and execute some actions to avoid unwanted states which brings new hope to intelligent transportation control. In this paper, we propose a proactive CEP architecture and method for intelligent transportation control. Based on basic CEP technology and predictive analytic technology, a networked distributed Markov decision processes model with predicting states is proposed as sequential decision model. A Q-learning method is proposed for this model. The experimental evaluations show that this method works well when used to control congestion in in intelligent transportation systems.

  1. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  2. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  3. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  4. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  5. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  6. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  7. Simple measurement-based admission control for DiffServ access networks

    Science.gov (United States)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  8. Information Security and Wireless: Alternate Approaches for Controlling Access to Critical Information

    National Research Council Canada - National Science Library

    Nandram, Winsome

    2004-01-01

    .... Typically, network managers implement countermeasures to augment security. The goal of this thesis is to research approaches that compliment existing security measures with fine grain access control measures. The Extensible Markup Language (XML) is adopted to accommodate such granular access control as it provides the mechanisms for scaling security down to the document content level.

  9. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  10. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  11. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  12. Design and Implementation of Linux Access Control Model

    Institute of Scientific and Technical Information of China (English)

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  13. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  14. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  15. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  16. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  17. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  18. A Novel Intelligent Transportation Control Supported by Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Zhe Qian

    2013-05-01

    Full Text Available With the development of wireless sensor unit, and improvement of real-time and quality of wireless communication, the intelligent transportation control system employ these technologies to realize sensing, positioning, computing, and communication for voiding collisions. This paper discusses the framework of transportation control system, and emphases TDOA positioning algorithm and the new weighted least square optimization method. The simulation result shows that, our method achieves high-accuracy of positioning, which can satisfy the need of transportation control. Finally, we outline the urgent work need to address in the future.

  19. Over-expressed maltose transporters in laboratory and lager yeasts: localization and competition with endogenous transporters.

    Science.gov (United States)

    Vidgren, Virve; Londesborough, John

    2018-05-31

    Plain and fluorescently tagged versions of Agt1, Mtt1 and Malx1 maltose transporters were over-expressed in two laboratory yeasts and one lager yeast. The plain and tagged versions of each transporter supported similar transport activities, indicating that they are similarly trafficked and have similar catalytic activities. When they were expressed under the control of the strong constitutive PGK1 promoter only minor proportions of the fluorescent transporters were associated with the plasma membrane, the rest being found in intracellular structures. Transport activity of each tagged transporter in each host was roughly proportional to the plasma membrane-associated fluorescence. All three transporters were subject to glucose-triggered inactivation when the medium glucose concentration was abruptly raised. Results also suggest competition between endogenous and over-expressed transporters for access to the plasma membrane. This article is protected by copyright. All rights reserved.

  20. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  1. Direct product quality control for energy efficient climate controlled transport of agro-material

    NARCIS (Netherlands)

    Verdijck, G.J.C.; Preisig, H.A.; Straten, van G.

    2005-01-01

    A (model-based) Product Quality Controller is presented for climate controlled operations involving agro-material, such as storage and transport. This controller belongs to the class of Model Predictive Controllers and fits in a previously developed hierarchical control structure. The new Product

  2. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  3. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2013-01-01

    Full Text Available The emergence of intelligent transport systems has brought out a new set of requirements on wireless communication. To cope with these requirements, several proposals are currently under discussion. In this highly mobile environment, the design of a prompt, efficient, flexible, and reliable medium access control, able to cover the specific constraints of the named real-time communications applications, is still unsolved. This paper presents the original proposal integrating Non-Cooperative Cognitive Time Division Multiple Access (NCC-TDMA based on Cognitive Radio (CR techniques to obtain a mechanism which complies with the requirements of real-time communications. Though the proposed MAC uses a slotted channel, it can be adapted to operate on the physical layer of different standards. The authors’ analysis considers the IEEE WAVE and 802.11p as the standards of reference. The mechanism also offers other advantages, such as avoiding signalling and the adaptation capacity to channel conditions and interferences. The solution is applied to the problem of units merging a convoy. Comparison results between NCC-TDMA and Slotted-Aloha are included.

  4. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    Warren, F.E.

    1992-07-01

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  5. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  6. The OPL Access Control Policy Language

    Science.gov (United States)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  7. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  8. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  9. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  10. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  11. RESEARCH Improving access and quality of care in a TB control ...

    African Journals Online (AJOL)

    or treatment. Improving access and quality of care in a. TB control programme. Vera Scott, Virginia Azevedo, Judy Caldwell. Objectives. To use a quality improvement approach to improve access to and quality of tuberculosis (TB) diagnosis and care in. Cape Town. Methods. Five HIV/AIDS/sexually transmitted infections/TB.

  12. Neutron transport by TRIPOLI-2 code in the lower part of a PWR pit and in the pit-access cell

    International Nuclear Information System (INIS)

    Vergnaud, T.; Bourdet, L.; Gonnord, J.; Nimal, J.C.; Champion, G.

    1984-09-01

    The neutrons, which exit the reactor vessel, leak between the reactor vessel and the primary concrete shield and provide high dose rate in the lower part of the reactor pit. In this part of the reactor the biological shield is reduced at the level of the pit-access cell door and of the ventilation duct. Consequently there is a pin-point increase of dose rate at reactor place where access must be free during power operation. Studies concern 900 MWe and 1300 MWe plants; calculation results are compared with dose rate measurements which have been done at several interesting points of reactor. Neutron transport is studied in two steps: - first Monte Carlo calculation carried out by the TRIPOLI-2 system gives the current of neutrons entering into the pit-access cell; - a second calculation is about neutron transport in this cell; it is also performed with the TRIPOLI-2 code which uses a very realistic model for cell geometry. Then the door efficiency is evaluated by a SN one dimension code

  13. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  14. Adaptive fuzzy-neural-network control for maglev transportation system.

    Science.gov (United States)

    Wai, Rong-Jong; Lee, Jeng-Dao

    2008-01-01

    A magnetic-levitation (maglev) transportation system including levitation and propulsion control is a subject of considerable scientific interest because of highly nonlinear and unstable behaviors. In this paper, the dynamic model of a maglev transportation system including levitated electromagnets and a propulsive linear induction motor (LIM) based on the concepts of mechanical geometry and motion dynamics is developed first. Then, a model-based sliding-mode control (SMC) strategy is introduced. In order to alleviate chattering phenomena caused by the inappropriate selection of uncertainty bound, a simple bound estimation algorithm is embedded in the SMC strategy to form an adaptive sliding-mode control (ASMC) scheme. However, this estimation algorithm is always a positive value so that tracking errors introduced by any uncertainty will cause the estimated bound increase even to infinity with time. Therefore, it further designs an adaptive fuzzy-neural-network control (AFNNC) scheme by imitating the SMC strategy for the maglev transportation system. In the model-free AFNNC, online learning algorithms are designed to cope with the problem of chattering phenomena caused by the sign action in SMC design, and to ensure the stability of the controlled system without the requirement of auxiliary compensated controllers despite the existence of uncertainties. The outputs of the AFNNC scheme can be directly supplied to the electromagnets and LIM without complicated control transformations for relaxing strict constrains in conventional model-based control methodologies. The effectiveness of the proposed control schemes for the maglev transportation system is verified by numerical simulations, and the superiority of the AFNNC scheme is indicated in comparison with the SMC and ASMC strategies.

  15. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    delays and also by the choice of the time instances at which sensor information is accessed. In order to optimize the latter, we introduce an information quality metric and a mathematical model based on Markov chains, which are compared performance-wise to a heuristic approach for finding this parameter......In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  16. The role of transportation control measures in California's air pollution control strategy

    International Nuclear Information System (INIS)

    Guensler, R.; Burmich, P.; Geraghty, A.

    1992-01-01

    In California, significant progress has been made to control emissions from industrial sources as well as from motor vehicles. Nonetheless, policy analysts still debate over whether it makes sense to control motor vehicle emissions through legislated reductions in vehicle use, especially when new vehicle emission standards are becoming even more stringent in California. In this paper, the emission reduction benefits of California's new low-emission vehicles and clean fuels program are reviewed. The air quality management plans of three major metropolitan areas in California are examined, to identify emission reductions needed to meet federal and state air quality standards. For each of these three areas, emission reductions expected from transportation control measure implementation are presented. Then, the extent to which the reductions are open-quotes significantclose quotes and relied upon in each of the local attainment efforts is analyzed. The emission reductions expected from the stringent exhaust emission standards of California's new low-emission vehicles and clean fuels program will not be sufficient to meet mandated clean air standards in the study areas. Based upon our review, transportation control measures appear to be necessary components of the air quality management plans in California's major metropolitan areas. The paper concludes that cost-effective transportation control measures (TCMs) will be needed as a complementary strategy to California's stringent tail-pipe standards in moderate to extreme nonattainment areas

  17. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  18. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  19. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  20. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  1. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  2. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  3. Poverty, Transportation Access, and Medication Nonadherence.

    Science.gov (United States)

    Hensley, Caroline; Heaton, Pamela C; Kahn, Robert S; Luder, Heidi R; Frede, Stacey M; Beck, Andrew F

    2018-04-01

    Variability in primary medication nonadherence (PMN), or failure to fill a new prescription, influences disparities and widens equity gaps. This study sought to evaluate PMN across 1 metropolitan area and assess relationships with underlying zip code-level measures. This was a retrospective observational study using data extracted from 1 regional community pharmacy market-share leader (October 2016-April 2017). Data included patient age, sex, payer, medication type, and home zip code. This zip code was connected to US census measures enumerating poverty and vehicle access, which were treated as continuous variables and within quintiles. The prescription-level outcome was whether prescriptions were not filled within 30 days of reaching the pharmacy. The ecological-level outcome was PMN calculated for each zip code (numerator, unfilled prescriptions; denominator, received prescriptions). There were 213 719 prescriptions received by 54 included pharmacies; 12.2% were unfilled. Older children, boys, and those with public insurance were more likely to have prescriptions not filled. Prescriptions originating from the highest poverty quintile were significantly more likely to not be filled than those from the lowest poverty quintile (adjusted odds ratio 1.60; 95% confidence interval 1.52-1.69); a similar pattern was noted for vehicle access (adjusted odds ratio 1.77; 95% confidence interval 1.68-1.87). At the ecological level, there were significant, graded relationships between PMN rates and poverty and vehicle access (both P < .0001); these gradients extended across all medication classes. Poverty and vehicle access are related to significant differences in prescription- and ecological-level PMN across 1 metropolitan area. Pharmacists and pharmacies can be key partners in population health efforts. Copyright © 2018 by the American Academy of Pediatrics.

  4. TRANSNET -- access to radioactive and hazardous materials transportation codes and databases

    International Nuclear Information System (INIS)

    Cashwell, J.W.

    1992-01-01

    TRANSNET has been developed and maintained by Sandia National Laboratories under the sponsorship of the United States Department of Energy (DOE) Office of Environmental Restoration and Waste Management to permit outside access to computerized routing, risk and systems analysis models, and associated databases. The goal of the TRANSNET system is to enable transfer of transportation analytical methods and data to qualified users by permitting direct, timely access to the up-to-date versions of the codes and data. The TRANSNET facility comprises a dedicated computer with telephone ports on which these codes and databases are adapted, modified, and maintained. To permit the widest spectrum of outside users, TRANSNET is designed to minimize hardware and documentation requirements. The user is thus required to have an IBM-compatible personal computer, Hayes-compatible modem with communications software, and a telephone. Maintenance and operation of the TRANSNET facility are underwritten by the program sponsor(s) as are updates to the respective models and data, thus the only charges to the user of the system are telephone hookup charges. TRANSNET provides access to the most recent versions of the models and data developed by or for Sandia National Laboratories. Code modifications that have been made since the last published documentation are noted to the user on the introductory screens. User friendly interfaces have been developed for each of the codes and databases on TRANSNET. In addition, users are provided with default input data sets for typical problems which can either be used directly or edited. Direct transfers of analytical or data files between codes are provided to permit the user to perform complex analyses with a minimum of input. Recent developments to the TRANSNET system include use of the system to directly pass data files between both national and international users as well as development and integration of graphical depiction techniques

  5. Roundabouts and access management.

    Science.gov (United States)

    2014-03-01

    Transportation engineers and planners are becoming more interested in using roundabouts to address access : management and safety concerns in the transportation system. While roundabouts are being used increasingly in a : variety of contexts, existin...

  6. 48 CFR 247.370 - DD Form 1384, Transportation Control and Movement Document.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false DD Form 1384, Transportation Control and Movement Document. 247.370 Section 247.370 Federal Acquisition Regulations System... Transportation in Supply Contracts 247.370 DD Form 1384, Transportation Control and Movement Document. The...

  7. Intelligent Transportation Control based on Proactive Complex Event Processing

    OpenAIRE

    Wang Yongheng; Geng Shaofeng; Li Qian

    2016-01-01

    Complex Event Processing (CEP) has become the key part of Internet of Things (IoT). Proactive CEP can predict future system states and execute some actions to avoid unwanted states which brings new hope to intelligent transportation control. In this paper, we propose a proactive CEP architecture and method for intelligent transportation control. Based on basic CEP technology and predictive analytic technology, a networked distributed Markov decision processes model with predicting states is p...

  8. The regulation of glucose transport in the heart of control and diabetic rats: With special emphasis on the glucose transporter

    International Nuclear Information System (INIS)

    Pleta, M. de Leoz.

    1989-01-01

    Glucose transport regulation with insulin and high perfusion pressure in the perfused rat hearts from control and diabetic rat hearts was investigated. [ 3 H]-cytochalasin B binding assay was used to study the distribution of glucose transporters within the subcellular membranes fractionated by linear sucrose density gradient centrifugation. In the present study, insulin increased glucose uptake in the perfused heart of control and diabetic animals. This coincided with an increase of glucose transporters on the plasma membrane. The increase in glucose transporters on the plasma membrane could not be accounted for by a decrease of glucose transporters from the microsomal membranes. High perfusion pressure did not change the number of glucose transporters on the plasma membrane compared to basal in the control and diabetic animals, though it increased glucose uptake above that observed for insulin in the control. Instead, high perfusion pressure altered the distribution of glucose transporters within the subcellular membranes in reverse to that with insulin, increasing an intermediate membrane pool believed to reside between the plasma membrane and microsomal membranes as well as the intracellular membrane pool

  9. Decentralized control of multi-agent aerial transportation system

    KAUST Repository

    Toumi, Noureddine

    2017-04-01

    Autonomous aerial transportation has multiple potential applications including emergency cases and rescue missions where ground intervention may be difficult. In this context, the following work will address the control of multi-agent Vertical Take-off and Landing aircraft (VTOL) transportation system. We develop a decentralized method. The advantage of such a solution is that it can provide better maneuverability and lifting capabilities compared to existing systems. First, we consider a cooperative group of VTOLs transporting one payload. The main idea is that each agent perceive the interaction with other agents as a disturbance while assuming a negotiated motion model and imposing certain magnitude bounds on each agent. The theoretical model will be then validated using a numerical simulation illustrating the interesting features of the presented control method. Results show that under specified disturbances, the algorithm is able to guarantee the tracking with a minimal error. We describe a toolbox that has been developed for this purpose. Then, a system of multiple VTOLs lifting payloads will be studied. The algorithm assures that the VTOLs are coordinated with minimal communication. Additionally, a novel gripper design for ferrous objects is presented that enables the transportation of ferrous objects without a cable. Finally, we discuss potential connections to human in the loop transportation systems.

  10. Establishing a Secure Data Center with Remote Access: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Gonder, J.; Burton, E.; Murakami, E.

