WorldWideScience

Sample records for access control transportation

  1. Random Access Transport Capacity

    CERN Document Server

    Andrews, Jeffrey G; Kountouris, Marios; Haenggi, Martin

    2009-01-01

    We develop a new metric for quantifying end-to-end throughput in multihop wireless networks, which we term random access transport capacity, since the interference model presumes uncoordinated transmissions. The metric quantifies the average maximum rate of successful end-to-end transmissions, multiplied by the communication distance, and normalized by the network area. We show that a simple upper bound on this quantity is computable in closed-form in terms of key network parameters when the number of retransmissions is not restricted and the hops are assumed to be equally spaced on a line between the source and destination. We also derive the optimum number of hops and optimal per hop success probability and show that our result follows the well-known square root scaling law while providing exact expressions for the preconstants as well. Numerical results demonstrate that the upper bound is accurate for the purpose of determining the optimal hop count and success (or outage) probability.

  2. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  3. Ontology Based Access Control

    Directory of Open Access Journals (Sweden)

    Özgü CAN

    2010-02-01

    Full Text Available As computer technologies become pervasive, the need for access control mechanisms grow. The purpose of an access control is to limit the operations that a computer system user can perform. Thus, access control ensures to prevent an activity which can lead to a security breach. For the success of Semantic Web, that allows machines to share and reuse the information by using formal semantics for machines to communicate with other machines, access control mechanisms are needed. Access control mechanism indicates certain constraints which must be achieved by the user before performing an operation to provide a secure Semantic Web. In this work, unlike traditional access control mechanisms, an "Ontology Based Access Control" mechanism has been developed by using Semantic Web based policies. In this mechanism, ontologies are used to model the access control knowledge and domain knowledge is used to create policy ontologies.

  4. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  5. Access Control Enforcement Testing

    OpenAIRE

    El Kateb, Donia; Elrakaiby, Yehia; Mouelhi, Tejeddine; Le Traon, Yves

    2012-01-01

    A policy-based access control architecture com- prises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision Point (PDP), the module implementing the access decision logic. In applications, PEPs are generally implemented manually, which can introduce errors in policy enforcement and lead to security vulnerabilities. In this paper, we propose an approach to systematically test and validate the co...

  6. ACCESS Pointing Control System

    Science.gov (United States)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  7. Accessibility as indicator in sustainable transport planning

    DEFF Research Database (Denmark)

    Jensen, Anders Vestergaard; Leleur, Steen

    2014-01-01

    applied in a new SUSTAIN Appraisal Framework (SAF) concerns accessibility, and the paper describes and evaluate an accessibility index and methodology POINTER as concerns its relevance for SAF. POINTER is demonstrated on a Danish national transport infrastructure project. Finally conclusion...

  8. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    . Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set......When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... of credentials needed to reach a certain location in a system. This knowledge allows to identify a set of (inside) actors who have the possibility to commit an insider attack at that location. This has immediate applications in analysing log files, but also nontechnical applications such as identifying possible...

  9. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    OpenAIRE

    Desmedt, Yvo; Shaghaghi, Arash

    2016-01-01

    Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the failure of access control. Access control models derived from access control matrix encompass three ...

  10. HSUPA Transport Network Congestion Control

    Directory of Open Access Journals (Sweden)

    Szilveszter Nádas

    2009-01-01

    Full Text Available The introduction of High Speed Uplink Packet Access (HSUPA greatly improves achievable uplink bitrate but it presents new challenges to be solved in the WCDMA radio access network. In the transport network, bandwidth reservation for HSUPA is not efficient and TCP cannot efficiently resolve congestion because of lower layer retransmissions. This paper proposes an HSUPA transport network flow control algorithm that handles congestion situations efficiently and supports Quality of Service differentiation. In the Radio Network Controller (RNC, transport network congestion is detected. Relying on the standardized control frame, the RNC notifies the Node B about transport network congestion. In case of transport network congestion, the Node B part of the HSUPA flow control instructs the air interface scheduler to reduce the bitrate of the flow to eliminate congestion. The performance analysis concentrates on transport network limited scenarios. It is shown that TCP cannot provide efficient congestion control. The proposed algorithm can achieve high end-user perceived throughput, while maintaining low delay, loss, and good fairness in the transport network.

  11. Controlling Access to RDF Graphs

    Science.gov (United States)

    Flouris, Giorgos; Fundulaki, Irini; Michou, Maria; Antoniou, Grigoris

    One of the current barriers towards realizing the huge potential of Future Internet is the protection of sensitive information, i.e., the ability to selectively expose (or hide) information to (from) users depending on their access privileges. Given that RDF has established itself as the de facto standard for data representation over the Web, our work focuses on controlling access to RDF data. We present a high-level access control specification language that allows fine-grained specification of access control permissions (at triple level) and formally define its semantics. We adopt an annotation-based enforcement model, where a user can explicitly associate data items with annotations specifying whether the item is accessible or not. In addition, we discuss the implementation of our framework, propose a set of dimensions that should be considered when defining a benchmark to evaluate the different access control enforcement models and present the results of our experiments conducted on different Semantic Web platforms.

  12. Mechanism for alternating access in neurotransmitter transporters.

    Science.gov (United States)

    Forrest, Lucy R; Zhang, Yuan-Wei; Jacobs, Miriam T; Gesmonde, Joan; Xie, Li; Honig, Barry H; Rudnick, Gary

    2008-07-29

    Crystal structures of LeuT, a bacterial homologue of mammalian neurotransmitter transporters, show a molecule of bound substrate that is essentially exposed to the extracellular space but occluded from the cytoplasm. Thus, there must exist an alternate conformation for LeuT in which the substrate is accessible to the cytoplasm and a corresponding mechanism that switches accessibility from one side of the membrane to the other. Here, we identify the cytoplasmic accessibility pathway of the alternate conformation in a mammalian serotonin transporter (SERT) (a member of the same transporter family as LeuT). We also propose a model for the cytoplasmic-facing state that exploits the internal pseudosymmetry observed in the crystal structure. LeuT contains two structurally similar repeats (TMs1-5 and TMs 6-10) that are inverted with respect to the plane of the membrane. The conformational differences between them result in the formation of the extracellular pathway. Our model for the cytoplasm-facing state exchanges the conformations of the two repeats and thus exposes the substrate and ion-binding sites to the cytoplasm. The conformational change that connects the two states primarily involves the tilting of a 4-helix bundle composed of transmembrane helices 1, 2, 6, and 7. Switching the tilt angle of this bundle is essentially equivalent to switching the conformation of the two repeats. Extensive mutagenesis of SERT and accessibility measurements, using cysteine reagents, are accommodated by our model. These observations may be of relevance to other transporter families, many of which contain internal inverted repeats.

  13. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  14. Transportation constraints to rural health accessibility in Ogun ...

    African Journals Online (AJOL)

    Open Access DOWNLOAD FULL TEXT Subscription or Fee Access. Transportation constraints to rural health accessibility in Ogun Waterside Local Government Area ... Secondary data was also sourced to serve as complement to the primary ...

  15. Accessibility, land use and transport. Accessibility evaluation of land-use and transport developments and policy strategies

    NARCIS (Netherlands)

    Geurs, Karst Teunis

    2006-01-01

    How can accessibility be defined? How useful are different accessibility approaches in evaluating land-use and transport policy strategies? How can the economic benefits associated with accessibility changes be measured? What are the accessibility benefits of having a public transport service availa

  16. 49 CFR 1542.207 - Access control systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  17. Flexible access control for dynamic collaborative environments

    NARCIS (Netherlands)

    Dekker, Mari Antonius Cornelis

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect confident

  18. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  19. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  20. GIS model to evaluate the accessibility to major transport ways

    Directory of Open Access Journals (Sweden)

    Antonio Tache

    2015-03-01

    Full Text Available In order to ensure a balanced accessibility to major transport ways, supporting spatial development and economic growth, a GIS model to assess accessibility it was proposed. The model is measuring the average cost of travel (by car, usually from a point to a predetermined number of destinations measured in units of time (minutes. Using the ARCGIS Spatial Analyst module, accessibility territorial indicators were calculated and presented as cartograms and maps that are outlining the accessibility to major transportation routes and to major cities. The proposed model to assess accessibility was tested for Tulcea county (NUTS III level and for the South East region (NUTS II level.

  1. Transport Accessibility In Light Of The DEA Method

    Directory of Open Access Journals (Sweden)

    Górniak Joanna

    2014-12-01

    Full Text Available The development of transport infrastructure and increasing the efficiency of transport services are major factors of economic growth. The concept of transport accessibility can be analysed in various aspects. This article focuses on the accessibility of freight transport by road and rail, measured with infrastructure equipment. The primary objective of this study is to determine the efficiency of selected European countries in 2000, 2005 and 2010 in terms of transport accessibility for given expenditures and results. The efficiency will be measured with the Data Envelopment Analysis, which assesses the efficiency with which a given economy transforms expenditures into results. The hypothesis assumes the existence of differences between the efficiency in terms of transport accessibility in European countries and a possibility to increase this efficiency by using the experience of countries with a high efficiency level.