    2012-04-01

    Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

  11. Trap-controlled charge transport in corona-charged Teflon

    International Nuclear Information System (INIS)

    Gross, B.; Giacometti, J.A.; Ferreira, G.F.L.; Moreno A, R.A.

    1980-01-01

    The stability of negatively charged Teflon electrets is discussed. It is stated that it can only be explained by the assumption that the transport of excess charge is trap - controlled rather than mobility - controlled. (I.C.R.) [pt

  12. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  13. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  14. Safeguarding Schiphol Airports accessibility for freight transport

    NARCIS (Netherlands)

    van der Heijden, Matthijs C.; van Harten, Aart; Ebben, Mark; Saanen, Y.A.; Valentin, E.C.; Verbraeck, A.

    2001-01-01

    Automated, underground freight transport should enable sustainable economic growth in the Amsterdam area in the Netherlands. An innovative transport system, which guarantees reliable logistics and which avoids congestion problems, is currently being developed. This logistics system will be highly

  15. Optimal traffic control in highway transportation networks using linear programming

    KAUST Repository

    Li, Yanning

    2014-06-01

    This article presents a framework for the optimal control of boundary flows on transportation networks. The state of the system is modeled by a first order scalar conservation law (Lighthill-Whitham-Richards PDE). Based on an equivalent formulation of the Hamilton-Jacobi PDE, the problem of controlling the state of the system on a network link in a finite horizon can be posed as a Linear Program. Assuming all intersections in the network are controllable, we show that the optimization approach can be extended to an arbitrary transportation network, preserving linear constraints. Unlike previously investigated transportation network control schemes, this framework leverages the intrinsic properties of the Halmilton-Jacobi equation, and does not require any discretization or boolean variables on the link. Hence this framework is very computational efficient and provides the globally optimal solution. The feasibility of this framework is illustrated by an on-ramp metering control example.

  16. Information access for event-driven smart grid controllers

    DEFF Research Database (Denmark)

    Kristensen, Thomas Le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2018-01-01

    grids, which targets a reduction of over- and under voltage level situations by adjusting reactive power production of selected low voltage grid assets. The paper models different information access schemes between remote assets and controller, which is activated only when certain voltage thresholds...... stochastic models. We investigate in this paper the suitability for using these two metrics for optimization in a voltage grid control scenario. We conclude that, while the mismatch probability is very useful compared to the simpler information age metric from a network designers and operators point of view...

  17. Usage Control Enhanced Access Control Based on XACML%使用控制支持的基于XACML的访问控制

    Institute of Scientific and Technical Information of China (English)

    陶宇炜; 符彦惟

    2011-01-01

    针对网格环境下资源访问控制的特点,提出了一个基于使用控制模型UCON,结合XACML和SAML的访问控制模型.用可扩展访问标记语占XACML描述访问控制的授权策略,结合SAML声明和请求/响应机制,根据用户、资源、环境的属性进行访问控制决策,可动态地评估访问请求,提供细粒度的访问控制和良好的互操作性.%Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML. The paper describes authorization policy about access control by XACML, combines SAML statement and request/response mechanism, executes access control decision based on user, resource and environment attributes, evaluates access request dynamically, and provides fine-grained access control and good interoperability.

  18. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  19. Predictability of solute transport in diffusion-controlled hydrogeologic regimes

    International Nuclear Information System (INIS)

    Gillham, R.W.; Cherry, J.A.

    1983-01-01

    Hydrogeologic regimes that are favourable for the subsurface management of low-level radioactive wastes must have transport properties that will limit the migration velocity of contaminants to some acceptably low value. Of equal importance, for the purpose of impact assessment and licensing, is the need to be able to predict, with a reasonable degree of certainty and over long time periods, what the migration velocity of the various contaminants of interest will be. This paper presents arguments to show that in addition to having favourable velocity characteristics, transport in saturated, diffusion-controlled hydrogeologic regimes is considerably more predictable than in the most common alternatives. The classical transport models for unsaturated, saturated-advection-controlled and saturated-diffusion-controlled environments are compared, with particular consideration being given to the difficulties associated with the characterization of the respective transport parameters. Results are presented which show that the diffusion of non-reactive solutes and solutes that react according to a constant partitioning ratio (K/sub d/) are highly predictable under laboratory conditions and that the diffusion coefficients for the reactive solutes can be determined with a reasonable degree of accuracy from independent measurements of bulk density, porosity, distribution coefficient and tortuosity. Field evidence is presented which shows that the distribution of environmental isotopes and chloride in thick clayey deposits is consistent with a diffusion-type transport process in these media. These results are particularly important in that they not only demonstrate the occurrence of diffusion-controlled hydrogeologic regimes, but they also demonstrate the predictability of the migration characteristics over very long time periods

  20. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  1. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova

    2015-01-01

    farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance......It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...

  2. Controlling chaos-assisted directed transport via quantum resonance.

    Science.gov (United States)

    Tan, Jintao; Zou, Mingliang; Luo, Yunrong; Hai, Wenhua

    2016-06-01

    We report on the first demonstration of chaos-assisted directed transport of a quantum particle held in an amplitude-modulated and tilted optical lattice, through a resonance-induced double-mean displacement relating to the true classically chaotic orbits. The transport velocity is controlled by the driving amplitude and the sign of tilt, and also depends on the phase of the initial state. The chaos-assisted transport feature can be verified experimentally by using a source of single atoms to detect the double-mean displacement one by one, and can be extended to different scientific fields.

  3. Controlling chaos-assisted directed transport via quantum resonance

    Energy Technology Data Exchange (ETDEWEB)

    Tan, Jintao; Zou, Mingliang; Luo, Yunrong; Hai, Wenhua, E-mail: whhai2005@aliyun.com [Department of Physics and Key Laboratory of Low-dimensional Quantum Structures and Quantum Control of Ministry of Education, Hunan Normal University, Changsha 410081, China and Synergetic Innovation Center for Quantum Effects and Applications, Hunan Normal University, Changsha 410081 (China)

    2016-06-15

    We report on the first demonstration of chaos-assisted directed transport of a quantum particle held in an amplitude-modulated and tilted optical lattice, through a resonance-induced double-mean displacement relating to the true classically chaotic orbits. The transport velocity is controlled by the driving amplitude and the sign of tilt, and also depends on the phase of the initial state. The chaos-assisted transport feature can be verified experimentally by using a source of single atoms to detect the double-mean displacement one by one, and can be extended to different scientific fields.

  4. Beam control and matching for the transport of intense beams

    International Nuclear Information System (INIS)

    Li, H.; Bernal, S.; Godlove, T.; Huo, Y.; Kishek, R.A.; Haber, I.; Quinn, B.; Walter, M.; Zou, Y.; Reiser, M.; O'Shea, P.G.

    2005-01-01

    The transport of intense beams for heavy-ion inertial fusion demands tight control of beam characteristics from the source to the target. The University of Maryland Electron Ring (UMER), which uses a low-energy (10 keV), high-current electron beam to model the transport physics of a future recirculator driver, employs real-time beam characterization and control in order to optimize beam quality throughout the strong focusing lattice. We describe the main components and operation of the diagnostics/control system in UMER. It employs phosphor screens, real-time image analysis, quadrupole scans and electronic skew correctors. The procedure is not only indispensable for optimum transport over a long distance, but also provides important insights into the beam physics involved. We discuss control/optimization issues related to beam steering, quadrupole rotation errors and rms envelope matching

  5. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been

  6. From conservative to reactive transport under diffusion-controlled conditions

    Science.gov (United States)

    Babey, Tristan; de Dreuzy, Jean-Raynald; Ginn, Timothy R.

    2016-05-01

    We assess the possibility to use conservative transport information, such as that contained in transit time distributions, breakthrough curves and tracer tests, to predict nonlinear fluid-rock interactions in fracture/matrix or mobile/immobile conditions. Reference simulated data are given by conservative and reactive transport simulations in several diffusive porosity structures differing by their topological organization. Reactions includes nonlinear kinetically controlled dissolution and desorption. Effective Multi-Rate Mass Transfer models (MRMT) are calibrated solely on conservative transport information without pore topology information and provide concentration distributions on which effective reaction rates are estimated. Reference simulated reaction rates and effective reaction rates evaluated by MRMT are compared, as well as characteristic desorption and dissolution times. Although not exactly equal, these indicators remain very close whatever the porous structure, differing at most by 0.6% and 10% for desorption and dissolution. At early times, this close agreement arises from the fine characterization of the diffusive porosity close to the mobile zone that controls fast mobile-diffusive exchanges. At intermediate to late times, concentration gradients are strongly reduced by diffusion, and reactivity can be captured by a very limited number of rates. We conclude that effective models calibrated solely on conservative transport information like MRMT can accurately estimate monocomponent kinetically controlled nonlinear fluid-rock interactions. Their relevance might extend to more advanced biogeochemical reactions because of the good characterization of conservative concentration distributions, even by parsimonious models (e.g., MRMT with 3-5 rates). We propose a methodology to estimate reactive transport from conservative transport in mobile-immobile conditions.

  7. Hanford Site Wide Transportation Safety Document [SEC 1 Thru 3

    Energy Technology Data Exchange (ETDEWEB)

    MCCALL, D L

    2002-06-01

    This safety evaluation report (SER) documents the basis for the US Department of Energy (DOE), Richland Operations Office (RL) to approve the Hanford Sitewide Transportation Safety Document (TSD) for onsite Transportation and Packaging (T&P) at Hanford. Hanford contractors, on behalf of DOE-RL, prepared and submitted the Hanford Sitewide Transportation Safety Document, DOE/RL-2001-0036, Revision 0, (DOE/RL 2001), dated October 4, 2001, which is referred to throughout this report as the TSD. In the context of the TSD, Hanford onsite shipments are the activities of moving hazardous materials, substances, and wastes between DOE facilities and over roadways where public access is controlled or restricted and includes intra-area and inter-area movements. The TSD sets forth requirements and standards for onsite shipment of radioactive and hazardous materials and wastes within the confines of the Hanford Site on roadways where public access is restricted by signs, barricades, fences, or other means including road closures and moving convoys controlled by Hanford Site security forces.

  8. A Logic for Reasoning About Time-Dependent Access Control Policies

    National Research Council Canada - National Science Library

    DeYoung, Henry

    2008-01-01

    .... Because of the number and complexity of authorization policies in access control systems, it is clear that ad hoc methods for specifying and enforcing policies cannot inspire a high degree of trust...

  9. Physics of turbulence control and transport barrier formation in DIII-D

    International Nuclear Information System (INIS)

    Doyle, E.J.; Burrell, K.H.; Carlstrom, T.N.

    1996-10-01

    This paper describes the physical mechanisms responsible for turbulence control and transport barrier formation on DIII-D as determined from a synthesis of results from different enhanced confinement regimes, including quantitative and qualitative comparisons to theory. A wide range of DIII-D data support the hypothesis that a single underlying physical mechanism, turbulence suppression via E x B shear flow is playing an essential, though not necessarily unique, role in reducing turbulence and transport in all of the following improved confinement regimes: H-mode, VH-mode, high-ell i modes, improved performance counter-injection L-mode discharges and high performance negative central shear (NCS) discharges. DIII-D data also indicate that synergistic effects are important in some cases, as in NCS discharges where negative magnetic shear also plays a role in transport barrier formation. This work indicates that in order to control turbulence and transport it is important to focus on understanding physical mechanisms, such as E x B shear, which can regulate and control entire classes of turbulent modes, and thus control transport. In the highest performance DIII-D discharges, NCS plasmas with a VH-mode like edge, turbulence is suppressed at all radii, resulting in neoclassical levels of ion transport over most of the plasma volume

  10. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  11. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  12. Individual- and area-level disparities in access to the road network, subway system and a public bicycle share program on the Island of Montreal, Canada.

    Science.gov (United States)

    Fuller, Daniel; Gauvin, Lise; Kestens, Yan

    2013-02-01

    Few studies have examined potential disparities in access to transportation infrastructures, an important determinant of population health. To examine individual- and area-level disparities in access to the road network, public transportation system, and a public bicycle share program in Montreal, Canada. Examining associations between sociodemographic variables and access to the road network, public transportation system, and a public bicycle share program, 6,495 adult respondents (mean age, 48.7 years; 59.0 % female) nested in 33 areas were included in a multilevel analysis. Individuals with lower incomes lived significantly closer to public transportation and the bicycle share program. At the area level, the interaction between low-education and low-income neighborhoods showed that these areas were significantly closer to public transportation and the bicycle share program controlling for individual and urbanicity variables. More deprived areas of the Island of Montreal have better access to transportation infrastructure than less-deprived areas.

  13. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  14. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  15. Ion anomalous transport and feedback control. Final technical report, September 1, 1987 - August 31, 1997

    International Nuclear Information System (INIS)

    Sen, A.K.

    1998-01-01

    This final report is comprised of the following six progress reports: Ion Temperature Gradient Instability and Anomalous Transport, July 1989; Ion Temperature Gradient Instability and Anomalous Transport, August 1991; Ion Temperature Gradient Instability and Anomalous Transport, July 1993; Ion Anomalous Transport and Feedback Control, May 1994; Ion Anomalous Transport and Feedback Control, April 1995; and Ion Anomalous Transport and Feedback Control, December 1997

  16. Traffic improvement and transportation pollution control in Xiamen

    Energy Technology Data Exchange (ETDEWEB)

    Dongxing Yuan; Zilin, Wu

    1996-12-31

    in this paper, the urban traffic improvement and transportation control in Xiamen are highlighted. Xiamen is a port city and an economical special zone of China. As the economy grows, the transportation is developing dramatically and becoming the key for further economic development. The air quality is threatened by the rapid growth of the vehicles in the city. The most urgent task in improving urban traffic is to establish a sound traffic system. The municipal government takes great effort to improve the traffic condition, as well as to reduce green house gases and protect air environment. Some management and technical measures are carried out. Those management measures are mainly as follows: (1) systematic planning of the city arrangement and city functional division, and integrated planning of the urban roads system, (2) putting great emphasis on tail gas monitoring and management, and (3) establishing optimized utilization of motor vehicles. Those included in the main technical measures are (1) making the roads clear, (2) enlarging traffic capacity, and (3) developing the public transport. The most urgent task in improving urban traffic is to establish a sound traffic system. The city municipal government and Transportation Management Bureau plan to make a series of reforms to improve the urban traffic condition, such as building high quality road around the city, reducing the number of one way roads and replacing gasoline buses with electric buses. An optimized traffic system of Xiamen, taking public transport as the main means, is the key to meet the needs of both traffic improvement and urban transportation pollution control.

  17. Reducing CO2 emissions in temperature-controlled road transportation using the LDVRP model

    NARCIS (Netherlands)

    Stellingwerf, Helena M.; Kanellopoulos, Argyris; Vorst, van der Jack G.A.J.; Bloemhof, Jacqueline M.

    2018-01-01

    Temperature-controlled transport is needed to maintain the quality of products such as fresh and frozen foods and pharmaceuticals. Road transportation is responsible for a considerable part of global emissions. Temperature-controlled transportation exhausts even more emissions than ambient

  18. An intelligent trust-based access control model for affective ...

    African Journals Online (AJOL)

    In this study, a fuzzy expert system Trust-Based Access Control (TBAC) model for improving the Quality of crowdsourcing using emotional affective computing is presented. This model takes into consideration a pre-processing module consisting of three inputs such as crowd-workers category, trust metric and emotional ...

  19. Strategic Accessibility Competition

    OpenAIRE

    Bacchiega, Emanuele; Randon, Emanuela; Zirulia, Lorenzo

    2010-01-01

    We analyze the effect of competition in market-accessibility enhancement among quality-differentiated firms. Firms are located in regions with different ex-ante transport costs to reach the final market. We characterize the equilibrium of the two-stage game in which firms first invest to improve market accessibility and then compete in prices. Efforts in accessibility improvement crucially depend on the interplay between the willingness to pay for the quality premium of the median consumer an...

  20. A method to evaluate equitable accessibility : Combining ethical theories and accessibility-based approaches

    NARCIS (Netherlands)

    Lucas, K.; Van Wee, G.P.; Maat, C.

    2015-01-01

    In this paper, we present the case that traditional transport appraisal methods do not sufficiently capture the social dimensions of mobility and accessibility. However, understanding this is highly relevant for policymakers to understand the impacts of their transport decisions. These dimensions

  1. Integrating CERN e-groups into TWiki access control.

    CERN Document Server

    Jones, PL; Hoymr, N; CERN. Geneva. IT Department

    2010-01-01

    Wikis allow for easy collaborative editing of documents on the web for users located in different buildings, cities or even countries. TWiki culture lends to open free form editing and most pages are world readable and editable by CERN authenticated users, however access control is possible and is used to protect sensitive documents. This note discusses the integration of E-groups for authorisation purposes at CERN.

  2. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  3. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  4. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  5. Transportation librarian's toolkit

    Science.gov (United States)

    2007-12-01

    The Transportation Librarians Toolkit is a product of the Transportation Library Connectivity pooled fund study, TPF- 5(105), a collaborative, grass-roots effort by transportation libraries to enhance information accessibility and professional expert...

  6. Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms : A Comprehensive Access Control Scheme Applied to the GENIDA Project - Study of Genetic Forms of Intellectual Disabilities and Autism Spectrum Disorders.

    Science.gov (United States)

    Parrend, Pierre; Mazzucotelli, Timothée; Colin, Florent; Collet, Pierre; Mandel, Jean-Louis

    2017-11-16

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access right management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access rights, as well as the ability to restrict these rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

  7. 42 CFR 460.76 - Transportation services.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Transportation services. 460.76 Section 460.76... ELDERLY (PACE) PACE Administrative Requirements § 460.76 Transportation services. (a) Safety, accessibility, and equipment. A PACE organization's transportation services must be safe, accessible, and...

  8. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Directory of Open Access Journals (Sweden)

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  9. A Conserved Salt Bridge between Transmembrane Segment 1 and 10 Constitutes an Extracellular Gate in the Dopamine Transporter

    DEFF Research Database (Denmark)

    Pedersen, Anders Vingborg; Andreassen, Thorvald Faurschou; Løland, Claus Juul

    2014-01-01

    into the structural and dynamic requirements for substrate transport. These structures support the existence of gating domains controlling access to a central binding site. On the extracellular side, access is controlled by the "thin gate" formed by an interaction between Arg-30 and Asp-404. In the human dopamine...

  10. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  11. The open access and the natural gas ducts: transport and distribution; O livre acesso e os dutos de gas natural: transporte e distribuicao

    Energy Technology Data Exchange (ETDEWEB)

    Siqueira, Mariana de; Xavier, Yanko Marcius de Alencar [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil)

    2008-07-01

    The present research, attempting for the economic relevance of the natural gas sector, for the lack of a law that disciplines it and, still, for the structural question of the natural gas ducts activities; it analyzes, in a comparative way, the monopoly of the natural gas ducts activities and the mechanisms of competition chosen to brighten up it: the open access and the by pas. The transport and the distribution of the natural gas are really similar, but the ways to insert the competition in its areas are not. (author)

  12. EQUITABLE ACCESS TO HEALTH SERVICE IN BANYUWANGI

    Directory of Open Access Journals (Sweden)

    Lusi Herawati Sunyoto Usman Mark Zuidgeest

    2012-06-01

    as indicators. Flowmap tool is used to analyze catchment area of each health facility using different transport modes choice:becak and public transport for poor group and motorcycle and car for non-poor group with different travel time within 30, 60 and more than 60 minutes. It is concluded that there was an accessibility difference between poor and non-poor group. The accessibility to the health facilities of poor group was lower than non-poor group. This condition occurred because the government policy of equitable access to health service facility did not pay attention to accessibility of poor group.

  13. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  14. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    Science.gov (United States)

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  15. An adaptive robust controller for time delay maglev transportation systems

    Science.gov (United States)

    Milani, Reza Hamidi; Zarabadipour, Hassan; Shahnazi, Reza

    2012-12-01

    For engineering systems, uncertainties and time delays are two important issues that must be considered in control design. Uncertainties are often encountered in various dynamical systems due to modeling errors, measurement noises, linearization and approximations. Time delays have always been among the most difficult problems encountered in process control. In practical applications of feedback control, time delay arises frequently and can severely degrade closed-loop system performance and in some cases, drives the system to instability. Therefore, stability analysis and controller synthesis for uncertain nonlinear time-delay systems are important both in theory and in practice and many analytical techniques have been developed using delay-dependent Lyapunov function. In the past decade the magnetic and levitation (maglev) transportation system as a new system with high functionality has been the focus of numerous studies. However, maglev transportation systems are highly nonlinear and thus designing controller for those are challenging. The main topic of this paper is to design an adaptive robust controller for maglev transportation systems with time-delay, parametric uncertainties and external disturbances. In this paper, an adaptive robust control (ARC) is designed for this purpose. It should be noted that the adaptive gain is derived from Lyapunov-Krasovskii synthesis method, therefore asymptotic stability is guaranteed.

  16. Active transportation in adult survivors of childhood cancer and neighborhood controls.

    Science.gov (United States)

    Slater, Megan E; Kelly, Aaron S; Sadak, Karim T; Ross, Julie A

    2016-02-01

    Childhood cancer survivors (CCS) are at high risk of treatment-related late effects, including cardiovascular disease and diabetes, which can be exacerbated by inadequate physical activity (PA). Previous PA interventions targeting CCS have focused on the domain of leisure-time/recreational PA. Active transportation, another domain of PA, has not been described in CCS. Therefore, this study aimed to identify active transportation behaviors, barriers, and correlates in adult CCS. We recruited 158 adult CCS and 153 controls matched on age, sex, and neighborhood for a survey regarding active transportation behaviors and perceptions. Linear and logistic regression models accounting for correlation among matched participants were used. Adult CCS engaged in similar levels of active transportation as controls (2.72 vs. 2.32 h/week, P = 0.40) despite perceiving greater health-related barriers (1.88 vs. 1.65 (measured on four-point Likert scale), P = 0.01). Marital/relationship status (odds ratio (OR) = 0.30, 95 % confidence interval (CI) = 0.11-0.81), planning/psychosocial barriers (OR = 0.15, 95 % CI = 0.04-0.53), and perceived neighborhood walkability (OR = 2.55, 95 % CI = 1.14-5.66) were correlates of active transportation among adult CCS, while objective neighborhood walkability (OR = 1.03, 95 % CI = 1.01-1.05) was a correlate among controls. Results suggest adult CCS and controls utilize active transportation at approximately equal levels. Factors other than health, including perceived neighborhood walkability, are related to active transportation behaviors to a greater degree in adult CCS. Interventions might consider promoting active transportation as a way to incorporate more PA into the daily lives of adult CCS. Such interventions will not be likely successful, however, without existing or improved neighborhood walkability/bikeability.

  17. Active Transportation in Adult Survivors of Childhood Cancer and Neighborhood Controls

    Science.gov (United States)

    Slater, Megan E.; Kelly, Aaron S.; Sadak, Karim T.; Ross, Julie A.

    2015-01-01

    Purpose Childhood cancer survivors (CCS) are at high risk of treatment-related late effects, including cardiovascular disease and diabetes, which can be exacerbated by inadequate physical activity (PA). Previous PA interventions targeting CCS have focused on the domain of leisure-time/recreational PA. Active transportation, another domain of PA, has not been described in CCS. Therefore, this study aimed to identify active transportation behaviors, barriers, and correlates in adult CCS. Methods We recruited 158 adult CCS and 153 controls matched on age, sex, and neighborhood for a survey regarding active transportation behaviors and perceptions. Linear and logistic regression models accounting for correlation among matched participants were used. Results Adult CCS engaged in similar levels of active transportation as controls (2.72 vs. 2.32 hours/week, P=0.40) despite perceiving greater health-related barriers (1.88 vs. 1.65 (measured on four-point Likert scale), P=0.01). Marital/relationship status (odds ratio (OR)=0.30, 95% confidence interval (CI)=0.11–0.81), planning/psychosocial barriers (OR=0.15, 95% CI=0.04–0.53), and perceived neighborhood walkability (OR=2.55, 95% CI=1.14–5.66) were correlates of active transportation among adult CCS, while objective neighborhood walkability (OR=1.03, 95% CI=1.01–1.05) was a correlate among controls. Conclusions Results suggest adult CCS and controls utilize active transportation at approximately equal levels. Factors other than health, including perceived neighborhood walkability, appear to influence active transportation behaviors to a greater degree in adult CCS. Implications for Cancer Survivors Interventions might consider promoting active transportation as a way to incorporate more PA into the daily lives of adult CCS. Such interventions will not be widely successful, however, without existing or improved neighborhood walkability/bikeability. PMID:25809159

  18. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  19. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  20. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  1. 49 CFR 228.205 - Access to electronic records.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Access to electronic records. 228.205 Section 228... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HOURS OF SERVICE OF RAILROAD EMPLOYEES Electronic Recordkeeping § 228.205 Access to electronic records. (a) FRA inspectors and State inspectors participating under 49...

  2. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  3. Application-Defined Decentralized Access Control

    Science.gov (United States)

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  4. Research on the Design of Visually Impaired Interactive Accessibility in Large Urban Public Transport System

    Science.gov (United States)

    Zhang, Weiru

    2017-12-01

    In medieval times, due to people’s reliance on belief, public space of Christianity came into being. With the rise of secularization, religion gradually turned into private belief, and accordingly public space returned to private space. In the 21st century, due to people’s reliance on intelligent devices, information-interactive public space emerges, and as information interaction is constantly constraining the visually impaired, public space regressed to the exclusive space of limited people[1]. Modernity is marked by technical rationality, but an ensuing basic problem lies in the separation between human action, ethics and public space. When technology fails to overcome obstacles for a particular group, the gap between the burgeoning intelligent phenomena and the increasing ratio of visually impaired is also expanding, ultimately resulting in a growing number of “blind spots” in information-interactive space. Technological innovation not only promotes the development of the information industry, but also promotes the rapid development of the transportation industry. Traffic patterns are diversifying and diverging nowadays, but it’s a fatal blow for people with visually disabilities, Because they still can only experience the most traditional mode of transportation, sometimes even not go out. How to guarantee their interactive accessibility in large urban public transport system right, currently, is a very important research direction.

  5. Role of hexose transport in control of glycolytic flux in Saccharomyces cerevisiae.

    Science.gov (United States)

    Elbing, Karin; Larsson, Christer; Bill, Roslyn M; Albers, Eva; Snoep, Jacky L; Boles, Eckhard; Hohmann, Stefan; Gustafsson, Lena

    2004-09-01

    The yeast Saccharomyces cerevisiae predominantly ferments glucose to ethanol at high external glucose concentrations, irrespective of the presence of oxygen. In contrast, at low external glucose concentrations and in the presence of oxygen, as in a glucose-limited chemostat, no ethanol is produced. The importance of the external glucose concentration suggests a central role for the affinity and maximal transport rates of yeast's glucose transporters in the control of ethanol production. Here we present a series of strains producing functional chimeras between the hexose transporters Hxt1 and Hxt7, each of which has distinct glucose transport characteristics. The strains display a range of decreasing glycolytic rates resulting in a proportional decrease in ethanol production. Using these strains, we show for the first time that at high glucose levels, the glucose uptake capacity of wild-type S. cerevisiae does not control glycolytic flux during exponential batch growth. In contrast, our chimeric Hxt transporters control the rate of glycolysis to a high degree. Strains whose glucose uptake is mediated by these chimeric transporters will undoubtedly provide a powerful tool with which to examine in detail the mechanism underlying the switch between fermentation and respiration in S. cerevisiae and will provide new tools for the control of industrial fermentations.

  6. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  7. Role-Based Access Control for Coalition Partners in Maritime Domain Awareness

    National Research Council Canada - National Science Library

    McDaniel, Christopher R; Tardy, Matthew L

    2005-01-01

    The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access control...

  8. The principles of analysis of competitiveness and control schemes in transport services

    Directory of Open Access Journals (Sweden)

    A. Žvirblis

    2003-04-01

    Full Text Available Under the conditions of constantly growing competition transportation companies are faced with theoretical and practical problems associated with the quality and stability of transport services, competitiveness on the market and marketing problems. Road transport services are considered in the terms of value analysis while the assessment of their competitiveness is based on the Pontriagin maximum principle. A model for transport risk analysis is constructed, taking into account the principles of correlation and co - variation of transport services. Formalized models of automated control of services in the system of marketing allowing the analysis of stability and other parameters to be made in the framework of automatic control theory are offered.

  9. Effect of density control and impurity transport on internal transport barrier formation in tokamak plasma

    International Nuclear Information System (INIS)

    Yamakami, Tomoyuki; Fujita, Takaaki; Arimoto, Hideki; Yamazaki, Kozo

    2014-01-01

    In future fusion reactors, density control, such as fueling by pellet injection, is an effective method to control the formation of the internal transport barrier (ITB) in reversed magnetic shear plasma, which can improve plasma performance. On the other hand, an operation with ITB can cause accumulation of impurities inside the core ITB region. We studied the relation between pellet injection and ITB formation and the effect of impurity transport on the core of ITB for tokamak plasmas by using the toroidal transport analysis linkage. For ITB formation, we showed that the pellet has to be injected beyond the position where the safety factor q takes the minimum value. We confirmed that the accumulation of impurities causes the attenuation of ITB owing to radiation loss inside the ITB region. Moreover, in terms of the divertor heat flux reduction by impurity gas, the line radiation loss is high for high-Z noble gas impurities, such as Kr, whereas factor Q decreases slightly. (author)

  10. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  11. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  12. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... of risk management controls and supervisory procedures that, among other things, is reasonably... relevant risk management controls and supervisory procedures required under the Rule. DATES: The effective...

  13. A method to implement fine-grained access control for personal health records through standard relational database queries.

    Science.gov (United States)

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  14. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  15. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  16. Train station access and train use: a joint stated and revealed preference choice modelling study

    NARCIS (Netherlands)

    La Paix Puello, Lissy Cesarina; Geurs, Karst Teunis; Geurs, K.T.; Patuelli, R.; Dentinho, T.

    2016-01-01

    Public transport accessibility depends not only on the places and opportunities that can be reached by transit, but also on accessibility to public transport. The characteristics of access and egress modes influence accessibility patterns but also ridership levels of public transport modes. In

  17. Backstepping fuzzy-neural-network control design for hybrid maglev transportation system.

    Science.gov (United States)

    Wai, Rong-Jong; Yao, Jing-Xiang; Lee, Jeng-Dao

    2015-02-01

    This paper focuses on the design of a backstepping fuzzy-neural-network control (BFNNC) for the online levitated balancing and propulsive positioning of a hybrid magnetic levitation (maglev) transportation system. The dynamic model of the hybrid maglev transportation system including levitated hybrid electromagnets to reduce the suspension power loss and the friction force during linear movement and a propulsive linear induction motor based on the concepts of mechanical geometry and motion dynamics is first constructed. The ultimate goal is to design an online fuzzy neural network (FNN) control methodology to cope with the problem of the complicated control transformation and the chattering control effort in backstepping control (BSC) design, and to directly ensure the stability of the controlled system without the requirement of strict constraints, detailed system information, and auxiliary compensated controllers despite the existence of uncertainties. In the proposed BFNNC scheme, an FNN control is utilized to be the major control role by imitating the BSC strategy, and adaptation laws for network parameters are derived in the sense of projection algorithm and Lyapunov stability theorem to ensure the network convergence as well as stable control performance. The effectiveness of the proposed control strategy for the hybrid maglev transportation system is verified by experimental results, and the superiority of the BFNNC scheme is indicated in comparison with the BSC strategy and the backstepping particle-swarm-optimization control system in previous research.