  2. Safeguarding Schiphol Airports accessibility for freight transport

    NARCIS (Netherlands)

    van der Heijden, Matthijs C.; van Harten, Aart; Ebben, Mark; Saanen, Y.A.; Valentin, E.C.; Verbraeck, A.

    2001-01-01

    Automated, underground freight transport should enable sustainable economic growth in the Amsterdam area in the Netherlands. An innovative transport system, which guarantees reliable logistics and which avoids congestion problems, is currently being developed. This logistics system will be highly

  3. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  4. Improving access to transport in developing countries

    CSIR Research Space (South Africa)

    Savill, T

    2003-06-01

    Full Text Available Improving access and mobility of people with disabilities is an essential component of the alleviation of poverty in developing countries. Disabled people are among the most socially excluded members of society and poorly designed and inaccessible...

  5. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  6. Private Transport Access Among Older People: Identifying The Disadvantaged

    OpenAIRE

    Nerina Vecchio

    2003-01-01

    Private transport is important in enabling older people living in the community to maintain their independence and social networks. Access to this resource remains a major concern for older people. This study examines the demographic risk factors that restrict older people's access to private transport. The findings lead to policy recommendations directed towards self-reliance. Analysis, based on the study's household survey consisting of a sample of noninstitutionalised older Gold Coast peop...

  7. Accessibility of cysteine residues in a cytoplasmic loop of CitS of Klebsiella pneumoniae is controlled by the catalytic state of the transporter

    NARCIS (Netherlands)

    Sobczak, [No Value; Lolkema, JS; Sobczak, Iwona

    2003-01-01

    The citrate transporter CAS of Klebsiella pneumoniae is a secondary transporter that transports citrate in symport with two sodium ions and one proton. Treatment of CAS with the alkylating, agent N-ethylmaleimide resulted in a complete loss of transport activity. Treatment of mutant proteins in whic

  8. Accessibility of cysteine residues in a cytoplasmic loop of CitS of Klebsiella pneumoniae is controlled by the catalytic state of the transporter

    NARCIS (Netherlands)

    Sobczak, [No Value; Lolkema, JS; Sobczak, Iwona

    2003-01-01

    The citrate transporter CAS of Klebsiella pneumoniae is a secondary transporter that transports citrate in symport with two sodium ions and one proton. Treatment of CAS with the alkylating, agent N-ethylmaleimide resulted in a complete loss of transport activity. Treatment of mutant proteins in whic

  9. Managing Delegation in Access Control Models

    CERN Document Server

    Ghorbel-Talbi, Meriam Ben; Cuppens-Boulahia, Nora; Bouhoula, Adel; 10.1109/ADCOM.2007.105

    2010-01-01

    In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flexible administration model to manage delegation. Unfortunately, to our best knowledge, there is no complete model for describing all delegation requirements for role-based access control. Therefore, proposed models are often extended to consider new delegation characteristics, which is a complex task to manage and necessitate the redefinition of these models. In this paper we describe a new delegation approach for extended role-based access control models. We show that our approach is flexible and is sufficient to manage all delegation requirements.

  10. Operational Control of Internal Transport

    NARCIS (Netherlands)

    J.R. van der Meer (Robert)

    2000-01-01

    textabstractOperational Control of Internal Transport considers the control of guided vehicles in vehicle-based internal transport systems found in facilities such as warehouses, production plants, distribution centers and transshipment terminals. The author's interest of research having direct use

  11. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  12. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  13. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  14. Nanoengineered membranes for controlled transport

    Science.gov (United States)

    Doktycz, Mitchel J [Oak Ridge, TN; Simpson, Michael L [Knoxville, TN; McKnight, Timothy E [Greenback, TN; Melechko, Anatoli V [Oak Ridge, TN; Lowndes, Douglas H [Knoxville, TN; Guillorn, Michael A [Knoxville, TN; Merkulov, Vladimir I [Oak Ridge, TN

    2010-01-05

    A nanoengineered membrane for controlling material transport (e.g., molecular transport) is disclosed. The membrane includes a substrate, a cover definining a material transport channel between the substrate and the cover, and a plurality of fibers positioned in the channel and connected to an extending away from a surface of the substrate. The fibers are aligned perpendicular to the surface of the substrate, and have a width of 100 nanometers or less. The diffusion limits for material transport are controlled by the separation of the fibers. In one embodiment, chemical derivitization of carbon fibers may be undertaken to further affect the diffusion limits or affect selective permeability or facilitated transport. For example, a coating can be applied to at least a portion of the fibers. In another embodiment, individually addressable carbon nanofibers can be integrated with the membrane to provide an electrical driving force for material transport.

  15. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  16. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  17. ANALYSIS OF TRANSPORT ACCESSIBILITY IN RURAL AREAS OF OLSZTYN COUNTY

    Directory of Open Access Journals (Sweden)

    Waldemar Kozłowski

    2012-01-01

    Full Text Available A significant impact on the multifunctional development of rural areas is the so-called transport accessibility. This applies mainly to the capabilities and reach the pace of the in-habitants of the so-called areas peripheral to the main economic centers of the province. The research includes analysis of the availability of transport in quantitative and qualitative as-pects, which was defined for the purposes of research. Quantity and quality of transport in-frastructure, the number of connections, length and travel time to the most important eco-nomic centers were taken into consideration. Analysis of transport availability sets the target application development, which is to determine the key investment priorities for the next programming periods of transport infrastructure development of the Warmia and Mazury province.

  18. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  19. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    ). The research found that the role of users in the design process of manufacturers was limited and that compliance with industry standards was the dominant means to achieving accessibility goals. Design consultancies were willing to apply more user-centred design if the client requested it. Where operators were......Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design for accessibility or inclusive design (ID) in this area. This paper sets out to discover what methods are used in the rail sector to achieve accessibility goals and to examine how far...... these methods deviate from user-centred and ID norms. Semi-structured interviews were conducted with nine rolling stock producers, operators and design consultancies. The purpose was to determine if ID design methods are used explicitly and the extent to which the processes used conformed to ID (if at all...

  20. Miniature Transportable Communications Central (MTCC): answering law enforcement needs for worldwide access to command, control, communications, and intelligence (C3I)

    Science.gov (United States)

    Maxey, W. John

    1997-02-01

    The Mini-Transportable Communications Central (MTCC), developed by Rome Laboratories C3 Directorate, provides the U.S. Coast Guard (USCG) with a transportable, fast reaction communications terminal. The MTCC is capable of operating as a self-contained miniature command center supporting efforts such as the President's War on Drugs, or the rescue services necessary in the wake of man-made or natural disasters. The MTCC is capable of communicating with field elements including ships, small water-craft, aircraft, other elements of the USCG law enforcement agencies (LEAs), the FAA, and a wide range of U.S. and foreign armed forces. The MTCC terminal is contained in a trailer-mounted shelter suitable for towing by a 3/4 ton truck or for transport by C-130 aircraft. The MTCC provides simultaneous one-way and two-way communications in the HF, VHF, and UHF frequency bands, as well as the INMARSAT international satellite band. The MTCC also offers communications through subscriber and trunk telephone connectivity via ISDN compatible PABX. The MTCC's three channel operations personnel cellular telephone system provides self-contained cellular telephone operations in the vicinity of the deployed shelter. In the USCG application, an operator console inside the air-conditioned shelter serves as the source and destination for voice, data, and fax traffic, by means of secure fax telephone, operator headsets, and a powerful computer workstation that provides word processing, e-mail, and data communications capabilities. The communications operator may reconfigure the system for a specific mission by means of patchfields that enable the selection of radios, encrypted or clear-text operations, audio termination, and antennas.

  1. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  2. Cryptographically Enforced Distributed Data Access Control

    NARCIS (Netherlands)

    Ibraimi, L.

    2011-01-01

    Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote server, users lose control over their sensitive data. There are two approaches to control the access to outsourced data. The first approach assumes that the outsourcee is fully trusted. This approach is

  3. A secure solution on hierarchical access control

    CERN Document Server

    Wei, Chuan-Sheng; Huang, Tone-Yau; Ong, Yao Lin

    2011-01-01

    Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some secure leaks on the secure-filter and presented some improvements to eliminate these secure flaws. In this paper, we revise the secure-filter in Jeng-Wang method and propose another secure solutions in hierarchical access control problem. CA is a super security class (user) in our proposed method and the secure-filter of $u_i$ in our solutions is a polynomial of degree $n_i+1$ in $\\mathbb{Z}_p^*$, $f_i(x)=(x-h_i)(x-a_1)...(x-a_{n_i})+L_{l_i}(K_i)$. Although the degree of our secure-filter is larger than others solutions, our solution is secure and efficient in dynamics access control.

  4. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  5. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  6. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  7. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  8. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-03-15

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  9. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  10. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  11. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  12. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  13. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  14. Access control mechanisms for distributed healthcare environments.