  18. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    Administrator

    participant observation of gender roles and relations in the study community. ..... in domestic and public spheres, access to and control over locally available ...... Proposal on Leadership Initiatives in Awra Amba Community Case Study on.

  19. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0....... The main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...

  20. Panorama 2009 - greenhouse gas emissions and the transport sector

    International Nuclear Information System (INIS)

    2008-01-01

    The fact that the transport sector is growing quickly brings advantages, such as quick access to any geographical location on earth, but also disadvantages: noise, congestion and polluting emissions such as carbon dioxide (CO 2 ), the greenhouse gas (GHG) primarily responsible for global warming. In the effort to bring GHG emissions under control, improving results in the transport sector is a prime long-term objective. What proportion of CO 2 emissions generated at global and national level are due to the road, air, maritime and rail transport sectors, respectively? What mechanisms can be used to reduce GHG emissions in the transport sector at large?

  1. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  2. Phase-controlled localization and directed transport in an optical bipartite lattice.

    Science.gov (United States)

    Hai, Kuo; Luo, Yunrong; Lu, Gengbiao; Hai, Wenhua

    2014-02-24

    We investigate coherent control of a single atom interacting with an optical bipartite lattice via a combined high-frequency modulation. Our analytical results show that the quantum tunneling and dynamical localization can depend on phase difference between the modulation components, which leads to a different route for the coherent destruction of tunneling and a convenient phase-control method for stabilizing the system to implement the directed transport of atom. The similar directed transport and the phase-controlled quantum transition are revealed for the corresponding many-particle system. The results can be referable for experimentally manipulating quantum transport and transition of cold atoms in the tilted and shaken optical bipartite lattice or of analogical optical two-mode quantum beam splitter, and also can be extended to other optical and solid-state systems.

  3. Vacuum system control for the Heavy Ion Transport Line

    International Nuclear Information System (INIS)

    Stattel, P.; Feigenbaum, I.; Hseuh, H.C.; Robinson, T.; Skelton, R.; Wong, V.

    1987-01-01

    The Brookhaven AGS, 807 m in circumference, and the Tandem Van de Graaff are now joined together by a transport line, 600 m in length. This now allows heavy ions from the Tandem, up to fully stripped sulfur (M = 32) to be transported into the AGS and accelerated to 15 GeV/A. With the addition of a booster between the Tandem and the AGS in the near future, heavy ions such as gold (M = 200) can be accelerated to 30 Z/A GeV/A. This paper describes the HITL (Heavy Ion Transport Line) vacuum control system design and implementation

  4. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  5. Control of Internal Transport Barriers in Magnetically Confined Fusion Plasmas

    Science.gov (United States)

    Panta, Soma; Newman, David; Sanchez, Raul; Terry, Paul

    2016-10-01

    In magnetic confinement fusion devices the best performance often involves some sort of transport barriers to reduce the energy and particle flow from core to edge. Those barriers create gradients in the temperature and density profiles. If gradients in the profiles are too steep that can lead to instabilities and the system collapses. Control of these barriers is therefore an important challenge for fusion devices (burning plasmas). In this work we focus on the dynamics of internal transport barriers. Using a simple 7 field transport model, extensively used for barrier dynamics and control studies, we explore the use of RF heating to control the local gradients and therefore the growth rates and shearing rates for barrier initiation and control in self-heated fusion plasmas. Ion channel barriers can be formed in self-heated plasmas with some NBI heating but electron channel barriers are very sensitive. They can be formed in self-heated plasmas with additional auxiliary heating i.e. NBI and radio-frequency(RF). Using RF heating on both electrons and ions at proper locations, electron channel barriers along with ion channel barriers can be formed and removed demonstrating a control technique. Investigating the role of pellet injection in controlling the barriers is our next goal. Work supported by DOE Grant DE-FG02-04ER54741.

  6. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  7. The GPI transportation accounts : sustainable transportation in Halifax Regional Municipality

    Energy Technology Data Exchange (ETDEWEB)

    Savelson, A.; Colman, R.; Martin, W. [GPI Atlantic, Halifax, NS (Canada)

    2008-03-15

    The Halifax Regional Municipality (HRM) approved its first municipal planning strategy (MPS), in June 2006 that set the general framework for planning decisions over the next 20 years. The major objectives of this initiative are to manage a moderate level of population growth, minimize the environmental impact of that growth, and use it as a catalyst to make HRM more sustainable in all of its activities. Due to the dispersed nature of HRM and the diverse mix of its urban, suburban, and rural areas, the links between communities become a key focal point for sustainability measures. Transportation issues are central to many of HRM's current planning decisions and are a key component of the MPS. This report summarized the portion of the MPS that related to the development of functional transportation plans for HRM. The report also presented findings for eight key indicator categories that could be utilized to assess the sustainability of HRM's transportation system. These indicator categories include transport activity; energy consumption; greenhouse gas emissions; transportation emissions of air pollutants; land use and transportation; access to basic services; access to public transportation; neighbourhood quality of life; and household spending on transportation. The report also provided a quantitative assessment of the economic costs of passenger road transportation in HRM. The costing section provided estimates for 15 cost categories, many of which go unexamined in standard transportation accounting mechanisms. Last, a set of data and policy recommendations outlining ways to improve transportation monitoring in HRM as well as to advance the sustainability of HRM's transportation system as a whole were presented. Recommendations included: establishing settlement patterns and pedestrian or cycling-oriented infrastructure where more people could walk or cycle to work and amenities; increasing ridership by making transit accessible to a wider

  8. Transport on prescription: How can GPs contribute to the promotion of active transport?

    Science.gov (United States)

    Pistoll, Chance; Furler, John

    2017-10-01

    Active transport (ie walking, cycling, using public transport) can play a part in reducing non-communicable diseases (NCDs). Very little is known about how general practitioners (GPs) can contribute to promoting active transport. We explored GPs' ideas around active transport, and potential barriers and facilitators to its promotion in the clinical setting. Using a maximal variation sample, we conducted 10 semi-structured interviews with GPs in Victoria, Australia. The socioecological model informed data collection and analysis. The idea of active transport resonated with GPs. Limited awareness around active transport and safety concerns regarding commuter cycling were barriers to clinical promotion. GPs believed patients' health, cultural norms, socioeconomic position and access to supportive environments could facilitate participation. Future efforts should prioritise awareness of active transport among GPs. The perspectives of GPs would be valuable to policymakers, particularly in designing programs to mitigate inequalities around active transport access and use.

  9. An Artificial Neural Network Controller for Intelligent Transportation Systems Applications

    Science.gov (United States)

    1996-01-01

    An Autonomous Intelligent Cruise Control (AICC) has been designed using a feedforward artificial neural network, as an example for utilizing artificial neural networks for nonlinear control problems arising in intelligent transportation systems appli...

  10. Perti Net-Based Workflow Access Control Model%基于Perti网的工作流访问控制模型研究

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems.This paper shows how to make access control in workflow system.We give a workflow access control model (WACM) based on several current access control models.The model supports roles assignment and dynamic authorization.The paper defines the workflow using Petri net.It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM).Finally, an example of an e-commerce workflow access control model is discussed in detail.

  11. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, interorganizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  12. Simulation-Based Planning and Control of Transport Flows in Port Logistic Systems

    Directory of Open Access Journals (Sweden)

    Antonio Diogo Passos Lima

    2015-01-01

    Full Text Available In highly dynamic and uncertain transport conditions, transport transit time has to be continuously monitored so that the service level is ensured at a proper cost. The aim of this research is to propose and to test a procedure which allows an agile planning and control of transport flows in port logistic systems. The procedure couples an agent-based simulation and a queueing theory model. In this paper, the transport scheduling performed by an agent at the intermodal terminal was taken into consideration. The decision-making agent takes into account data which is acquired in remote points of the system. The obtained results indicate the relevance of continuously considering, for the transport planning and control, the expected transit time and further waiting times along port logistic systems.

  13. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  14. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  15. 49 CFR 238.114 - Rescue access windows.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Rescue access windows. 238.114 Section 238.114... § 238.114 Rescue access windows. (a) Number and location. Except as provided in paragraph (a)(1)(ii) of... rescue access windows. At least one rescue access window shall be located in each side of the car...

  16. Report of the experts group on the taxation of the access to gas transport and distribution network; Rapport du groupe d'experts sur la tarification de l'acces aux reseaux de transport et de distribution de gaz

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-04-01

    In the framework of a new french gas industry organization (directive of the 22 june 1998), a concerting mission has been realized on prices taxation for the transport and distribution facilities. The following topics have been debated: the integration and competition of the european gas market, the gas market liberalization consistency and the taxation of transport and distribution network access. (A.L.B.)

  17. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  18. Examination of accessibility for disabled people at metro stations

    Directory of Open Access Journals (Sweden)

    Evren Burak Enginöz

    2016-07-01

    enforcements, as well as insufficient user’s knowledge cause our cities inaccessible. Therefore, we have to increase the awareness of our community on accessible city life and transportation systems rather than make laws and hope for recovery. In this context, a case study is intended to examine the approaches on barrier-free design and level of accessibility at metro stations in Turkey. With the scope of this case study, current informative, stimulating and guiding regulations, vertical and horizontal implementations on circulation areas at metro stations are examined by an accessible design control list Accessible design control list consists of 28 questions that have been selected from Turkish Ministry of Family and Social Policies-People with Disabilities and Elderly General Service Accessibility check Lists and Turkish World Handicapped Foundation- Outdoors and Indoors Accessibility Check Lists. With the help of question we can examine the passengers’ expectations on the quality of informative, stimulating and guiding signboards at entrance, circulations and surroundings of metro stations; except the legislations related to the product sizes and constraints that designers or professionals have to obey The questions are answered by disabled passengers who use Kadıkoy Ayrılık Cesme main transmission metro station. Disabled passengers are divided into two subject groups. First subject group consist of 5 visually impaired and partially impaired people. The second subject group consist of 7 wheelchair users. Experimentally, asked all the subject groups to make a journey beginning from the entrance of metro station to the train platforms without getting any help. After they completed their journey, they were requested to answer the questions of control list and describe the positive and negative situations from their experiences. According to the result of examining the approaches on barrier-free design and the level of accessibility at Ayrılıkcesme main transmission

  19. Competent authority regulatory control of the transport of radioactive material

    International Nuclear Information System (INIS)

    1987-04-01

    The purpose of this guide is to assist competent authorities in regulating the transport of radioactive materials and to assist users of transport regulations in their interactions with competent authorities. The guide should assist specifically those countries which are establishing their regulatory framework and further assist countries with established procedures to harmonize their application and implementation of the IAEA Regulations. This guide specifically covers various aspects of the competent authority implementation of the IAEA Regulations for the Safe Transport of Radioactive Material. In addition, physical protection and safeguards control of the transport of nuclear materials as well as third party liability aspects are briefly discussed. This is because they have to be taken into account in overall transport regulatory activities, especially when establishing the regulatory framework

  20. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  1. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  2. Presentation of accessibility equipment for primary pipings, IHX, pumps and appertaining manipulator tests

    International Nuclear Information System (INIS)

    Hahn, G.; Hoeft, E.

    1980-01-01

    Accessibility and inservice procedure of SNR-300 components are described. Due to the high radiation level in the primary system it was necessary to develop special equipment to permit access to the testing components. The pertinent examination methods for surveying welding seams are acoustic (ultrasonic) and optical procedures (TV cameras, surface crack tests). This can be done by remote-controlled manipulators and special devices, which can transport the inspection system by rails to the testing position. Presently, relatively limited experience exists for such remote-controlled handling in nuclear power plants. Thus model experiments were carried out on a model pipe section at INTERATOM. The performed test shows that the concept planned to perform inservice by using remote-controlled manipulators can be realized successfully. (author)

  3. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  4. National Transportation Safety Board : weak internal control impaired financial accountability

    Science.gov (United States)

    2001-09-28

    The U. S. General Accounting Office (GAO) was asked to review the National Transportation Safety Board's (NTSB) internal controls over selected types of fiscal year expenditures. They were asked to determine whether internal control weaknesses were a...

  5. Access Control Model for Sharing Composite Electronic Health Records

    Science.gov (United States)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  6. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    .... The derivation of the author's thesis focuses awareness on effective information allocation that is reliable and accurate while maintaining its confidentiality based upon some level of discretionary access control (DAC...

  7. Rural providers' access to online resources: a randomized controlled trial

    Science.gov (United States)

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  8. Suprathermal ion transport in turbulent magnetized plasmas

    International Nuclear Information System (INIS)

    Bovet, A. D.

    2015-01-01

    Suprathermal ions, which have an energy greater than the quasi-Maxwellian background plasma temperature, are present in many laboratory and astrophysical plasmas. In fusion devices, they are generated by the fusion reactions and auxiliary heating. Controlling their transport is essential for the success of future fusion devices that could provide a clean, safe and abundant source of electric power to our society. In space, suprathermal ions include energetic solar particles and cosmic rays. The understanding of the acceleration and transport mechanisms of these particles is still incomplete. Basic plasma devices allow detailed measurements that are not accessible in astrophysical and fusion plasmas, due to the difficulty to access the former and the high temperatures of the latter. The basic toroidal device TORPEX offers an easy access for diagnostics, well characterized plasma scenarios and validated numerical simulations of its turbulence dynamics, making it the ideal platform for the investigation of suprathermal ion transport. This Thesis presents three-dimensional measurements of a suprathermal ion beam injected in turbulent TORPEX plasmas. The combination of uniquely resolved measurements and first principle numerical simulations reveals the general non-diffusive nature of the suprathermal ion transport. A precise characterization of their transport regime shows that, depending on their energies, suprathermal ions can experience either a super diffusive transport or a subdiffusive transport in the same background turbulence. The transport character is determined by the interaction of the suprathermal ion orbits with the turbulent plasma structures, which in turn depends on the ratio between the ion energy and the background plasma temperature. Time-resolved measurements reveal a clear difference in the intermittency of suprathermal ions time-traces depending on the transport regime they experience. Conditionally averaged measurements uncover the influence of

  9. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  10. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  11. Controlling the transport of an ion: classical and quantum mechanical solutions

    International Nuclear Information System (INIS)

    Fürst, H A; Poschinger, U G; Schmidt-Kaler, F; Singer, K; Goerz, M H; Koch, C P; Murphy, M; Montangero, S; Calarco, T

    2014-01-01

    The accurate transport of an ion over macroscopic distances represents a challenging control problem due to the different length and time scales that enter and the experimental limitations on the controls that need to be accounted for. Here, we investigate the performance of different control techniques for ion transport in state-of-the-art segmented miniaturized ion traps. We employ numerical optimization of classical trajectories and quantum wavepacket propagation as well as analytical solutions derived from invariant based inverse engineering and geometric optimal control. The applicability of each of the control methods depends on the length and time scales of the transport. Our comprehensive set of tools allows us make a number of observations. We find that accurate shuttling can be performed with operation times below the trap oscillation period. The maximum speed is limited by the maximum acceleration that can be exerted on the ion. When using controls obtained from classical dynamics for wavepacket propagation, wavepacket squeezing is the only quantum effect that comes into play for a large range of trapping parameters. We show that this can be corrected by a compensating force derived from invariant based inverse engineering, without a significant increase in the operation time. (paper)

  12. 49 CFR 28.150 - Program accessibility: Existing facilities.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Program accessibility: Existing facilities. 28.150 Section 28.150 Transportation Office of the Secretary of Transportation ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE DEPARTMENT OF TRANSPORTATION § 28...

  13. Socio-economic status influences blood pressure control despite equal access to care

    DEFF Research Database (Denmark)

    Paulsen, M S; Andersen, M; Munck, A P

    2012-01-01

    OBJECTIVE: Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general...... Statistics Denmark. The outcome measure was BP control defined as BP...

  14. Lexical Access in L2 Speech Production: a controlled serial search task

    Directory of Open Access Journals (Sweden)

    Gicele Vergine Vieira

    2017-09-01

    Full Text Available When it comes to lexical access in L2 speech production, working memory (WM seems to play a central role as for less automatized procedures require more WM capacity to be executed (Prebianca, 2007. With that in mind, this paper aims at claiming that bilingual lexical access qualifies as a controlled serial strategic search task susceptible to individual differences in WM capacity. Evidence in support of such claim is provided by the results of AUTHOR's (2010 study conducted so as to investigate the relationship between L2 lexical access, WMC and L2 proficiency. AUTHOR's (2010 findings indicate that bilingual lexical access entails underlying processes such as cue generation, set delimitation, serial search and monitoring, which to be carried out, require the allocation of attention. Attention is limited and, as a result, only higher spans were able to perform these underlying processes automatically.

  15. Improving access to transport in developing countries

    CSIR Research Space (South Africa)

    Savill, T

    2003-06-01

    Full Text Available Improving access and mobility of people with disabilities is an essential component of the alleviation of poverty in developing countries. Disabled people are among the most socially excluded members of society and poorly designed and inaccessible...

  16. Access Control Mechanism for Blog Posts with Fine-Grained Ability Using Simple Operations

    Institute of Scientific and Technical Information of China (English)

    Yi-Hui Chen; Chi-Shiang Chan; Yuan-Yu Tsai

    2017-01-01

    Access control enables the owners to assign different users different permissions to see different views. The current blog system does not support fine-grained authorization. That is, the bloggers disallow to just assign partial contents of the blog posts (i.e., a paragraph or several paragraphs) to readers. The management cost is no doubt to be significantly increased while handling the authorizations on the huge amount of blog articles. In this paper, we propose a scheme for supporting a fine-grained access control mechanism on blog articles. The advantage is that bloggers are able to authorize partial contents of blog posts to different users or groups of users.

  17. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  18. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    This paper explores gender relations in access to and control over resources in Awra Amba Community of Amhara Region, Ethiopia. The study employed primary and secondary data sources. The primary data were gathered through semistructured interviews with selected community members and key informants, focus ...

  19. Simulation study of burning control with internal transport barrier

    Energy Technology Data Exchange (ETDEWEB)

    Tateishi, Gonta [Interdisciplinary Graduate School of Engineering Sciences, Kyushu University, Fukuoka (Japan); Yagi, Masatoshi; Itoh, S.I. [Kyushu Univ., Fukuoka (Japan). Research Inst. for Applied Mechanics

    2000-02-01

    Dynamics of burning plasma with internal transport barrier is studied by use of a one dimensional transport simulation code. Two possible mechanisms are modeled for internal transport barrier collapse. One is the collapse, which occurs above the critical pressure gradient, the impact of which is modeled by the enhancement of thermal conductivity. The other is the collapse, which occurs due to the sawtooth trigger. The extended Kadomtsev type reconnection model with multiple resonant surfaces is introduced. Both models are examined for the analysis of long time sustainment of burning. A test of profile control to mitigate the collapse is investigated. The additional circulating power to suppress thermal quench (collapse) is evaluated. (author)

  20. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  1. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  2. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  3. Rural providers’ access to online resources: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Jonathan D. Eldredge

    2016-01-01

    Full Text Available Objective: The research determined the usage and satisfaction levels with one of two point-of-care (PoC resources among health care providers in a rural state. Methods: In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants’ attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA, paired t tests, and Cohen’s d statistic to compare pre- and post-study effects sizes. Results: Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to ‘‘about right amounts of information’’ at the completion of the study. DynaMed users reported a Cohen’s d increase of þ1.50 compared to AccessMedicine users’ reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen’s d. Conclusion: Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine.

  4. Evolutionarily Conserved Roles for Blood-Brain Barrier Xenobiotic Transporters in Endogenous Steroid Partitioning and Behavior

    Directory of Open Access Journals (Sweden)

    Samantha J. Hindle

    2017-10-01

    Full Text Available Summary: Central nervous system (CNS chemical protection depends upon discrete control of small-molecule access by the blood-brain barrier (BBB. Curiously, some drugs cause CNS side-effects despite negligible transit past the BBB. To investigate this phenomenon, we asked whether the highly BBB-enriched drug efflux transporter MDR1 has dual functions in controlling drug and endogenous molecule CNS homeostasis. If this is true, then brain-impermeable drugs could induce behavioral changes by affecting brain levels of endogenous molecules. Using computational, genetic, and pharmacologic approaches across diverse organisms, we demonstrate that BBB-localized efflux transporters are critical for regulating brain levels of endogenous steroids and steroid-regulated behaviors (sleep in Drosophila and anxiety in mice. Furthermore, we show that MDR1-interacting drugs are associated with anxiety-related behaviors in humans. We propose a general mechanism for common behavioral side effects of prescription drugs: pharmacologically challenging BBB efflux transporters disrupts brain levels of endogenous substrates and implicates the BBB in behavioral regulation. : Hindle et al. shed light on the curious finding that some drugs cause behavioral side-effects despite negligible access into the brain. These authors propose a unifying hypothesis that links blood-brain barrier drug transporter function and brain access of circulating steroids to common CNS adverse drug responses. Keywords: drug side effect mechanisms, central nervous system, blood brain barrier, behavior, toxicology, drug transporters, endobiotics, steroid hormones

  5. Internal transport barrier production and control in Alcator C-Mod

    Energy Technology Data Exchange (ETDEWEB)

    Fiore, C L [Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Bonoli, P T [Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Ernst, D R [Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Greenwald, M J [Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Marmar, E S [Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Redi, M H [Princeton Plasma Physics Laboratory, Princeton, NJ (United States); Rice, J E [Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Wukitch, S J [Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Zhurovich, K [Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

    2004-12-01

    Internal transport barriers (ITBs), marked by a steep density profile, even stronger peaking in the pressure profile and reduction of core transport are obtained in Alcator C-Mod. They are induced by the use of off-axis D(H) ICRF (ion cyclotron range of frequencies) power deposition. They also arise spontaneously in Ohmic H-mode plasmas once the H-mode lasts for several energy confinement times. Recent studies have explored the limits for forming, maintaining and controlling these plasmas. The C-Mod provides a unique platform for studying such discharges: the high density (up to 8 x 10{sup 20} m{sup -3}) causes the ions and electrons to be tightly coupled by collisions with T{sub i}/T{sub e} = 1, and the plasma has no internal particle or momentum sources. The ITBs formed in both Ohmic and ICRF heated plasmas are quite similar regardless of the trigger method. Control of impurity influx and heating of the core plasma in the presence of the ITB have been achieved with the addition of central ICRF power, in both Ohmic H-mode and ICRF induced ITBs. Control of the radial location of the transport barrier is achieved through manipulation of the toroidal magnetic field and plasma current. A narrow region of decreased electron thermal transport, as determined by sawtooth heat pulse analysis, is found in these plasmas as well. Transport analysis indicates that reduction of the particle diffusivity in the barrier region allows the neoclassical pinch to drive the density and impurity accumulation in the plasma centre. Examination of the gyro-kinetic stability indicates that the density and temperature profiles of the plasma core are inherently stable to long-wavelength drift mode driven turbulence at the onset time of the ITB, but that the increasing density gradients cause the trapped electron mode to play a role in providing a control mechanism to ultimately limit the density and impurity rise in the plasma centre.

  6. Moderation control in low enriched 235U uranium hexafluoride packaging operations and transportation

    International Nuclear Information System (INIS)

    Dyer, R.H.; Kovac, F.M.; Pryor, W.A.

    1993-01-01

    Moderation control is the basic parameter for ensuring nuclear criticality safety during the packaging and transport of low 235 U enriched uranium hexafluoride before its conversion to nuclear power reactor fuel. Moderation control has permitted the shipment of bulk quantities in large cylinders instead of in many smaller cylinders and, therefore, has resulted in economies without compromising safety. Overall safety and uranium accountability have been enhanced through the use of the moderation control. This paper discusses moderation control and the operating procedures to ensure that moderation control is maintained during packaging operations and transportation

  7. Waste management practices to control biological transport of radioactivity at the Hanford Site

    International Nuclear Information System (INIS)

    Conklin, A.W.

    1985-01-01

    One of the goals of waste management in the Hanford Site 200 Areas is to prevent biological intrusion into, and transport from, waste storage and disposal sites. Practices established to achieve these goals include the elimination of deep-rooted vegetation on waste sites to prevent plant root intrusion into radioactivity, selective herbicide application to prevent regrowth of these plants, planting of shallow-rooted plants to successfully compete with deep-rooted plants for moisture, surface stabilization, and environmental surveillance. Past biological transport incidents have included transport by Russian thistle by way of physiological plant processes, bird access into exposed contamination, and animals burrowing into radioactive waste disposal sites. Rockwell Hanford Operations, through mitigative actions and continued surveillance, has made significant progress in eliminating, or better isolating source terms, thus preventing or inhibiting problems from recurring. Approximately 60% of source term acreage requiring stabilization or decontamination has been completed

  8. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  9. Report of the experts group on the taxation of the access to gas transport and distribution network; Rapport du groupe d'experts sur la tarification de l'acces aux reseaux de transport et de distribution de gaz

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-04-01

    In the framework of a new french gas industry organization (directive of the 22 june 1998), a concerting mission has been realized on prices taxation for the transport and distribution facilities. The following topics have been debated: the integration and competition of the european gas market, the gas market liberalization consistency and the taxation of transport and distribution network access. (A.L.B.)

  10. Sustainable Transportation

    DEFF Research Database (Denmark)

    Hall, Ralph P.; Gudmundsson, Henrik; Marsden, Greg

    2014-01-01

    The transportation system is the backbone of economic and social progress and the means by which humans access goods and services and connect with one another. Yet, as the scale of transportation activities has grown worldwide, so too have the negative environmental, social, and economic impacts...... that relate to the construction and maintenance of transportation infrastructure and the operation or use of the different transportation modes. The concept of sustainable transportation emerged in response to these concerns as part of the broader notion of sustainable development. Given the transportation...... sector’s significant contribution to global challenges such as climate change, it is often said that sustainable development cannot be achieved without sustainable transportation....

  11. The equipment access software for a distributed UNIX-based accelerator control system

    International Nuclear Information System (INIS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve

    1994-01-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  12. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  13. Stream Control Transmission Protocol as a Transport for SIP: a case study

    Directory of Open Access Journals (Sweden)

    Giuseppe De Marco

    2004-06-01

    Full Text Available The dominant signalling protocol both in future wireless and wired networks will be the Session Initiation Protocol (SIP, as pointed out in the 3G IP-based mobile networks specifications, entailing a fully Internet integrated network. The use of SIP in the IP Multimedia Subsytem (IMS of Release 5 involves the development of servers capable to handle a large number of call requests. The signaling traffic associated to such requests could explode, if an intelligent congestion control were not introduced. Stream Control Transmission Protocol (SCTP was born to support transport of SS7 signaling messages. However, many of the SCTP features are also useful for transport of SIP messages, as: congestion control mechanism, good separation among independent messages, multihoming. Indeed, adoption of SCTP as transport of SIP signaling might prove useful in some situations where usual transport protocols, like TCP and UDP, suffer performance degradation. In this paper, we analyse the general framework wherein SIP operates and we discuss the benefits of using SCTP as a transport for SIP, toward fair sharing of network resources. This study is carried on in the context of the implementation of an high-performance SIP Proxy Server. We also present some preliminar results of an implementation of SIP over SCTP/UDP in a real LAN environment.

  14. 9 CFR 590.132 - Access to plants.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Access to plants. 590.132 Section 590... Service § 590.132 Access to plants. Access shall not be refused to any representative of the Secretary to any plant, place of business, or transport vehicle subject to inspection under the provisions of this...

  15. Sistemas de Control en el Transporte de productos Perecederos

    OpenAIRE

    Ruiz García, Luis; Barreiro Elorza, Pilar; Ruiz-Altisent, Margarita

    2009-01-01

    Los productos alimentarios perecederos tales como hortalizas, frutas, carne o pescado requieren transporte refrigerado. El control de la calidad y supervisión de los productos durante su transporte y distribución es de gran importancia, siendo el mayor reto asegurar una cadena de frio continua desde el productor hasta el consumidor. Entre las diferentes tecnologías que se pueden utilizar para monitorizar, destacan las tecnologías de sensórica inalámbrica que pueden ser de dos tipos: RFID...

  16. Numerical and Experimental Investigation of Turbulent Transport Control via Shaping of Radial Plasma Flow Profiles

    International Nuclear Information System (INIS)

    Gilmore, Mark Allen

    2017-01-01

    Turbulence, and turbulence-driven transport are ubiquitous in magnetically confined plasmas, where there is an intimate relationship between turbulence, transport, instability driving mechanisms (such as gradients), plasma flows, and flow shear. Though many of the detailed physics of the interrelationship between turbulence, transport, drive mechanisms, and flow remain unclear, there have been many demonstrations that transport and/or turbulence can be suppressed or reduced via manipulations of plasma flow profiles. This is well known in magnetic fusion plasmas [e.g., high confinement mode (H-mode) and internal transport barriers (ITB's)], and has also been demonstrated in laboratory plasmas. However, it may be that the levels of particle transport obtained in such cases [e.g. H-mode, ITB's] are actually lower than is desirable for a practical fusion device. Ideally, one would be able to actively feedback control the turbulent transport, via manipulation of the flow profiles. The purpose of this research was to investigate the feasibility of using both advanced model-based control algorithms, as well as non-model-based algorithms, to control cross-field turbulence-driven particle transport through appropriate manipulation of radial plasma flow profiles. The University of New Mexico was responsible for the experimental portion of the project, while our collaborators at the University of Montana provided plasma transport modeling, and collaborators at Lehigh University developed and explored control methods.

  17. Numerical and Experimental Investigation of Turbulent Transport Control via Shaping of Radial Plasma Flow Profiles

    Energy Technology Data Exchange (ETDEWEB)

    Gilmore, Mark Allen [Univ. of New Mexico, Albuquerque, NM (United States)

    2017-02-05

    Turbulence, and turbulence-driven transport are ubiquitous in magnetically confined plasmas, where there is an intimate relationship between turbulence, transport, instability driving mechanisms (such as gradients), plasma flows, and flow shear. Though many of the detailed physics of the interrelationship between turbulence, transport, drive mechanisms, and flow remain unclear, there have been many demonstrations that transport and/or turbulence can be suppressed or reduced via manipulations of plasma flow profiles. This is well known in magnetic fusion plasmas [e.g., high confinement mode (H-mode) and internal transport barriers (ITB’s)], and has also been demonstrated in laboratory plasmas. However, it may be that the levels of particle transport obtained in such cases [e.g. H-mode, ITB’s] are actually lower than is desirable for a practical fusion device. Ideally, one would be able to actively feedback control the turbulent transport, via manipulation of the flow profiles. The purpose of this research was to investigate the feasibility of using both advanced model-based control algorithms, as well as non-model-based algorithms, to control cross-field turbulence-driven particle transport through appropriate manipulation of radial plasma flow profiles. The University of New Mexico was responsible for the experimental portion of the project, while our collaborators at the University of Montana provided plasma transport modeling, and collaborators at Lehigh University developed and explored control methods.