    Science.gov (United States)

    Sergl-Pommerening, Marita

    2004-01-01

    Today's IT-infrastructure provides more and more possibilities to share electronic patient data across several healthcare organizations and hospital departments. A strong requirement is sufficient data protection and security measures complying with the medical confidentiality and the data protection laws of each state or country like the European directive on data protection or the U.S. HIPAA privacy rule. In essence, the access control mechanisms and authorization structures of information systems must be able to realize the Need-To-Access principle. This principle can be understood as a set of context-sensitive access rules, regarding the patient's path across the organizations. The access control mechanisms of today's health information systems do not sufficiently satisfy this requirement, because information about participation of persons or organizations is not available within each system in a distributed environment. This problem could be solved by appropriate security services. The CORBA healthcare domain standard contains such a service for obtaining authorization decisions and administrating access decision policies (RAD). At the university hospital of Mainz we have developed an access control system (MACS), which includes the main functionality of the RAD specification and the access control logic that is needed for such a service. The basic design principles of our approach are role-based authorization, user rights with static and dynamic authorization data, context rules and the separation of three cooperating servers that provide up-to-date knowledge about users, roles and responsibilities. This paper introduces the design principles and the system design and critically evaluates the concepts based on practical experience.

  15. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  16. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  17. Accessibility of a Destination-Based Transportation System: A Large Airport Study

    Institute of Scientific and Technical Information of China (English)

    SHI Jing; YING Xiwen

    2008-01-01

    The accessibility of a destination-based transportation system is defined to quantify the perform-ance of transportation systems which access a distinct destination. The access cost is used to reflect the utility of the transportation system including the fatigue and inconvenience in the total cost. The cost is quan-tified by two coefficients which represent the different characteristics of various people. The average cost and the income-relative accessibility are used to describe various aspects of the accessibility and to evaluate the accessibility of a destination-based system. A case study uses data from the Kunming transpor-tation system to evaluate the accessibility of the present city airport. The calibrated coefficients are then used to evaluate the transportation system to the new Kunming international airport. The results show that this transportation accessibility evaluation can be combined with transportation planning to study transporta-tion sub-systems.

  18. Control of optics in random access analysers

    OpenAIRE

    Truchaud, A.

    1988-01-01

    The technology behind random access analysers involves flexible optical systems which can measure absorbances for one reaction at different scheduled times, and for several reactions performed simultaneously at different wavelengths. Optics control involves light sources (continuous and flash mode), indexing of monochromatic filters, injection-moulded plastic cuvettes, optical fibres, and polychromatic analysis.

  19. Role-based access control in retrospect

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Wieringa, Roel

    2012-01-01

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of R

  20. Atom-Role-Based Access Control Model

    Science.gov (United States)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  1. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  2. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  3. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    Directory of Open Access Journals (Sweden)

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  4. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  5. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  6. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  7. Human membrane transporter database: a Web-accessible relational database for drug transport studies and pharmacogenomics.

    Science.gov (United States)

    Yan, Q; Sadée, W

    2000-01-01

    The human genome contains numerous genes that encode membrane transporters and related proteins. For drug discovery, development, and targeting, one needs to know which transporters play a role in drug disposition and effects. Moreover, genetic polymorphisms in human membrane transporters may contribute to interindividual differences in the response to drugs. Pharmacogenetics, and, on a genome-wide basis, pharmacogenomics, address the effect of genetic variants on an individual's response to drugs and xenobiotics. However, our knowledge of the relevant transporters is limited at present. To facilitate the study of drug transporters on a broad scale, including the use of microarray technology, we have constructed a human membrane transporter database (HMTD). Even though it is still largely incomplete, the database contains information on more than 250 human membrane transporters, such as sequence, gene family, structure, function, substrate, tissue distribution, and genetic disorders associated with transporter polymorphisms. Readers are invited to submit additional data. Implemented as a relational database, HMTD supports complex biological queries. Accessible through a Web browser user interface via Common Gateway Interface (CGI) and Java Database Connection (JDBC), HMTD also provides useful links and references, allowing interactive searching and downloading of data. Taking advantage of the features of an electronic journal, this paper serves as an interactive tutorial for using the database, which we expect to develop into a research tool.

  8. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  9. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  10. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  11. 47 CFR 69.123 - Density pricing zones for special access and switched transport.

    Science.gov (United States)

    2010-10-01

    ... switched transport. 69.123 Section 69.123 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... for special access and switched transport. (a)(1) Incumbent local exchange carriers not subject to... at least 15 percent of that carrier's special access and transport revenues within that study...

  12. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  13. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area...

  14. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...

  15. Perceived Accessibility of Public Transport as a Potential Indicator of Social Inclusion

    Directory of Open Access Journals (Sweden)

    Katrin Lättman

    2016-06-01

    Full Text Available Perceived accessibility has been acknowledged as an important aspect of transport policy since the 70s. Nevertheless, very few empirical studies have been conducted in this field. When aiming to improve social inclusion, by making sustainable transport modes accessible to all, it is important to understand the factors driving perceived accessibility. Unlike conventional accessibility measures, perceived accessibility focuses on the perceived possibilities and ease of engaging in preferred activities using different transport modes. We define perceived accessibility in terms of how easy it is to live a satisfactory life with the help of the transport system, which is not necessarily the same thing as the objective standard of the system. According to previous research, perceived accessibility varies with the subjectively-rated quality of the mode of transport. Thus, improvements in quality (e.g. trip planning, comfort, or safety increase the perceived accessibility and make life easier to live using the chosen mode of transport. This study (n=750 focuses on the perceived accessibility of public transport, captured using the Perceived Accessibility Scale PAC (Lättman, Olsson, & Friman, 2015. More specifically, this study aims to determine how level of quality affects the perceived accessibility in public transport. A Conditional Process Model shows that, in addition to quality, feeling safe and frequency of travel are important predictors of perceived accessibility. Furthermore, elderly and those in their thirties report a lower level of perceived accessibility to their day-to-day activities using public transport. The basic premise of this study is that subjective experiences may be as important as objective indicators when planning and designing for socially inclusive transport systems.

  16. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  17. Accessibility of islands: towards a new geography based on transportation modes and choices

    Directory of Open Access Journals (Sweden)

    Sofia Karampela

    2014-11-01

    Full Text Available Accessibility is a multifaceted concept that expresses the case of access between two points in space. For islands, accessibility is a key quality, since isolation and small size considered as inherent characteristics of “islandness”. In this paper, we discuss differences between geographical distance and accessibility potential in the Greek Aegean, combining different transportation modal choice (ferries and airplanes with the use of an accessibility index that incorporates modes and frequency of connection and data of actual usage. The findings indicate that geographical distance is not determining accessibility and new geographies emerge based more on the availability of transport modal choices.

  18. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  19. Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles. Final rule.

    Science.gov (United States)

    2016-12-14

    The Architectural and Transportation Barriers Compliance Board (Access Board or Board) is issuing a final rule that revises its existing accessibility guidelines for non-rail vehicles--namely, buses, over-the-road buses, and vans--acquired or remanufactured by entities covered by the Americans with Disabilities Act. The revised guidelines ensure that such vehicles are readily accessible to, and usable by, individuals with disabilities. The U.S. Department of Transportation (DOT) is required to revise its accessibility standards for transportation vehicles acquired or remanufactured by entities covered by the Americans with Disabilities Act (ADA) to be consistent with the final rule.

  20. Individual public transportation accessibility is positively associated with self-reported active commuting

    Directory of Open Access Journals (Sweden)

    Sune eDjurhuus

    2014-11-01

    Full Text Available Background: Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age and gender. Methods: 28,928 commuters in the Capital Region of Denmark reported self-reported time spent either walking or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multimodal network in a GIS. Multilevel logistic regression was used to analyze the association between accessibility, expressed as access area, and being an active commuter.Results: Public transport accessibility area based on all stops within walking and cycling distance was positively associated with being an active commuter. Distance to work, age and gender modified the associations. Residing within 10 km commuting distance and in areas of high accessibility was associated with being an active commuter and meeting the recommendations of physical activity. For the respondents above 29 years, Individual public transportation accessibility was positively associated with being an active commuter. Women having high accessibility had significantly higher odds of being an active commuter compared to having a low accessibility. For men the associations were insignificant.Conclusions: This study extends the knowledge about the driving forces of using public transportation for commuting by examining the individual public transportation accessibility. Findings suggest that transportation accessibility supports active commuting and planning of improved public transit

  1. Social exclusion and the role of transport intervention in accessing economic opportunity

    OpenAIRE

    2008-01-01

    Social Exclusion and the Role of Transport Intervention in Accessing Economic Opportunity This dissertation is concerned with social exclusion, transport and access to economic opportunities. Its main focus is on transport 'intervention' and whether this provision is able to enhance social inclusion, particularly in terms of tackling worklessness. The leading principle of this research is to capture the "authentic voices" of those people who are the intended beneficiaries of...

  2. Access Control in Decentralised Publish/Subscribe Systems

    Directory of Open Access Journals (Sweden)

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  3. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  4. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  5. Alternating access mechanisms of LeuT-fold transporters: trailblazing towards the promised energy landscapes.