  18. 78 FR 41993 - Transport Handling Specialists, Inc.-Continuance in Control Exemption-RSL Railroad, LLC

    Science.gov (United States)

    2013-07-12

    ... DEPARTMENT OF TRANSPORTATION Surface Transportation Board [Docket No. FD 35726] Transport Handling Specialists, Inc.--Continuance in Control Exemption--RSL Railroad, LLC Transport Handling Specialists, Inc. (THS), has filed a verified notice of exemption (Notice) under 49 CFR 1180.2(d)(2) to continue in...

  19. Understanding and Control of Transport in Advanced Tokamak Regimes in DIII-D

    International Nuclear Information System (INIS)

    C.M. Greenfield; J.C. DeBoo; T.C. Luce; B.W. Stallard; E.J. Synakowski; L.R. Baylor; K.H. Burrell; T.A. Casper; E.J. Doyle; D.R. Ernst; J.R. Ferron; P. Gohil; R.J. Groebner; L.L. Lao; M. Makowski; G.R. McKee; M. Murakami; C.C. Petty; R.I. Pinsker; P.A. Politzer; R. Prater; C.L. Rettig; T.L. Rhodes; B.W. Rice; G.L. Schmidt; G.M. Staebler; E.J. Strait; D.M. Thomas; M.R. Wade

    1999-01-01

    Transport phenomena are studied in Advanced Tokamak (AT) regimes in the DIII-D tokamak [Plasma Physics and Controlled Nuclear Fusion Research, 1986 (International Atomics Energy Agency, Vienna, 1987), Vol. I, p. 159], with the goal of developing understanding and control during each of three phases: Formation of the internal transport barrier (ITB) with counter neutral beam injection takes place when the heating power exceeds a threshold value of about 9 MW, contrasting to CO-NBI injection, where P threshold N H 89 = 9 for 16 confinement times has been accomplished in a discharge combining an ELMing H-mode edge and an ITB, and exhibiting ion thermal transport down to 2-3 times neoclassical. The microinstabilities usually associated with ion thermal transport are predicted stable, implying that another mechanism limits performance. High frequency MHD activity is identified as the probable cause

  20. An IEEE 802.3 Compatible Real Time Medium Access Control with Length-based Priority

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new medium access control method is proposed over the predominant Ethernet broadcast channel. Taking advantages of intrinsic variable length characteristic of standard Ethernet frame, message-oriented dynamic priority mechanism is established. Prioritized medium access control operates under a so-called block mode in event of collisions.High priority messages have a chance to preempt block status incurred by low priority ones. By this means, the new MAC provides a conditional deterministic real time performance beyond a statistical one. Experiments demonstrate effectiveness and attractiveness of the proposed scheme. Moreover, this new MAC is completely compatible with IEEE802.3.

  1. Equitable access: Remote and rural communities 'transport needs'

    OpenAIRE

    White, Peter

    2011-01-01

    Transport in rural and remote regions receives considerable attention in research, but this is often focussed on specific means of resolving problems in those regions - for example, the role of demand-responsive bus services, or scope for attracting users to rail services. The aim of this paper is to take a broader view, firstly in defining what constitute rural and remote regions, and secondly in considering a wide range of public transport options available. Experience in Britain will be ta...

  2. Accessibility to health services by persons with disabilities.

    Science.gov (United States)

    Castro, Shamyr Sulyvan; Lefèvre, Fernando; Lefèvre, Ana Maria Cavalcanti; Cesar, Chester Luiz Galvão

    2011-02-01

    To analyze the difficulties in accessibility to health services experienced by persons with disabilities. A qualitative study was performed with individuals who reported having a certain type of disability (paralysis or amputation of limbs; low vision, unilateral or total blindness; low hearing, unilateral or total deafness). A total of 25 individuals (14 women) were interviewed in the city of São Paulo, Southeastern Brazil, between June and August 2007, responding to questions about transportation and accessibility to health services. Collective Subject Discourse was the methodology used to analyze results and analyses were performed with the Qualiquantisoft software. The analysis of discourses on transportation to health services revealed a diversity in terms of the user going to the service alone or accompanied; using a private car, public transportation or ambulance or walking; and requiring different times to arrive at the service. With regard to the difficulties in accessibility to health services, there were reports of delayed service, problems with parking, and lack of ramps, elevators, wheelchairs, doctors and adapted toilets. Individuals with a certain type of disability used various means of transportation, requiring someone to accompany them in some cases. Problems with accessibility to health services were reported by persons with disabilities, contradicting the principle of equity, a precept of the Brazilian Unified Health System.

  3. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2011-09-29

    ... ``access'' to copyrighted works, e.g., decryption or hacking of access controls such as passwords or serial... availability for use of copyrighted works is whether the measure supports a distribution model that benefits... work, those limitations may benefit the public by providing ``use-facilitating'' models that allow...

  4. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  5. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  6. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  7. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  8. An energy-optimal solution for transportation control of cranes with double pendulum dynamics: Design and experiments

    Science.gov (United States)

    Sun, Ning; Wu, Yiming; Chen, He; Fang, Yongchun

    2018-03-01

    Underactuated cranes play an important role in modern industry. Specifically, in most situations of practical applications, crane systems exhibit significant double pendulum characteristics, which makes the control problem quite challenging. Moreover, most existing planners/controllers obtained with standard methods/techniques for double pendulum cranes cannot minimize the energy consumption when fulfilling the transportation tasks. Therefore, from a practical perspective, this paper proposes an energy-optimal solution for transportation control of double pendulum cranes. By applying the presented approach, the transportation objective, including fast trolley positioning and swing elimination, is achieved with minimized energy consumption, and the residual oscillations are suppressed effectively with all the state constrains being satisfied during the entire transportation process. As far as we know, this is the first energy-optimal solution for transportation control of underactuated double pendulum cranes with various state and control constraints. Hardware experimental results are included to verify the effectiveness of the proposed approach, whose superior performance is reflected by being experimentally compared with some comparative controllers.

  9. Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

    Directory of Open Access Journals (Sweden)

    Davy Preuveneers

    2017-09-01

    Full Text Available Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1 how to constrain data processing workflows with respect to dynamic authorization policies granting or denying access to certain microservice results depending on the flow of the data; (2 how to let multiple microservices contribute to a collective data-driven authorization decision and (3 how to put adequate measures in place such that the data within each individual microservice is protected against illegitimate access from unauthorized users or other microservices. Due to this multifold objective, enforcing access control on the data endpoints to prevent information leakage or preserve one’s privacy becomes far more challenging, as authorization policies can have dependencies and decision outcomes cross-cutting data in multiple microservices. To address this challenge, we present and evaluate a workflow-oriented authorization framework that enforces authorization policies in a decentralized manner and where the delegated policy evaluation leverages feature toggles that are managed at runtime by software circuit breakers to secure the distributed data processing workflows. The benefit of our solution is that, on the one hand, authorization policies restrict access to the data endpoints of the microservices, and on the other hand, microservices can safely rely on other data endpoints to collectively evaluate cross-cutting access control decisions without having to rely on a shared storage backend holding all the necessary information for the policy evaluation.

  10. An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service

    Institute of Scientific and Technical Information of China (English)

    Nyamsuren Vaanchig; Wei Chen; Zhi-Guang Qin

    2017-01-01

    Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner (DO) direct control on access policy and enforces the access policy cryptographically. However, the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semi-trusted cloud service provider (CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attribute-revocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service.

  11. Transportation Statistics Annual Report 1997

    Energy Technology Data Exchange (ETDEWEB)

    Fenn, M.

    1997-01-01

    This document is the fourth Transportation Statistics Annual Report (TSAR) prepared by the Bureau of Transportation Statistics (BTS) for the President and Congress. As in previous years, it reports on the state of U.S. transportation system at two levels. First, in Part I, it provides a statistical and interpretive survey of the system—its physical characteristics, its economic attributes, aspects of its use and performance, and the scale and severity of unintended consequences of transportation, such as fatalities and injuries, oil import dependency, and environment impacts. Part I also explores the state of transportation statistics, and new needs of the rapidly changing world of transportation. Second, Part II of the report, as in prior years, explores in detail the performance of the U.S. transportation system from the perspective of desired social outcomes or strategic goals. This year, the performance aspect of transportation chosen for thematic treatment is “Mobility and Access,” which complements past TSAR theme sections on “The Economic Performance of Transportation” (1995) and “Transportation and the Environment” (1996). Mobility and access are at the heart of the transportation system’s performance from the user’s perspective. In what ways and to what extent does the geographic freedom provided by transportation enhance personal fulfillment of the nation’s residents and contribute to economic advancement of people and businesses? This broad question underlies many of the topics examined in Part II: What is the current level of personal mobility in the United States, and how does it vary by sex, age, income level, urban or rural location, and over time? What factors explain variations? Has transportation helped improve people’s access to work, shopping, recreational facilities, and medical services, and in what ways and in what locations? How have barriers, such as age, disabilities, or lack of an automobile, affected these

  12. Control of intracellular heme levels: Heme transporters and Heme oxygenases

    Science.gov (United States)

    Khan, Anwar A.; Quigley, John G.

    2011-01-01

    Heme serves as a co-factor in proteins involved in fundamental biological processes including oxidative metabolism, oxygen storage and transport, signal transduction and drug metabolism. In addition, heme is important for systemic iron homeostasis in mammals. Heme has important regulatory roles in cell biology, yet excessive levels of intracellular heme are toxic; thus, mechanisms have evolved to control the acquisition, synthesis, catabolism and expulsion of cellular heme. Recently, a number of transporters of heme and heme synthesis intermediates have been described. Here we review aspects of heme metabolism and discuss our current understanding of heme transporters, with emphasis on the function of the cell-surface heme exporter, FLVCR. Knockdown of Flvcr in mice leads to both defective erythropoiesis and disturbed systemic iron homeostasis, underscoring the critical role of heme transporters in mammalian physiology. PMID:21238504

  13. Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lee, C.

    2014-01-01

    This paper presents on-going research to define the basic models and architecture patterns for federated access control in heterogeneous (multi-provider) multi-cloud and inter-cloud environment. The proposed research contributes to the further definition of Intercloud Federation Framework (ICFF)

  14. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  15. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in resource sharing and information protection. One of the weaknesses in today's access control (AC) is ...

  16. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  17. Law project aiming to enforce the maritime transport safety and fight against the sea pollutions; Proposition de loi tendant a renforcer la securite du transport maritime et a lutter contre les pollutions marines

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-12-01

    Facing the increase of the maritime transport, the poor quality of the ships and the flag of convenience problem, this law project is proposed. It concerns the ships maintenance and safety standards, the delivery of a control certificate, the social rights of the sailors, the coasts and ports access control. (A.L.B.)

  18. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  19. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  20. A highly efficient SDRAM controller supporting variable-length burst access and batch process for discrete reads

    Science.gov (United States)

    Li, Nan; Wang, Junzheng

    2016-03-01

    A highly efficient Synchronous Dynamic Random Access Memory (SDRAM) controller supporting variable-length burst access and batch process for discrete reads is proposed in this paper. Based on the Principle of Locality, command First In First Out (FIFO) and address range detector are designed within this controller to accelerate its responses to discrete read requests, which dramatically improves the average Effective Bus Utilization Ratio (EBUR) of SDRAM. Our controller is finally verified by driving the Micron 256-Mb SDRAM MT48LC16M16A2. Successful simulation and verification results show that our controller exhibits much higher EBUR than do most existing designs in case of discrete reads.

  1. 49 CFR 38.83 - Mobility aid accessibility.

    Science.gov (United States)

    2010-10-01

    ... Transportation Office of the Secretary of Transportation AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY..., curb, and intermediate positions) normally encountered in the operating environment. Where provided... allowing an occupied platform to fold or retract into the stowed position. (ii) Exception. Where physical...

  2. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    Science.gov (United States)

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  3. The assessment of exploitation process of power for access control system

    Science.gov (United States)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  4. Multi-agent model predictive control for transportation networks : Serial versus parallel schemes

    NARCIS (Netherlands)

    Negenborn, R.R.; De Schutter, B.; Hellendoorn, J.

    2006-01-01

    We consider the control of large-scale transportation networks, like road traffic networks, power distribution networks, water distribution networks, etc. Control of these networks is often not possible from a single point by a single intelligent control agent; instead control has to be performed

  5. A justice-theoretic exploration of accessibility measures

    NARCIS (Netherlands)

    Martens, C.J.C.M.; Golub, A.; Geurs, K.T.; Krizek, K.J.; Reggiani, A.

    2012-01-01

    As the various problems posed by mobility planning have increased in severity, interest in accessibility planning in both academia and practice has grown (Department for Transport, 2004; Lucas, 2006; Curtis and Scheurer, 2010). The call for a shift towards accessibility planning inevitably implies

  6. CO2 reduction in the Danish transportation sector. Working paper 9: Traffic planning. Payment and parking restrictions. Traffic control. Driving education. Infrastructure for bike traffic

    International Nuclear Information System (INIS)

    1997-03-01

    Paid access to the city of Copenhagen and stringent parking restrictions are proposed in order to enforce the use of collective transport and thus contribute to emission reduction. Training of drivers in energy-efficient driving and better information on highways and access roads concerning queues and parking possibilities would result in improved air quality. Bicycle path infrastructure results in use of fuel-free transport. (EG) Prepared for Trafikministeriet. 16 refs

  7. Fault tolerant computer control for a Maglev transportation system

    Science.gov (United States)

    Lala, Jaynarayan H.; Nagle, Gail A.; Anagnostopoulos, George

    1994-01-01

    Magnetically levitated (Maglev) vehicles operating on dedicated guideways at speeds of 500 km/hr are an emerging transportation alternative to short-haul air and high-speed rail. They have the potential to offer a service significantly more dependable than air and with less operating cost than both air and high-speed rail. Maglev transportation derives these benefits by using magnetic forces to suspend a vehicle 8 to 200 mm above the guideway. Magnetic forces are also used for propulsion and guidance. The combination of high speed, short headways, stringent ride quality requirements, and a distributed offboard propulsion system necessitates high levels of automation for the Maglev control and operation. Very high levels of safety and availability will be required for the Maglev control system. This paper describes the mission scenario, functional requirements, and dependability and performance requirements of the Maglev command, control, and communications system. A distributed hierarchical architecture consisting of vehicle on-board computers, wayside zone computers, a central computer facility, and communication links between these entities was synthesized to meet the functional and dependability requirements on the maglev. Two variations of the basic architecture are described: the Smart Vehicle Architecture (SVA) and the Zone Control Architecture (ZCA). Preliminary dependability modeling results are also presented.

  8. Control of alpha-particle transport by ion cyclotron resonance heating

    International Nuclear Information System (INIS)

    Chang, C.S.; Imre, K.; Weitzner, H.; Colestock, P.

    1990-01-01

    In this paper control of radial alpha-particle transport by using ion cyclotron range of frequency (ICRF) waves is investigated in a large-aspect-ratio tokamak geometry. Spatially inhomogeneous ICRF wave energy with properly selected frequencies and wave numbers can induce fast convective transports of alpha particles at the speed of order v α ∼ (P RF /n α ε 0 )ρ p , where R RF is the ICRF wave power density, n α is the alpha-particle density, ε 0 is the alpha-particle birth energy, and ρ p is the poloidal gyroradius of alpha particles at the birth energy. Application to International Thermonuclear Experimental Reactor (ITER) plasma is studied and possible antenna designs to control alpha-particle flux are discussed

  9. Equity in transportation: new approach in transport planning – preliminary results of case study in Cracow

    Directory of Open Access Journals (Sweden)

    Lidia ZAKOWSKA

    2014-09-01

    Full Text Available The goal of the paper is to present the concept of equity as a new approach in transport and land-use planning. This concept is consistent with the objectives of sustainable development and it is becoming more common in European and world literature. Understanding the idea of equity in the context of the transport system development is very important in creating sustainable cities and regions without discriminating any social groups and creating a cohesive society not exposed to social exclusion due to lack of access to primary and secondary activities. The paper presents some results of the preliminary analysis on transport equity in Cracow. The basic equity level which has been considered here concerns senior citizens, older people living in Cracow area, in terms of their accessibility to transport infrastructure. Taking into account living conditions of elderly pedestrians, contour measures were used, in order to determine accessibility as equity indicator.

  10. 76 FR 77888 - Student Transportation of America, Inc.-Control-Dairyland Buses, Inc.

    Science.gov (United States)

    2011-12-14

    ... Wisconsin law, also holds a FMCSA license (MC-170747) and is owned by Coach USA, Inc., a Delaware..., 2011, from their current owner, Coach USA, Inc., into an independent voting trust established under 49... Transportation of America, Inc.--Control--Dairyland Buses, Inc. AGENCY: Surface Transportation Board. ACTION...

  11. RCT: Module 2.10, Access Control and Work Area Setup, Course 8776

    Energy Technology Data Exchange (ETDEWEB)

    Hillmer, Kurt T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-11

    This course presents information on radiological work permits (RWPs), various types of postings used in radiological areas, radiological area setups, access controls, and releases of material from radiological areas. All of these are fundamental duties of RCTs. This course will prepare the student with the skills necessary for radiological control technician (RCT) qualification by passing quizzes, tests, and the RCT Comprehensive Phase 1, Unit 2 Examination (TEST 27566) and providing in-thefield skills.

  12. Price cap regulation: the case of natural gas transport in the UK; La reglementation par price cap: le cas du transport de gaz naturel au Royaume Uni

    Energy Technology Data Exchange (ETDEWEB)

    David, L. [ATER, Paris-1 Univ., 75 (France)

    1999-09-01

    The transport and storage activities of British Gas company are controlled by a distinct organization named Transco. The access charges paid by the suppliers for the use of Transco's network are regulated by a price cap since October 1, 1994. However, Ofgas, the office of gas supply which is the regulation authority in charge of the control of competition and of British Gas activities, considers this control system as inefficient and has chosen a RPI (retail price index)-X (expected productivity factor)-type price cap for the control of gas transport tariffs. This has led to a disagreement between Transco and Ofgas which has delayed the implementation of the new system up to February 1998. This article compares the choices made by Ofgas for the control of gas transport tariffs with the economical theory. It recalls first, the reasons why the price cap appears as more efficient than the service cost regulation, the alternate method used by regulation authorities to control the tariffs of natural monopolies. Then, the difficulties linked with the implementation of the price cap for the transport of natural gas in the UK are analyzed in order to explain the reasons that led Ofgas to change its formula. Finally, the bases of an optimum hybrid formula are proposed. (J.S.)

  13. Impact of Transport Layer Protocols on Reliable Information Access in Smart Grids

    DEFF Research Database (Denmark)

    Shahid, Kamal; Saeed, Aamir; Kristensen, Thomas le Fevre

    2017-01-01

    Time is critical for certain types of dynamic information (e.g. frequency control) in a smart grid scenario. The usefulness of such information depends upon the arrival within a specific frame of time, which in other case may not serve the purpose and effect controller’s performance....... The question is addressed by analyzing the performance of UDP and TCP over imperfect network conditions to show how the selection of transport layer protocol can dramatically affect controller’s performance. This analysis is based on a quality metric called mismatch probability that considers occurrence...

  14. Coupling of remote alternating-access transport mechanisms for protons and substrates in the multidrug efflux pump AcrB.

    Science.gov (United States)

    Eicher, Thomas; Seeger, Markus A; Anselmi, Claudio; Zhou, Wenchang; Brandstätter, Lorenz; Verrey, François; Diederichs, Kay; Faraldo-Gómez, José D; Pos, Klaas M

    2014-09-19

    Membrane transporters of the RND superfamily confer multidrug resistance to pathogenic bacteria, and are essential for cholesterol metabolism and embryonic development in humans. We use high-resolution X-ray crystallography and computational methods to delineate the mechanism of the homotrimeric RND-type proton/drug antiporter AcrB, the active component of the major efflux system AcrAB-TolC in Escherichia coli, and one most complex and intriguing membrane transporters known to date. Analysis of wildtype AcrB and four functionally-inactive variants reveals an unprecedented mechanism that involves two remote alternating-access conformational cycles within each protomer, namely one for protons in the transmembrane region and another for drugs in the periplasmic domain, 50 Å apart. Each of these cycles entails two distinct types of collective motions of two structural repeats, coupled by flanking α-helices that project from the membrane. Moreover, we rationalize how the cross-talk among protomers across the trimerization interface might lead to a more kinetically efficient efflux system.

  15. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    Science.gov (United States)

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  16. Vibrations control of light rail transportation vehicle via PID type fuzzy controller using parameters adaptive method

    OpenAIRE

    METİN, Muzaffer; GÜÇLÜ, Rahmi

    2014-01-01

    In this study, a conventional PID type fuzzy controller and parameter adaptive fuzzy controller are designed to control vibrations actively of a light rail transport vehicle which modeled as 6 degree-of-freedom system and compared performances of these two controllers. Rail vehicle model consists of a passenger seat and its suspension system, vehicle body, bogie, primary and secondary suspensions and wheels. The similarity between mathematical model and real system is shown by compar...

  17. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  18. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  19. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  20. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  1. Control of long range turbulent transport with biasing in the tokamak scrape-off-layer

    International Nuclear Information System (INIS)

    Figarella, C.F.; Ghendrih, Ph.; Sarazin, Y.; Attuel, G.; Benkadda, S.; Beyer, P.; Falchetto, G.; Fleurence, E.; Garbet, X.; Grandgirard, V.

    2005-01-01

    Cross-field transport in the SOL influences tokamak performance in particular regarding the divertor efficiency. Recent experiment evidence emphasizes non-exponential and/or flat SOL profiles that suggest a large perpendicular transport. A 2D fluid model based on the interchange instability to simulate the SOL turbulence was found to exhibits intermittent dynamics of the particle flux. We propose a control method that prevents long range transport events from reaching the far SOL: It consists in biasing the far SOL leading to a transport barrier which stops the propagation of these intermittent events. The best trade off is to localize the biased toroidal ring around the baffles. We show that such a control is achievable providing the strength of the barrier is strong enough. The investigation of the minimal biasing power required to achieve the control as well as its experimental estimate is performed

  2. Control of long range turbulent transport with biasing in the tokamak scrape-off-layer

    International Nuclear Information System (INIS)

    Figarella, C.F.; Ghendrih, Ph.; Sarazin, Y.; Attuel, G.; Falchetto, G.; Fleurence, E.; Garbet, X.; Grandgirard, V.

    2004-01-01

    Cross field transport in the SOL (scrape-off-layer) influences tokamak performance in particular regarding the divertor efficiency. Recent experiment evidence emphasizes non-exponential and/or flat SOL profiles that suggest a large perpendicular transport. A 2-dimensional fluid model based on the interchange instability to simulate the SOL turbulence was found to exhibits intermittent dynamics of the particle flux. We propose a control method that prevents long range transport events from reaching the far SOL: It consists in biasing the far SOL leading to a transport barrier which stops the propagation of these intermittent events. The best trade off is to localize the biased toroidal ring around the baffles. We show that such a control is achievable providing the strength of the barrier is strong enough. The investigation of the minimal biasing power required to achieve the control as well as its experimental estimate is performed. (authors)

  3. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  4. Availability Control for Means of Transport in Decisive Semi-Markov Models of Exploitation Process

    Science.gov (United States)

    Migawa, Klaudiusz

    2012-12-01

    The issues presented in this research paper refer to problems connected with the control process for exploitation implemented in the complex systems of exploitation for technical objects. The article presents the description of the method concerning the control availability for technical objects (means of transport) on the basis of the mathematical model of the exploitation process with the implementation of the decisive processes by semi-Markov. The presented method means focused on the preparing the decisive for the exploitation process for technical objects (semi-Markov model) and after that specifying the best control strategy (optimal strategy) from among possible decisive variants in accordance with the approved criterion (criteria) of the activity evaluation of the system of exploitation for technical objects. In the presented method specifying the optimal strategy for control availability in the technical objects means a choice of a sequence of control decisions made in individual states of modelled exploitation process for which the function being a criterion of evaluation reaches the extreme value. In order to choose the optimal control strategy the implementation of the genetic algorithm was chosen. The opinions were presented on the example of the exploitation process of the means of transport implemented in the real system of the bus municipal transport. The model of the exploitation process for the means of transports was prepared on the basis of the results implemented in the real transport system. The mathematical model of the exploitation process was built taking into consideration the fact that the model of the process constitutes the homogenous semi-Markov process.

  5. Density control problems in large stellarators with neoclassical transport

    International Nuclear Information System (INIS)

    Maassberg, H.; Beidler, C.D.; Simmet, E.E.

    1999-01-01

    With respect to the particle flux, the off-diagonal term in the neoclassical transport matrix becomes crucial in the stellarator long-mean-free-path regime. Central heating with peaked temperature profiles can make an active density profile control by central particle refuelling mandatory. The neoclassical particle confinement can significantly exceed the energy confinement at the outer radii. As a consequence, the required central refuelling may be larger than the neoclassical particle fluxes at outer radii leading to the loss of the global density control. Radiative losses as well as additional 'anomalous' electron heat diffusivities further exacerbate this problem. In addition to the analytical formulation of the neoclassical link of particle and energy fluxes, simplified model simulations as well as time-dependent ASTRA code simulations are described. In particular, the 'low-' and 'high-mirror' W7-X configurations are compared. For the W7-X 'high-mirror' configuration especially, the appearance of the neoclassical particle transport barrier is predicted at higher densities. (author)

  6. Low temperature carrier transport properties in isotopically controlled germanium

    Energy Technology Data Exchange (ETDEWEB)

    Itoh, Kohei [Univ. of California, Berkeley, CA (United States)

    1994-12-01

    Investigations of electronic and optical properties of semiconductors often require specimens with extremely homogeneous dopant distributions and precisely controlled net-carrier concentrations and compensation ratios. The previous difficulties in fabricating such samples are overcome as reported in this thesis by growing high-purity Ge single crystals of controlled 75Ge and 70Ge isotopic compositions, and doping these crystals by the neutron transmutation doping (NTD) technique. The resulting net-impurity concentrations and the compensation ratios are precisely determined by the thermal neutron fluence and the [74Ge]/[70Ge] ratios of the starting Ge materials, respectively. This method also guarantees unprecedented doping uniformity. Using such samples the authors have conducted four types of electron (hole) transport studies probing the nature of (1) free carrier scattering by neutral impurities, (2) free carrier scattering by ionized impurities, (3) low temperature hopping conduction, and (4) free carrier transport in samples close to the metal-insulator transition.

  7. Enteroendocrine-derived glucagon-like peptide-2 controls intestinal amino acid transport.

    Science.gov (United States)

    Lee, Jennifer; Koehler, Jacqueline; Yusta, Bernardo; Bahrami, Jasmine; Matthews, Dianne; Rafii, Mahroukh; Pencharz, Paul B; Drucker, Daniel J

    2017-03-01

    Glucagon-like peptide-2 (GLP-2) is co-secreted with GLP-1 from gut endocrine cells, and both peptides act as growth factors to expand the surface area of the mucosal epithelium. Notably, GLP-2 also enhances glucose and lipid transport in enterocytes; however, its actions on control of amino acid (AA) transport remain unclear. Here we examined the mechanisms linking gain and loss of GLP-2 receptor (GLP-2R) signaling to control of intestinal amino acid absorption in mice. Absorption, transport, and clearance of essential AAs, specifically lysine, were measured in vivo by Liquid Chromatography triple quadrupole Mass Spectrometry (LC-MS/MS) and ex vivo with Ussing chambers using intestinal preparations from Glp2 r +/+ and Glp2r - / - mice. Immunoblotting determined jejunal levels of protein components of signaling pathways (PI3K-AKT, and mTORC1-pS6-p4E-BP1) following administration of GLP-2, protein gavage, and rapamycin to fasted Glp2 r +/+ and Glp2r - / - mice. Expression of AA transporters from full thickness jejunum and 4F2hc from brush border membrane vesicles (BBMVs) was measured by real-time PCR and immunoblotting, respectively. Acute administration of GLP-2 increased basal AA absorption in vivo and augmented basal lysine transport ex vivo . GLP-2-stimulated lysine transport was attenuated by co-incubation with wortmannin, rapamycin, or tetrodotoxin ex vivo . Phosphorylation of mTORC1 effector proteins S6 and 4E-BP1 was significantly increased in wild-type mice in response to GLP-2 alone, or when co-administered with protein gavage, and abolished following oral gavage of rapamycin. In contrast, activation of GLP-1R signaling did not enhance S6 phosphorylation. Disruption of GLP-2 action in Glp2r -/- mice reduced lysine transport ex vivo and attenuated the phosphorylation of S6 and 4E-BP1 in response to oral protein. Moreover, the expression of cationic AA transporter slc7a9 in response to refeeding, and the abundance of 4F2hc in BBMVs following protein

  8. Eco-Efficiency Indicators for Urban Transport

    Directory of Open Access Journals (Sweden)

    Patrick Moriarty

    2015-06-01

    Full Text Available This paper focuses on urban passenger transport eco-efficiency, which can be defined as the production of maximum benefits to society while minimising environmental impacts from urban transport’s inputs of energy and materials. Researchers have intensively studied transport’s varied environmental impacts, particularly through Life Cycle Assessment; this paper argues that primary transport energy per capita is presently the best measure of impact. Although transport’s societal benefits have generally been regarded as self-evident, access to out-of-home activities, not passenger-km, should be considered as the fundamental useful output of an urban transport system, since transport is a derived demand. We argue that access levels are roughly similar in all high-income OECD cities, so that these cities can be ranked on transport eco-efficiency simply on the basis of per capita primary transport energy.

  9. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  10. 49 CFR 38.125 - Mobility aid accessibility.

    Science.gov (United States)

    2010-10-01

    ... Transportation Office of the Secretary of Transportation AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY... fold or retract into the stowed position. (ii) Exception. Where physical or safety constraints prevent... a lift design of this type if the stowed position is within the passenger compartment and the lift...

  11. 49 CFR 28.151 - Program accessibility: New construction and alterations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Program accessibility: New construction and alterations. 28.151 Section 28.151 Transportation Office of the Secretary of Transportation ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE DEPARTMENT OF TRANSPORTATION...

  12. Model Predictive Control of Hybrid Thermal Energy Systems in Transport Refrigeration

    DEFF Research Database (Denmark)

    Shafiei, Seyed Ehsan; Alleyne, Andrew

    2015-01-01

    A predictive control scheme is designed to control a transport refrigeration system, such as a delivery truck, that includes a vapor compression cycle configured in parallel with a thermal energy storage (TES) unit. A novel approach to TES utilization is introduced and is based on the current...