    Science.gov (United States)

    Kazmier, Kelli; Claxton, Derek P; Mchaourab, Hassane S

    2016-12-29

    Secondary active transporters couple the uphill translocation of substrates to electrochemical ion gradients. Transporter conformational motion, generically referred to as alternating access, enables a central ligand binding site to change its orientation relative to the membrane. Here we review themes of alternating access and the transduction of ion gradient energy to power this process in the LeuT-fold class of transporters where crystallographic, computational and spectroscopic approaches have converged to yield detailed models of transport cycles. Specifically, we compare findings for the Na(+)-coupled amino acid transporter LeuT and the Na(+)-coupled hydantoin transporter Mhp1. Although these studies have illuminated multiple aspects of transporter structures and dynamics, a number of questions remain unresolved that so far hinder understanding transport mechanisms in an energy landscape perspective.

  6. Internal transport control in pot plant production

    NARCIS (Netherlands)

    Annevelink, E.

    1999-01-01

    Drawing up internal transport schedules in pot plant production is a very complex task. Scheduling internal transport at the operational level and providing control on a day-to-day or even hour-to-hour basis in particular requires a new approach. A hierarchical planning approach based on

  7. Law-Aware Access Control and its Information Model

    CERN Document Server

    Stieghahn, Michael

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  8. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  9. Privacy Enhanced Access Control by Means of Policy Blinding

    NARCIS (Netherlands)

    Sedghi, Saeed; Hartel, Pieter; Jonker, Willem; Nikova, Svetla; Bao, Feng; Weng, Jian

    2011-01-01

    Traditional techniques of enforcing an access control policy rely on an honest reference monitor to enforce the policy. However, for applications where the resources are sensitive, the access control policy might also be sensitive. As a result, an honest-but-curious reference monitor would glean som

  10. Dynamic User Role Assignment in Remote Access Control

    NARCIS (Netherlands)

    Saffarian, Mohsen; Tang, Qiang; Jonker, Willem; Hartel, Pieter

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  11. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  12. Dynamic User Role Assignment in Remote Access Control

    NARCIS (Netherlands)

    Saffarian, M.; Tang, Qiang; Jonker, Willem; Hartel, Pieter H.

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  13. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  14. ITER Shape Controller and Transport Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Casper, T A; Meyer, W H; Pearlstein, L D; Portone, A

    2007-05-31

    We currently use the CORSICA integrated modeling code for scenario studies for both the DIII-D and ITER experiments. In these simulations, free- or fixed-boundary equilibria are simultaneously converged with thermal evolution determined from transport models providing temperature and current density profiles. Using a combination of fixed boundary evolution followed by free-boundary calculation to determine the separatrix and coil currents. In the free-boundary calculation, we use the state-space controller representation with transport simulations to provide feedback modeling of shape, vertical stability and profile control. In addition to a tightly coupled calculation with simulator and controller imbedded inside CORSICA, we also use a remote procedure call interface to couple the CORSICA non-linear plasma simulations to the controller environments developed within the Mathworks Matlab/Simulink environment. We present transport simulations using full shape and vertical stability control with evolution of the temperature profiles to provide simulations of the ITER controller and plasma response.

  15. A Model of Workflow-oriented Attributed Based Access Control

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2011-02-01

    Full Text Available the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC, and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  16. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  17. Equitable access: Remote and rural communities 'transport needs'

    OpenAIRE

    White, Peter

    2011-01-01

    Transport in rural and remote regions receives considerable attention in research, but this is often focussed on specific means of resolving problems in those regions - for example, the role of demand-responsive bus services, or scope for attracting users to rail services. The aim of this paper is to take a broader view, firstly in defining what constitute rural and remote regions, and secondly in considering a wide range of public transport options available. Experience in Britain will be ta...

  18. The Association between Access to Public Transportation and Self-Reported Active Commuting

    Directory of Open Access Journals (Sweden)

    Sune Djurhuus

    2014-12-01

    Full Text Available Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928. Access to public transportation measures were computed by combining GIS-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number of transport modes were all positively associated with being an active commuter and with meeting recommendations of physical activity. No significant association was found between bus services at the nearest stop and active commuting. The results highlight the importance of including detailed measurements of access to public transit in order to identify the characteristics that facilitate the use of public transportation and active commuting.

  19. The Association between Access to Public Transportation and Self-Reported Active Commuting

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning S; Aadahl, Mette

    2014-01-01

    more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation...... and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928). Access to public transportation measures were computed by combining GIS......-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number...

  20. 25 CFR 170.813 - When can access to IRR transportation facilities be restricted?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false When can access to IRR transportation facilities be restricted? 170.813 Section 170.813 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAND AND WATER INDIAN RESERVATION ROADS PROGRAM BIA Road Maintenance § 170.813 When can access to...

  1. Multi terabits/s optical access transport technologies

    Science.gov (United States)

    Binh, Le Nguyen; Wang Tao, Thomas; Livshits, Daniil; Gubenko, Alexey; Karinou, Fotini; Liu Ning, Gordon; Shkolnik, Alexey

    2016-02-01

    Tremendous efforts have been developed for multi-Tbps over ultra-long distance and metro and access optical networks. With the exponential increase demand on data transmission, storage and serving, especially the 5G wireless access scenarios, the optical Internet networking has evolved to data-center based optical networks pressuring on novel and economical access transmission systems. This paper reports (1) Experimental platforms and transmission techniques employing band-limited optical components operating at 10G for 100G based at 28G baud. Advanced modulation formats such as PAM-4, DMT, duo-binary etc are reported and their advantages and disadvantages are analyzed so as to achieve multi-Tbps optical transmission systems for access inter- and intra- data-centered-based networks; (2) Integrated multi-Tbps combining comb laser sources and micro-ring modulators meeting the required performance for access systems are reported. Ten-sub-carrier quantum dot com lasers are employed in association with wideband optical intensity modulators to demonstrate the feasibility of such sources and integrated micro-ring modulators acting as a combined function of demultiplexing/multiplexing and modulation, hence compactness and economy scale. Under the use of multi-level modulation and direct detection at 56 GBd an aggregate of higher than 2Tbps and even 3Tbps can be achieved by interleaved two comb lasers of 16 sub-carrier lines; (3) Finally the fundamental designs of ultra-compacts flexible filters and switching integrated components based on Si photonics for multi Tera-bps active interconnection are presented. Experimental results on multi-channels transmissions and performances of optical switching matrices and effects on that of data channels are proposed.

  2. Permission to Speak: A Novel Formal Foundation for Access Control

    Science.gov (United States)

    2016-06-21

    Permission to Speak: A Novel Formal Foundation for Access Control Oleg Sokolsky Nikhil Dinesh, Insup Lee, Aravind Joshi Report Documentation Page...comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 04 NOV 2009 2. REPORT TYPE 3...DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Permission to Speak: A Novel Formal Foundation for Access Control 5a. CONTRACT

  3. Comparison of two accessible transport service designs in South Africa

    CSIR Research Space (South Africa)

    Venter, C

    2001-06-01

    Full Text Available The paper provides an evaluation of recent experience in South Africa with two service designs for transport dedicated to disabled users. The designs – a Dial-a-Ride system and a fixed-route, fixed-schedule system operating on the “service route...

  4. Delayed feedback control in quantum transport.

    Science.gov (United States)

    Emary, Clive

    2013-09-28

    Feedback control in quantum transport has been predicted to give rise to several interesting effects, among them quantum state stabilization and the realization of a mesoscopic Maxwell's daemon. These results were derived under the assumption that control operations on the system are affected instantaneously after the measurement of electronic jumps through it. In this contribution, I describe how to include a delay between detection and control operation in the master equation theory of feedback-controlled quantum transport. I investigate the consequences of delay for the state stabilization and Maxwell's daemon schemes. Furthermore, I describe how delay can be used as a tool to probe coherent oscillations of electrons within a transport system and how this formalism can be used to model finite detector bandwidth.

  5. Control And Transport Of Intense Electron Beams

    CERN Document Server

    Li, H

    2004-01-01

    The transport of intense beams for advanced accelerator applications with high-intensity beams such as heavy-ion inertial fusion, spallation neutron sources, and intense light sources requires tight control of beam characteristics over long distances. The University of Maryland Electron Ring (UMER), which uses low energy, high current electron beams to model the transport physics of intense space-charge-dominated beams, employs real-time beam characterization and control in order to optimize beam quality throughout the strong focusing lattice. We describe in this dissertation the main beam control techniques used in UMER, which include optimal beam steering by quadrupole scans, beam rotation correction using a skew corrector, rms envelope matching and optimization, empirical envelope matching, beam injection, and phase space reconstruction using a tomographic method. Using these control techniques, we achieved the design goals for UMER. The procedure is not only indispensable for optimum beam transport over l...

  6. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  7. A new access control system by fingerprint for radioisotope facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  8. Access control management for e-Healthcare in cloud environment

    Directory of Open Access Journals (Sweden)

    Lili Sun

    2014-03-01

    Full Text Available Data outsourcing is a major component for cloud computing that allows data owners to distribute resources to external services for users and organizations who can apply the resources. A crucial problem for owners is how to make sure their sensitive information accessed by legitimate users only using the trusted services but not authorized to read the actual information. With the increased development of cloud computing, it brings challenges for data security and access control when outsourcing users’ data and sharing sensitive data in cloud environment since it is not within the same trusted domain as data owners’. Access control policies have become an important issue in the security filed in cloud computing. Semantic web technologies represent much richer forms of relationships among users, resources and actions among different web applications such as clouding computing. However, Semantic web applications pose new requirements for security mechanisms especially in the access control models. This paper addresses existing access control methods and presents a semantic based access control model which considers semantic relations among different entities in cloud computing environment. We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system. This work shows how the semantic web technology provides efficient solutions for the management of complex and distributed data in heterogeneous systems, and it can be used in the medical information systems as well.

  9. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  10. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  11. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  12. Modeling Access Control Policy of a Social Network

    Directory of Open Access Journals (Sweden)

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  13. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Energy Technology Data Exchange (ETDEWEB)

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  14. Experience with ActiveX control for simple channel access

    Energy Technology Data Exchange (ETDEWEB)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  15. Testing Efficiency Improved by Addition of Remote Access Control Room

    Science.gov (United States)

    1996-01-01

    The NASA Lewis Research Center's Remote Access Control Room (RACR) uses off-the-shelf video conferencing software integrated with existing facility data systems to provide access to the test data by networking from virtually anywhere in the country. The system allows research engineers in remote locations to participate in tests and monitor data in real time just as if they were present in the control room.

  16. Space Transportation Systems Life Cycle Cost Assessment and Control

    Science.gov (United States)

    Robinson, John W.; Rhodes, Russell E.; Zapata, Edgar; Levack, Daniel J. H.; Donahue, Benjaamin B.; Knuth, William

    2008-01-01

    Civil and military applications of space transportation have been pursued for just over 50 years and there has been, and still is, a need for safe, dependable, affordable, and sustainable space transportation systems. Fully expendable and partially reusable space transportation systems have been developed and put in operation that have not adequately achieved this need. Access to space is technically achievable, but presently very expensive and will remain so until there is a breakthrough in the way we do business. Since 1991 the national Space Propulsion Synergy Team (SPST) has reviewed and assessed the lessons learned from the major U.S. space programs of the past decades focusing on what has been learned from the assessment and control of Life Cycle Cost (LCC) from these systems. This paper presents the results of a selected number of studies and analyses that have been conducted by the SPST addressing the need, as well as the solutions, for improvement in LCC. The major emphasis of the SPST processes is on developing the space transportation system requirements first (up front). These requirements must include both the usual system flight performance requirements and also the system functional requirements, including the infrastructure on Earth's surface, in-space and on the Moon and Mars surfaces to determine LCC. This paper describes the development of specific innovative engineering and management approaches and processes. This includes a focus on flight hardware maturity for reliability, ground operations approaches, and business processes between contractor and government organizations. A major change in program/project cost control is being proposed by the SPST to achieve a sustainable space transportation system LCC - controlling cost as a program metric in addition to the existing practice of controlling performance and weight. Without a firm requirement and methodically structured cost control, it is unlikely that an affordable and sustainable space

  17. Hybrid Predictive Control for Dynamic Transport Problems

    CERN Document Server

    Núñez, Alfredo A; Cortés, Cristián E

    2013-01-01

    Hybrid Predictive Control for Dynamic Transport Problems develops methods for the design of predictive control strategies for nonlinear-dynamic hybrid discrete-/continuous-variable systems. The methodology is designed for real-time applications, particularly the study of dynamic transport systems. Operational and service policies are considered, as well as cost reduction. The control structure is based on a sound definition of the key variables and their evolution. A flexible objective function able to capture the predictive behaviour of the system variables is described. Coupled with efficient algorithms, mainly drawn from the area of computational intelligence, this is shown to optimize performance indices for real-time applications. The framework of the proposed predictive control methodology is generic and, being able to solve nonlinear mixed-integer optimization problems dynamically, is readily extendable to other industrial processes. The main topics of this book are: ●hybrid predictive control (HPC) ...

  18. THE ACCESSIBILITY ASSESSMENT OF REGIONAL TRANSPORT NETWORK IN THE SOUTH EAST EUROPE

    Directory of Open Access Journals (Sweden)

    Ana Šimecki

    2013-12-01

    Full Text Available Development of transport infrastructure and establishment of effective transport systems is a prerequisite for the achievement of broad based economic growth which is one of the European and Southeast European major development goals. Due to the lack of intraregional connectivity within the South East Europe (SEE, certain parts of the region have limited access to regional, European and global markets. Mentioned imbalance of accessibility to services, markets and opportunities for further social and economic progress is an obstacle for overall development of the SEE region. The research is thematically oriented on the assessment of road, rail and air passenger transport accessibility in the SEE with the aim of providing scientific overview of current regional transport network connectivity serving as basis for further identification of potential improvement measures. The research is conducted on the SEETO Comprehensive Network that was established as a main output of joint cooperation between seven Regional Participants and the European Commission as a result of signing of the Memorandum of Understanding for the Development of the Core Regional Transport Network (MoU in 2004. The multimodal Core Regional Transport Network defined under the MoU represents a commonly agreed main and ancillary transport infrastructure in the SEE, which is the base for the implementation of transport related investments programmes.

  19. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  20. Comparable Measures of Accessibility to Public Transport Using the General Transit Feed Specification

    Directory of Open Access Journals (Sweden)

    Jinjoo Bok

    2016-03-01

    Full Text Available Public transport plays a critical role in the sustainability of urban settings. The mass mobility and quality of urban lives can be improved by establishing public transport networks that are accessible to pedestrians within a reasonable walking distance. Accessibility to public transport is characterized by the ease with which inhabitants can reach means of transportation such as buses or metros. By measuring the degree of accessibility to public transport networks using a common data format, a comparative study can be conducted between different cities or metropolitan areas with different public transit systems. The General Transit Feed Specification (GTFS by Google Developers allows this by offering a common format based on text files and sharing the data set voluntarily produced and contributed by the public transit agencies of many participating cities around the world. This paper suggests a method to assess and compare public transit accessibility in different urban areas using the GTFS feed and demographic data. To demonstrate the value of the new method, six examples of metropolitan areas and their public transit accessibility are presented and compared.

  1. Impact of traffic composition on accessibility as indicator of transport sustainability

    Science.gov (United States)

    Nahdalina; Hadiwardoyo, S. P.; Nahry

    2017-05-01

    Sustainable transport is closely related to quality of life in the community at present and in the future. Some indicators of transport sustainability are accessibility measurement of origin/destination, the operating costs of transport (vehicle operating cost or VOC) and external transportation costs (emission cost). The indicators could be combined into accessibility measurement model. In other case, almost traffic congestion occurred on the condition of mixed traffic. This paper aimed to analyse the indicator of transport sustainability through simulation under condition of various traffic composition. Various composition of truck to total traffic flow are 0%, 10% and 20%. Speed and V/C are calculated from traffic flow to estimate the VOC and emission cost. 5 VOC components and 3 types of emission cost (CO2, CH4 and N2O) are counted to be a travel cost. Accessibility measurement was calculated using travel cost and gravity model approaches. Result of the research shows that the total traffic flow has indirect impact on accessibility measurement if using travel cost approach. Meanwhile, the composition of traffic flow has an affect on accessibility measurement if using gravity model approach.

  2. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  3. Remote device access in the new accelerator controls middleware

    CERN Document Server

    Baggiolini, V; Jensen, S; Kostro, K; Risso, A; Trofimov, N N; SL

    2001-01-01

    This paper presents the Remote Device Access (RDA) package developed at CERN in the framework of the joint PS/SL Controls Middleware project. The package design reflects the Accelerator Device Model in which devices, named entities in the control system, can be controlled via properties. RDA implements this model in a distributed environment with devices residing in servers that can run anywhere in the controls network. It provides a location-independent and reliable access to the devices from control programs. By invoking the device access methods, clients can read, write and subscribe to device property values. We describe the architecture and design of RDA its API, and CORBA-based implementations in Java and C++. First applications of RDA in the CERN accelerator control systems are described as well.

  4. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  5. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  6. Implementing context and team based access control in healthcare intranets.

    Science.gov (United States)

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users.

  7. A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    Kannan Karthik

    2013-02-01

    Full Text Available Threshold ramp secret sharing schemes are designed so that (i certain subsets of shares have no information about the secret, (ii some subsets have partial information about the secret and (iii some subsets have complete information to recover the secret. However most of the ramp schemes in present literature do not control the leakage of information in partial access sets, due to which the information acquired by these sets is devoid of structure and not useful for fine-grained access control. Through a non-perfect secret sharing scheme called MIX-SPLIT, an encoding methodology for controlling the leakage in partial access sets is proposed and this is used for fine-grained access to binary strings. The ramp code generated using MIX-SPLIT requires a much smaller share size of O(n, as compared to Shamir's ramp adaptation which incurs a share size of atleast O(n2 for the same multi-access structure. The proposed ramp code is finally applied towards the protection and fine-grained access of industrial design drawings.

  8. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  9. Session Types for Access and Information Flow Control

    OpenAIRE

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    2010-01-01

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents leaks due to the specific control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the ...