  13. 14 CFR 153.5 - Aviation safety inspector airport access.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aviation safety inspector airport access... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation safety... must grant Aviation Safety Inspectors bearing FAA Form 110A free and uninterrupted access to public-use...

  14. Factors influencing the control strategy of hybrid drive of urban public transport buses

    International Nuclear Information System (INIS)

    Barta, Dalibor; Mruzek, Martin

    2015-01-01

    The efficiency of each drives is dependent on many factors. Hybrid drives and specially the drives of urban public transport may be affected by other factors given by transport infrastructure or operational conditions. These factors condition the suitable configuration of the individual elements of hybrid drive and the establishment of good control strategy of such drive. The study of influencing factors of the control strategy is the aim of this paper. (full text)

  15. 78 FR 30828 - Rail Vehicles Access Advisory Committee

    Science.gov (United States)

    2013-05-23

    ... committee to advise us on revising and updating our accessibility guidelines for transportation vehicles... associated with revising and updating our accessibility guidelines issued pursuant to the Americans with... Railroad Corporation National Association of the Deaf National Association of Railroad Passengers National...

  16. Discussing Equity and Social Exclusion in Accessibility Evaluations

    NARCIS (Netherlands)

    Van Wee, G.P.; Geurs, K.T.

    2011-01-01

    Ex ante evaluations of transport policy options (including infrastructure plans) are generally based on cost-benefit analyses (CBA). Accessibility changes are included in such analyses indirectly, via a utilitarian perspective. But accessibility is broader than is assumed by this perspective and

  17. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  18. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  19. The new control system of HLS linac and transport line

    International Nuclear Information System (INIS)

    Liu Gongfa; Li Weimin; Li Jingyi; Li Chuan; Cheng Liping; Bao Xun; Wang Jigang; Xuan Ke

    2005-01-01

    The new linac and transport line control system of Hefei Light Source (HLS) is a distributed control system based on EPICS (Experimental Physics and Industrial Control System). Industrial PC (IPC) is widely used as not only Input/Output Controller (IOC) but also device controller. Besides industrial PC, PLC and microcontroller are also used as device controllers. The software for industrial PC based device controller is developed based on VxWorks real-time operating system. The software for PLC and microcontroller are written with ladder software package and assemble language, respectively. PC with Linux and SUN workstation with Solaris are used as operator interfaces (OPI). High level control is made up of some EPICS tools and Tcl/Tk scripts. (authors)

  20. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  1. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  2. 49 CFR 38.95 - Mobility aid accessibility.

    Science.gov (United States)

    2010-10-01

    ... Transportation Office of the Secretary of Transportation AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY... allowing an occupied platform to fold or retract into the stowed position. (ii) Exception. Where physical... stowed while occupied shall not apply to a lift design of this type if the stowed position is within the...

  3. Wheelchair Users’ Accessibility Problems in Public Transportation-Case of Metro Bus

    Directory of Open Access Journals (Sweden)

    Ayse Nilay Evcil

    2014-06-01

    Full Text Available Every day, in urban areas, the mobility of people and goods forms inner urban transportation. When urban transportation is carried in the form of public transportation, it becomes a public service. The urban public transport is one of the important services for all citizens since it is a public service provision. This service is provided by local government and it has been offered as a service without any distinctions between young, old, children, men, women, disabled, employee or retired or briefly to the society.  Additionally, traffic congestion and the expence of owing and maintaining vehicles increase public transport usage in cities.

  4. Controlling Heat Transport and Flow Structures in Thermal Turbulence Using Ratchet Surfaces

    Science.gov (United States)

    Jiang, Hechuan; Zhu, Xiaojue; Mathai, Varghese; Verzicco, Roberto; Lohse, Detlef; Sun, Chao

    2018-01-01

    In this combined experimental and numerical study on thermally driven turbulence in a rectangular cell, the global heat transport and the coherent flow structures are controlled with an asymmetric ratchetlike roughness on the top and bottom plates. We show that, by means of symmetry breaking due to the presence of the ratchet structures on the conducting plates, the orientation of the large scale circulation roll (LSCR) can be locked to a preferred direction even when the cell is perfectly leveled out. By introducing a small tilt to the system, we show that the LSCR orientation can be tuned and controlled. The two different orientations of LSCR give two quite different heat transport efficiencies, indicating that heat transport is sensitive to the LSCR direction over the asymmetric roughness structure. Through a quantitative analysis of the dynamics of thermal plume emissions and the orientation of the LSCR over the asymmetric structure, we provide a physical explanation for these findings. The current work has important implications for passive and active flow control in engineering, biofluid dynamics, and geophysical flows.

  5. Method for Controlling Space Transportation System Life Cycle Costs

    Science.gov (United States)

    McCleskey, Carey M.; Bartine, David E.

    2006-01-01

    A structured, disciplined methodology is required to control major cost-influencing metrics of space transportation systems during design and continuing through the test and operations phases. This paper proposes controlling key space system design metrics that specifically influence life cycle costs. These are inclusive of flight and ground operations, test, and manufacturing and infrastructure. The proposed technique builds on today's configuration and mass properties control techniques and takes on all the characteristics of a classical control system. While the paper does not lay out a complete math model, key elements of the proposed methodology are explored and explained with both historical and contemporary examples. Finally, the paper encourages modular design approaches and technology investments compatible with the proposed method.

  6. 76 FR 17064 - Shared Use Path Accessibility Guidelines

    Science.gov (United States)

    2011-03-28

    ...] RIN 3014-AA41 Shared Use Path Accessibility Guidelines AGENCY: Architectural and Transportation... (ANPRM) to develop accessibility guidelines for shared use paths. Shared use paths are designed for both... users. The guidelines will include technical provisions for making newly constructed and altered shared...

  7. A Nonlinear Dynamic Inversion Predictor-Based Model Reference Adaptive Controller for a Generic Transport Model

    Science.gov (United States)

    Campbell, Stefan F.; Kaneshige, John T.

    2010-01-01

    Presented here is a Predictor-Based Model Reference Adaptive Control (PMRAC) architecture for a generic transport aircraft. At its core, this architecture features a three-axis, non-linear, dynamic-inversion controller. Command inputs for this baseline controller are provided by pilot roll-rate, pitch-rate, and sideslip commands. This paper will first thoroughly present the baseline controller followed by a description of the PMRAC adaptive augmentation to this control system. Results are presented via a full-scale, nonlinear simulation of NASA s Generic Transport Model (GTM).

  8. Advanced Transport Operating System (ATOPS) control display unit software description

    Science.gov (United States)

    Slominski, Christopher J.; Parks, Mark A.; Debure, Kelly R.; Heaphy, William J.

    1992-01-01

    The software created for the Control Display Units (CDUs), used for the Advanced Transport Operating Systems (ATOPS) project, on the Transport Systems Research Vehicle (TSRV) is described. Module descriptions are presented in a standardized format which contains module purpose, calling sequence, a detailed description, and global references. The global reference section includes subroutines, functions, and common variables referenced by a particular module. The CDUs, one for the pilot and one for the copilot, are used for flight management purposes. Operations performed with the CDU affects the aircraft's guidance, navigation, and display software.

  9. Maritime transport operation in conditions of globalization

    Directory of Open Access Journals (Sweden)

    Tomasz Nowosielski

    2011-06-01

    Full Text Available The contemporary world economy is subject to dynamic integration processes that cause the most open countries in the free import and export goods. Intensive trade relations requires intercontinental free access to well-functioning transport systems. In the case of trade with distant partners, especially on other continents, an important criterion for the organization of cargo handling is a long range. Technological development of means of transport has meant that transport services have become a cheap and highly accessible to passengers and cargo.

  10. Rural women and violence situation: access and accessibility limits to the healthcare network.

    Science.gov (United States)

    Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda

    2017-07-13

    To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.

  11. Internal hydration of a metal-transporting ATPase is controlled by membrane lateral pressure

    Energy Technology Data Exchange (ETDEWEB)

    Fahmy, Karim [Helmholtz-Zentrum Dresden-Rossendorf e.V., Dresden (Germany). Biophysics; Fischermeier, E. [Technische Univ. Dresden (Germany); Pospisil, P. [A.S.C. R., Prague (Czech Republic). J. Heyrovsky Inst. Physical Chemistry; Solioz, M. [Bern Univ. (Switzerland); Sayed, A.; Hof, M.

    2017-07-01

    The active transport of ions across biological mem branes requires their hydration shell to interact with the interior of membrane proteins. However, the influence of the external lipid phase on internal dielectric dynamics is hard to access by experiment. Using the octahelical transmembrane architecture of the copper-transporting P{sub 1B}-type ATPase from Legionella pneumophila (LpCopA) as a model structure, we have established the site-specific labeling of internal cysteines with a polarity-sensitive fluorophore. This enabled dipolar relaxation studies in a solubilized form of the protein and in its lipid-embedded state in nano-discs (NDs). Time-dependent fluorescence shifts revealed the site-specific hydration and dipole mobility around the conserved ion-binding motif. The spatial distribution of both features is shaped significantly and independently of each other by membrane lateral pressure.

  12. Internal hydration of a metal-transporting ATPase is controlled by membrane lateral pressure

    International Nuclear Information System (INIS)

    Fahmy, Karim; Pospisil, P.; Sayed, A.; Hof, M.

    2017-01-01

    The active transport of ions across biological mem branes requires their hydration shell to interact with the interior of membrane proteins. However, the influence of the external lipid phase on internal dielectric dynamics is hard to access by experiment. Using the octahelical transmembrane architecture of the copper-transporting P_1_B-type ATPase from Legionella pneumophila (LpCopA) as a model structure, we have established the site-specific labeling of internal cysteines with a polarity-sensitive fluorophore. This enabled dipolar relaxation studies in a solubilized form of the protein and in its lipid-embedded state in nano-discs (NDs). Time-dependent fluorescence shifts revealed the site-specific hydration and dipole mobility around the conserved ion-binding motif. The spatial distribution of both features is shaped significantly and independently of each other by membrane lateral pressure.

  13. 78 FR 67303 - Americans With Disabilities Act (ADA) Accessibility Guidelines for Buildings and Facilities...

    Science.gov (United States)

    2013-11-12

    ... ARCHITECTURAL AND TRANSPORTATION BARRIERS COMPLIANCE BOARD 36 CFR Part 1191 RIN 3014-AA22 Americans With Disabilities Act (ADA) Accessibility Guidelines for Buildings and Facilities; Architectural Barriers Act (ABA) Accessibility Guidelines; Correction AGENCY: Architectural and Transportation Barriers...

  14. 49 CFR 28.149 - Program accessibility: Discrimination prohibited.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Program accessibility: Discrimination prohibited... § 28.149 Program accessibility: Discrimination prohibited. Except as otherwise provided in § 28.150, no... otherwise be subjected to discrimination under any program or activity conducted by the Department. ...

  15. Population growth, accessibility spillovers and persistent borders: Historical growth in West-European municipalities.

    Science.gov (United States)

    Jacobs-Crisioni, Chris; Koomen, Eric

    2017-06-01

    Lack of cross-border transport supply has repeatedly been blamed for the fact that national borders limit spatial interaction and, consequently, the growth of border regions. This study applies an accessibility approach to investigate for most municipalities in ten countries in mainland West Europe if foreign transport supply is lagging behind, and if population growth in these municipalities has been affected by the limits that national borders have imposed on market access. To do so, data describing historical population changes and road networks between 1961 and 2011 have been used. The results show that in the study area, cross-border transport accessibility was not at a disadvantage in 1961 and has since then grown even more than domestic accessibility. However, municipal population growth has depended almost exclusively on domestic market access. Processes of economic international integration in the study area are found to coincide with the growth of cross-border accessibility, but do not have a clear coincidence with the effects of cross-border accessibility on population growth.

  16. Modulation and Control of Charge Transport Through Single-Molecule Junctions.

    Science.gov (United States)

    Wang, Kun; Xu, Bingqian

    2017-02-01

    The ability to modulate and control charge transport though single-molecule junction devices is crucial to achieving the ultimate goal of molecular electronics: constructing real-world-applicable electronic components from single molecules. This review aims to highlight the progress made in single-molecule electronics, emphasizing the development of molecular junction electronics in recent years. Among many techniques that attempt to wire a molecule to metallic electrodes, the single-molecule break junction (SMBJ) technique is one of the most reliable and tunable experimental platforms for achieving metal-molecule-metal configurations. It also provides great freedom to tune charge transport through the junction. Soon after the SMBJ technique was introduced, it was extensively used to measure the conductances of individual molecules; however, different conductances were obtained for the same molecule, and it proved difficult to interpret this wide distribution of experimental data. This phenomenon was later found to be mainly due to a lack of precise experimental control and advanced data analysis methods. In recent years, researchers have directed considerable effort into advancing the SMBJ technique by gaining a deeper physical understanding of charge transport through single molecules and thus enhancing its potential applicability in functional molecular-scale electronic devices, such as molecular diodes and molecular transistors. In parallel with that research, novel data analysis methods and approaches that enable the discovery of hidden yet important features in the data are being developed. This review discusses various aspects of molecular junction electronics, from the initial goal of molecular electronics, the development of experimental techniques for creating single-molecule junctions and determining single-molecule conductance, to the characterization of functional current-voltage features and the investigation of physical properties other than charge

  17. Vertical Navigation Control Laws and Logic for the Next Generation Air Transportation System

    Science.gov (United States)

    Hueschen, Richard M.; Khong, Thuan H.

    2013-01-01

    A vertical navigation (VNAV) outer-loop control system was developed to capture and track the vertical path segments of energy-efficient trajectories that are being developed for high-density operations in the evolving Next Generation Air Transportation System (NextGen). The VNAV control system has a speed-on-elevator control mode to pitch the aircraft for tracking a calibrated airspeed (CAS) or Mach number profile and a path control mode for tracking the VNAV altitude profile. Mode control logic was developed for engagement of either the speed or path control modes. The control system will level the aircraft to prevent it from flying through a constraint altitude. A stability analysis was performed that showed that the gain and phase margins of the VNAV control system significantly exceeded the design gain and phase margins. The system performance was assessed using a six-deg-of-freedom non-linear transport aircraft simulation and the performance is illustrated with time-history plots of recorded simulation data.

  18. Measures applicable to transportation sector in order to improve their greenhouse gas emission balance

    International Nuclear Information System (INIS)

    Lamure, C.A.

    1991-01-01

    The greenhouse effect gases emitted by transport vehicles are mainly carbon dioxide, methane and nitrogen dioxide; CO 2 emissions from transport vehicles (automobiles, aircraft) are growing and their relative importance is growing even more due to lowering of other CO 2 sources. Greenhouse gases from thermal engines are assessed as a function of engine and fuel types. Several solutions are proposed in order to reduce pollutant emissions: road traffic control (road pricing), automobile restricted utilization (speed, access areas, traffic and parking regulation), consumption regulation, collective transports (buses, mini buses), urban organization for pedestrian and bicycle transport, fuel substitution, life style modification tele-commuting, etc

  19. Comparing the lived experience to objective measures of Accessibility

    OpenAIRE

    Angela Curl; John Nelson; Jillian Anable

    2011-01-01

    This paper presents work undertaken to date as part of PhD research into the process of Accessibility Planning in the UK and how existing objective measures of accessibility relate to individual perceptions or the "lived experience" of accessibility. Since 1997, Accessibility has been framed in the social exclusion context within UK transport planning and policy, focusing on the ability of people to participate fully in society, which is seen as being limited by poor accessibility. This appro...

  20. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.