  10. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Science.gov (United States)

    2012-12-10

    ... Access Electronic Transportation Acquisition (ETA) AGENCY: Department of the Army, DoD. ACTION: Notice.../IMA/ES, 1 Soldier Way, Scott AFB, IL 62225 ATTN: ETA Program Manager. FOR FURTHER INFORMATION CONTACT: ETA Program Manager at sddc.safb.etapmo@us.army.mil . Technical questions should be addressed to...

  11. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...

  12. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Rotger, Gabriel Pons; Sick Nielsen, Thomas

    2015-01-01

    and Metro system due to the construction of a new terminal Metro station connecting southern townships to the city centre of Copenhagen. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...

  13. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...

  14. 77 FR 56590 - Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles

    Science.gov (United States)

    2012-09-13

    ... American Public Transportation Association (APTA) annual meeting in Seattle, WA from 2:15 p.m. to 5:30 p.m..., including those who are not registered to attend the APTA annual meeting. The Access Board is interested...

  15. Prehospital intraosseus access with the bone injection gun by a helicopter-transported emergency medical team.

    NARCIS (Netherlands)

    Gerritse, B.M.; Scheffer, G.J.; Draaisma, J.M.T.

    2009-01-01

    BACKGROUND: To evaluate the use of the bone injection gun to obtain vascular access in the prehospital setting by an Helicopter-Transported Emergency Medical Team. METHODS: Prospective descriptive study to assess the frequency and success rate of the use of the bone injection gun in prehospital care

  16. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  17. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  18. Privacy Preservation in Role-based Access Control Model

    Directory of Open Access Journals (Sweden)

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  19. SAFETY AND QUALITY CONTROL OF TRANSPORT SERVICES ON RAILWAY TRANSPORT

    Directory of Open Access Journals (Sweden)

    I. P. Sadlovska

    2010-10-01

    Full Text Available The article presents the provisions to improve procedure of licensing of passenger and freight transportation, technical specifications for services related to the passenger and freight transportations.

  20. Electronic Wallet and Access Control Solution Based on RFID MiFare Cards

    Directory of Open Access Journals (Sweden)

    Stefan Victor Lefter

    2013-03-01

    Full Text Available With the advent of Radio Frequency Identification technologies or RFID for short, different types of products and security-relevant applications have been developed for use in fields and businesses like: inventory management, product tracking, access control, passports or transport fare collection. Even though RFID has been around for quite some time, there are some types of businesses like theme parks, water parks or music festivals that haven’t yet tested the benefits that this technology brings. This paper focuses on presenting advantages and disadvantages of using an unified access control and electronic wallet system based on RFID cards like MiFare tags as an alternative to existing ticket/currency access and payment systems employed by the majority of the businesses mentioned above.

  1. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    Science.gov (United States)

    2013-09-16

    the capability to perform NCIC checks to vet contractor employees, and not all Navy installations nave the ability to access NCIC, NCACS is not...Management Corp 10,017 REA to contract N40085-06-D-1260 Goodwill Industries 199,148 Overhead charge to contract N00189-09- C-Z003 DynCorp international

  2. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  3. Review of Access Control Models for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  4. Individual public transportation accessibility is positively associated with self-reported active commuting

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette;

    2014-01-01

    BACKGROUND: Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between...... individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age, and gender. METHODS: Twenty-eight thousand nine hundred twenty-eight commuters in The Capital Region of Denmark reported self-reported time spent either walking...... or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multi-modal network in a GIS. Multilevel logistic regression was used...

  5. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  6. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  7. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  8. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  9. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  10. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  11. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  12. Compulsory licensing, price controls, and access to patented foreign products

    OpenAIRE

    Eric Bond; Kamal Saggi

    2012-01-01

    Motivated by existing multilateral rules regarding intellectual property, we develop a North-South model to highlight the dual roles price controls and compulsory licensing play in determining Southern access to a patented Northern product. The Northern patent-holder chooses whether and how to work its patent in the South (either via entry or voluntarily licensing) while the South determines the price control and whether to issue a compulsory license. The threat of compulsory licensing benefi...

  13. Modemless Multiple Access Communications over Powerlines for DC Microgrid Control

    OpenAIRE

    Angjelichinoski, Marko; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    We present a communication solution tailored specifically for DC microgrids (MGs) that exploits: (i) the communication potential residing in power electronic converters interfacing distributed generators to powerlines and (ii) the multiple access nature of the communication channel presented by powerlines. The communication is achieved by modulating the parameters of the primary control loop implemented by the converters, fostering execution of the upper layer control applications. We present...

  14. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  15. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  16. Flight Controller Design of Transport Airdrop

    Institute of Scientific and Technical Information of China (English)

    CHEN Jie; SHIZhongke

    2011-01-01

    During airdrop of heavy load,the flight paramctcrs vary continuously as the load moves in the hold,and change suddenly when the load drops out.This process deteriorates the flight quality and control characteristic as the load becomes heavier.Based on the simplified airdrop flight equations,the backstepping and switch control methods are developed to tackle the flight state holding and disturbance/uncertainty(such as large scale flight condition,pilot manipulation error,system measure delay,etc.)attenuation problem in this paper.Moreover,these methods can be used as a reference for pilot manipulating during airdrop.With the backstepping theory,an adaptive controller is synthesized for the purpose of stabilizing the transport when the load moves in the hold,and then a coordinated switch control method is used to control the aircraft when the condition jumps from the existence of load at the rear of fuselage to no load in the fuselage.Simulation results show that the proposed controllers not only provide effective state holding during airdrop,but also achieve robust performance within wide flight conditions.

  17. Distributed reservation control protocols for random access broadcasting channels

    Science.gov (United States)

    Greene, E. P.; Ephremides, A.

    1981-05-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  18. Quantum control without access to the controlling interaction

    CERN Document Server

    Janzing, D; Zeier, R; Beth, T; Janzing, Dominik; Armknecht, Frederik; Zeier, Robert; Beth, Thomas

    2001-01-01

    In our model a fixed Hamiltonian acts on the joint Hilbert space of a quantum system and its controller. We show under which conditions measurements, state preparations, and unitary implementations on the system can be performed by quantum operations on the controller only. It turns out that a measurement of the observable A and an implementation of the one-parameter group exp(iAr) can be performed by almost the same sequence of control operations. Furthermore measurement procedures for A+B, for (AB+BA), and for i[A,B] can be constructed from measurements of A and B. This shows that the algebraic structure of the set of observables can be explained by the Lie group structure of the unitary evolutions on the joint Hilbert space of the measuring device and the measured system. A spin chain model with nearest neighborhood coupling shows that the border line between controller and system can be shifted consistently.

  19. Application of Attribute Based Access Control Model for Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Erkan Yalcinkaya

    2017-02-01

    Full Text Available The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.

  20. A formal model for access control with supporting spatial context

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hong; HE YePing; SHI ZhiGuo

    2007-01-01

    There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented,and the role is assigned a logical location domain to specify the spatial boundary.Roles are activated based on the current physical position of the user which obtained from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, constrained SC-RBAC allows express various spatial separations of duty constraints,location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 invariants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.

  1. Accessibility modeling and evaluation: the TIGRIS XL land-use and transport interaction model for the Netherlands

    NARCIS (Netherlands)

    Zondag, B.; de Bok, M.; Geurs, Karst Teunis; Molenwijk, E.

    2015-01-01

    In current practice, transportation planning often ignores the effects of major transportation improvements on land use and the distribution of land use activities, which might affect the accessibility impacts and economic efficiency of the transportation investment strategies. In this paper, we

  2. Accessible Transportation, Geographic Elevation, and Masticatory Ability Among Elderly Residents of a Rural Area

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Hamano

    2015-06-01

    Full Text Available Given that public transportation networks are often worse in rural areas than in urban areas, rural residents who do not drive can find it difficult to access health-promoting goods, services, and resources related to masticatory ability. Moreover, geographical location, assessed by elevation, could modify this association. The aim of this study was to test whether the association between access to transportation and masticatory ability varied by elevation. Data were collected from a cross-sectional study conducted in Mizuho and Iwami counties, Japan. Objective masticatory ability was evaluated using a test gummy jelly and elevation was estimated by the geographic information systems according to the participant’s address. After excluding subjects with missing data, 672 subjects (Mizuho = 401 and Iwami = 271 were analyzed. After adjustment for potential confounders, being a driver was not significantly associated with masticatory ability among elderly people living at low elevation (≤313 m in Mizuho county. However, after the same adjustment, being a driver remained significantly associated with increased masticatory ability among elderly at high elevations. Similar findings were observed in Iwami county. Accessible transportation was significantly associated with increased mastication ability in elderly people living at high elevations, but not in those living at low elevations.

  3. Access Control Design and Implementations in the ATLAS Experiment

    CERN Document Server

    Leahu, M C; Avolio, G

    2008-01-01

    The ATLAS experiment operates with a significant number of hardware and software resources. Their protection against misuse is an essential task to ensure a safe and optimal operation. To achieve this goal, the Role Based Access Control (RBAC) model has been chosen for its scalability, flexibility, ease of administration and usability from the lowest operating system level to the highest software application level. This paper presents the overall design of RBAC implementation in the ATLAS experiment and the enforcement solutions in different areas such as the system administration, control room desktops and the data acquisition software. The users and the roles are centrally managed using a directory service based on Lightweight Directory Access Protocol which is kept in synchronization with the human resources and IT datab

  4. Secure Communication and Access Control for Mobile Web Service Provisioning

    CERN Document Server

    Srirama, Satish Narayana

    2010-01-01

    It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welcoming, the ability to provide secure and reliable communication in the vulnerable and volatile mobile ad-hoc topologies is vastly becoming necessary. The paper mainly addresses the details and issues in providing secured communication and access control for the mobile web service provisioning domain. While the basic message-level security can be provided, providing proper access control mechanisms for the Mobile Host still poses a great challenge. This paper discusses details of secure communication and proposes the distributed semantics-based authorization mechanism.

  5. An approach to access control in electronic health record.

    Science.gov (United States)

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  6. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  7. OJADEAC: An Ontology Based Access Control Model for JADE Platform

    Directory of Open Access Journals (Sweden)

    Ban Sharief Mustafa

    2014-06-01

    Full Text Available Java Agent Development Framework (JADE is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA specifications. JADE propose new infrastructure solutions to support the development of useful and convenient distributed applications. Security is one of the most important issues in implementing and deploying such applications. JADE-S security add-ons are one of the most popular security solutions in JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give authorities to perform an action based on a set of permission objects attached to every authenticated user. This service has several drawbacks when implemented in a scalable distributed context aware applications. In this paper, an ontology-based access control model called (OJADEAC is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome the shortcoming of this service. The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules. OJADEAC model is distributed, intelligent, dynamic, context-aware and use reasoning engine to infer access decisions based on ontology knowledge.

  8. A study of multiple access schemes in satellite control network

    Science.gov (United States)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  9. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Directory of Open Access Journals (Sweden)

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  10. Access Control Model for Sharing Composite Electronic Health Records

    Science.gov (United States)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  11. Transcriptional control of hepatocanalicular transporter gene expression

    NARCIS (Netherlands)

    Muller, M

    2000-01-01

    Transport processes for larger organic solutes at the canalicular membrane are mainly driven by members of the superfamily of ATP-binding cassette (ABC) transporters. The funct ions of these transporters range from bile component secretion to xenobiotica and phase II-conjugate export. The transcript

  12. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...... delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented...

  13. Structural basis of the alternating-access mechanism in a bile acid transporter

    Science.gov (United States)

    Zhou, Xiaoming; Levin, Elena J.; Pan, Yaping; McCoy, Jason G.; Sharma, Ruchika; Kloss, Brian; Bruni, Renato; Quick, Matthias; Zhou, Ming

    2014-01-01

    Bile acids are synthesized from cholesterol in hepatocytes and secreted through the biliary tract into the small intestine, where they aid in absorption of lipids and fat-soluble vitamins. Through a process known as enterohepatic recirculation, more than 90% of secreted bile acids are then retrieved from the intestine and returned to the liver for resecretion. In humans, there are two Na+-dependent bile acid transporters involved in enterohepatic recirculation, the Na+-taurocholate co-transporting polypeptide (NTCP; also known as SLC10A1) expressed in hepatocytes, and the apical sodium-dependent bile acid transporter (ASBT; also known as SLC10A2) expressed on enterocytes in the terminal ileum. In recent years, ASBT has attracted much interest as a potential drug target for treatment of hypercholesterolaemia, because inhibition of ASBT reduces reabsorption of bile acids, thus increasing bile acid synthesis and consequently cholesterol consumption. However, a lack of three-dimensional structures of bile acid transporters hampers our ability to understand the molecular mechanisms of substrate selectivity and transport, and to interpret the wealth of existing functional data. The crystal structure of an ASBT homologue from Neisseria meningitidis (ASBTNM) in detergent was reported recently, showing the protein in an inward-open conformation bound to two Na+ and a taurocholic acid. However, the structural changes that bring bile acid and Na+ across the membrane are difficult to infer from a single structure. To understand the structural changes associated with the coupled transport of Na+ and bile acids, here we solved two structures of an ASBT homologue from Yersinia frederiksenii (ASBTYf) in a lipid environment, which reveal that a large rigid-body rotation of a substrate-binding domain gives the conserved `crossover' region, where two discontinuous helices cross each other, alternating accessibility from either side of the cell membrane. This result has implications

  14. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  15. An Access Control Model of Virtual Machine Security

    Directory of Open Access Journals (Sweden)

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  16. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  17. Efficient identity management and access control in cloud environment

    Science.gov (United States)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  18. O Impacto do Sistema de Transporte sobre o Espaço Urbano e seu Controle

    Directory of Open Access Journals (Sweden)

    Andreina Nigriello

    1992-12-01

    Full Text Available The control of the impact caused by improvements made in the transportation system on urban areas presumes the recognition of the interaction between soil utilization and occupation and access thereto. Said interaction and its effects can be found in statistical studies concerned with the impact caused by São Paulo subway North-South line on urban areas, and the purpose thereof is to: develop a greater sense of social equity in the distribution of indirect benefits associated with public investments in the transportation sector; create new financing sources for said sector; and reduce the withdrawal of poor people from areas directly served by improved transportation system

  19. Intelligent Urban Public Transportation for Accessibility Dedicated to People with Disabilities

    Directory of Open Access Journals (Sweden)

    Jian Li

    2012-08-01

    Full Text Available The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB passengers. In this paper, based on advanced information & communication technologies (ICT and green technologies (GT concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line ‘2’ in the city of Clermont-Ferrand (France. The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor.

  20. Towards convergence of wireless and wireline signal transport in broadband access networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Prince, Kamau; Tafur Monroy, Idelfonso

    2010-01-01

    Hybrid optical wireless access networks are to play an important role in the realization of the vision of delivery of broadband services to the end-user any time, anywhere and at affordable costs. We present results of experiments conducted over a field deployed optical fibre links we successfull...... demonstrated converged wireless and wireline signal transport over a common fibre infrastructure. The type of signal used in this field deployed experiments cover WiMax, Impulse-radio ultra-wideband (UWB) and coherent transmission of baseband QPSK and radio-over-fibre signals....

  1. Advent of Biometric Sensors in Field of Access Control

    Directory of Open Access Journals (Sweden)

    Ali Anas

    2015-09-01

    Full Text Available Biometrics is the science of measuring and analyzing biological data. It is used to uniquely identify individuals by their physical characteristics or personal behavior traits.The results from scrutiny of various themes including unimodal, multimodal, physiological, behavioural bio-metrics. Bio-metrics, Physiological and behavioural are compared in the review. The article addresses a particular aspect of utilizing biometrics for authentication, identification and access control. The use of systems like fingerprint, face recognition, hand geometry, Palm print, DNA analysis, iris recognition, retina and odour/scent will be dealt with herewith. This study deals with various applications of this technology, like surveillance, employee identification, device access etc with mentions respective of hardware used. The influence of such features is yet to be documented properly, but it is safe to say that it has been a huge step towards better information security and identification control.Over the course of this text, we will try to bring to light our analysis of the subject and provide an in-depth examination of contemporary and futuristic technologies pertaining to this field.

  2. Polar auxin transport: controlling where and how much

    Science.gov (United States)

    Muday, G. K.; DeLong, A.; Brown, C. S. (Principal Investigator)

    2001-01-01

    Auxin is transported through plant tissues, moving from cell to cell in a unique polar manner. Polar auxin transport controls important growth and developmental processes in higher plants. Recent studies have identified several proteins that mediate polar auxin transport and have shown that some of these proteins are asymmetrically localized, paving the way for studies of the mechanisms that regulate auxin transport. New data indicate that reversible protein phosphorylation can control the amount of auxin transport, whereas protein secretion through Golgi-derived vesicles and interactions with the actin cytoskeleton might regulate the localization of auxin efflux complexes.

  3. Effects of improved access to transportation on emergency obstetric care outcomes in Uganda.

    Science.gov (United States)

    Mucunguzi, Stephen; Wamani, Henry; Lochoro, Peter; Tylleskar, Thorkild

    2014-09-01

    Reduction in maternal mortality has not been appreciable in most low-income countries. Improved access to transport for mothers is one way to improve maternal health. This study evaluated a free-of-charge 24-hour ambulance and communication services intervention in Oyam district using 'Caesarean section rate' (CSR) and compared with the neighbouring non-intervention district. Ecological data were collected retrospectively from maternity/theatre registers in October 2010 for 3 years pre and 3 years intervention period. The average CSR in the intervention district increased from 0.57% before the intervention to 1.21% (p = 0.022) during the intervention, while there was no change in the neighbouring district (0.51% to 0.58%, p = 0.512). Hospital deliveries increased by over 50% per year with a slight reduction in the average hospital stillbirths per 1000 hospital births in the intervention district (46.6 to 37.5, p = 0.253). Reliable communication and transport services increased access to and utilization of maternal health services, particularly caesarean delivery services.

  4. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Directory of Open Access Journals (Sweden)

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  5. The use of modern information technology in research on transport accessibility

    Directory of Open Access Journals (Sweden)

    Bartosz BARTOSIEWICZ

    2015-09-01

    Full Text Available Transport accessibility can be analyzed using a number of different methods. The problem with each of them is the difficulty of obtaining data to measure this phenomenon The focus of this article and its main goal are to present methods and tools for gathering data on road traffic; thanks to modern information technology, it is possible to collect real data without the need for large-scale and highly capital-intensive measurements. The application of modern information technology (IT presented in the article, such as computer programs and applications like Google Maps Traffic Overlay and TomTom Live Traffic, enable research to be conducted on a scale that has thus far been unattainable, and allows information to be collected on such criteria as traffic volume, flow, average traffic speed, and actual journey time. Such innovative means of gathering data on automobile traffic open up new perspectives for assessing transport accessibility in terms of automobile traffic by providing high-quality data that meet the requirements for use in primary research.

  6. Stochastic Controls on Nitrate Transport and Cycling

    Science.gov (United States)

    Botter, G.; Settin, T.; Alessi Celegon, E.; Marani, M.; Rinaldo, A.

    2005-12-01

    In this paper, the impact of nutrient inputs on basin-scale nitrates losses is investigated in a probabilistic framework by means of a continuous, geomorphologically based, Montecarlo approach, which explicitly tackles the random character of the processes controlling nitrates generation, transformation and transport in river basins. This is obtained by coupling the stochastic generation of climatic and rainfall series with simplified hydrologic and biogeochemical models operating at the hillslope scale. Special attention is devoted to the spatial and temporal variability of nitrogen sources of agricultural origin and to the effect of temporally distributed rainfall fields on the ensuing nitrates leaching. The influence of random climatic variables on bio-geochemical processes affecting the nitrogen cycle in the soil-water system (e.g. plant uptake, nitrification and denitrification, mineralization), is also considered. The approach developed has been applied to a catchment located in North-Eastern Italy and is used to provide probabilistic estimates of the NO_3 load transferred downstream, which is received and accumulated in the Venice lagoon. We found that the nitrogen load introduced by fertilizations significantly affects the pdf of the nitrates content in the soil moisture, leading to prolonged risks of increased nitrates leaching from soil. The model allowed the estimation of the impact of different practices on the probabilistic structure of the basin-scale hydrologic and chemical response. As a result, the return period of the water volumes and of the nitrates loads released into the Venice lagoon has been linked directly to the ongoing climatic, pluviometric and agricultural regimes, with relevant implications for environmental planning activities aimed at achieving sustainable management practices.

  7. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-08-16

    ... Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  8. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  9. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...... three key properties of EH-WSNs: adaptability of energy consumption, distributed energy-aware load balancing and support for different application-specific requirements....

  10. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    OpenAIRE

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  11. Safety systems and access control in the National Ignition Facility.

    Science.gov (United States)

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design.

  12. Perceptions of transport corridors and intermodal transport - as ways to control the space of freight transport flows

    DEFF Research Database (Denmark)

    Hansen, Leif Gjesing

    2009-01-01

    ). The traditional role of forwarding firms as freight integrators is being challenged by other actors within the transport system, e.g. ferry and shipping lines, ports and train operators. The rationale for this development has been the increased focus by the transport sectors stakeholders on the control of guiding...... transport flows through specific transport networks of own interest. Most transport firms are mobile in their activities by nature, but are in reality confined in their day-to-day operations to different forms of relative fixed network structure - e.g. railway lines, ferry routes and ports, cost....... In this study stakeholders from Danish and Norwegian ports, ferry operators, train operators, forwarding and road haulage firms has been interviewed in order to analyse how logistical decision-making affect the organisational and physical configuration of intermodal transport solutions in the transport corridor...

  13. Controlling fast transport of cold trapped ions

    CERN Document Server

    Walther, Andreas; Ruster, Thomas; Dawkins, Sam T; Ott, Konstantin; Hettrich, Max; Singer, Kilian; Schmidt-Kaler, Ferdinand; Poschinger, Ulrich

    2012-01-01

    We realize fast transport of ions in a segmented micro-structured Paul trap. The ion is shuttled over a distance of more than 10^4 times its groundstate wavefunction size during only 5 motional cycles of the trap (280 micro meter in 3.6 micro seconds). Starting from a ground-state-cooled ion, we find an optimized transport such that the energy increase is as low as 0.10 $\\pm$ 0.01 motional quanta. In addition, we demonstrate that quantum information stored in a spin-motion entangled state is preserved throughout the transport. Shuttling operations are concatenated, as a proof-of-principle for the shuttling-based architecture to scalable ion trap quantum computing.

  14. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    Science.gov (United States)

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment.

  15. Control of machine functions or transport systems

    Energy Technology Data Exchange (ETDEWEB)

    Woodley, M.D.; Lee, M.J.; Jaeger, J.; King, A.S.

    1983-01-01

    A computer code, COMFORT, has been developed at SLAC for on-line calculation of the strengths of magnetic elements in an electron storage ring or transport beam line, subject to first order fitting constraints on the ring or beam line parameters. This code can also be used off-line as an interactive lattice or beam line design tool.

  16. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ...: RTCA Special Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation... 224, Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access...

  17. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-02-18

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Access Control Systems (Update to DO-230B): Agenda March 10, 2011 Welcome/Introductions/Administrative... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access...

  18. Suction catheter for enhanced control and accuracy of transseptal access.

    Science.gov (United States)

    Sulkin, Matthew S; Berwick, Zachary C; Hermiller, James B; Navia, Jose A; Kassab, Ghassan S

    2016-12-20

    Percutaneous structural heart therapies, such as mitral value repair, require site-specific transseptal access (TSA). This can be challenging for interventional cardiologists. We describe a TSA catheter (TSAC) that utilises suction for enhanced control and puncture accuracy. Here, we aim to evaluate the safety and efficacy of the device. Ex vivo interatrial septum preparations were dissected from swine (n=8) and diseased human hearts (n=6) to quantify TSAC suction and needle puncture force. TSAC suction was 6.5-fold greater than the opposing needle puncture force, and thus provides sufficient stabilisation for punctures. The safety and efficacy of TSAC was evaluated in a chronic mitral regurgitation swine model (n=10) and compared to a conventional TSA device. MR was induced by disrupting one to three mitral chordae tendineae, and the progression of heart disease was followed for three weeks. During device testing, procedure time and fluoroscopy exposure were not statistically different between devices. TSAC reduced septal displacement from 8.7±0.30 mm to 3.60±0.19 mm (p<0.05) and improved puncture accuracy 1.75-fold. TSAC provides controlled TSA and improves puncture accuracy, while maintaining procedure time and workflow. These findings provide a strong rationale for a first-in-man study to demonstrate the clinical utility of the device.

  19. Sociospatial distribution of access to facilities for moderate and vigorous intensity physical activity in Scotland by different modes of transport

    Directory of Open Access Journals (Sweden)

    Lamb Karen E

    2012-07-01

    Full Text Available Abstract Background People living in neighbourhoods of lower socioeconomic status have been shown to have higher rates of obesity and a lower likelihood of meeting physical activity recommendations than their more affluent counterparts. This study examines the sociospatial distribution of access to facilities for moderate or vigorous intensity physical activity in Scotland and whether such access differs by the mode of transport available and by Urban Rural Classification. Methods A database of all fixed physical activity facilities was obtained from the national agency for sport in Scotland. Facilities were categorised into light, moderate and vigorous intensity activity groupings before being mapped. Transport networks were created to assess the number of each type of facility accessible from the population weighted centroid of each small area in Scotland on foot, by bicycle, by car and by bus. Multilevel modelling was used to investigate the distribution of the number of accessible facilities by small area deprivation within urban, small town and rural areas separately, adjusting for population size and local authority. Results Prior to adjustment for Urban Rural Classification and local authority, the median number of accessible facilities for moderate or vigorous intensity activity increased with increasing deprivation from the most affluent or second most affluent quintile to the most deprived for all modes of transport. However, after adjustment, the modelling results suggest that those in more affluent areas have significantly higher access to moderate and vigorous intensity facilities by car than those living in more deprived areas. Conclusions The sociospatial distributions of access to facilities for both moderate intensity and vigorous intensity physical activity were similar. However, the results suggest that those living in the most affluent neighbourhoods have poorer access to facilities of either type that can be reached on foot

  20. Brownian Ratchets: Transport Controlled by Thermal Noise

    Science.gov (United States)

    Kula, J.; Czernik, T.; Łuczka, J.

    1998-02-01

    We analyze directed transport of overdamped Brownian particles in a 1D spatially periodic potential that are subjected to both zero-mean thermal equilibrium Nyquist noise and zero-mean exponentially correlated dichotomous fluctuations. We show that particles can reverse the direction of average motion upon a variation of noise parameters if two fundamental symmetries, namely, the reflection symmetry of the spatial periodic structure, and the statistical symmetry of dichotomous fluctuations, are broken. There is a critical thermal noise intensity Dc, or equivalently a critical temperature Tc, at which the mean velocity of particles is zero. Below Tc and above Tc particles move in opposite directions. At fixed temperature, there is a region of noise parameters in which particles of different linear size are transported in opposite directions.

  1. Controlled Electronic Transport through Branched Molecular Conductors

    OpenAIRE

    2008-01-01

    Abstract The conductance through a branched conductor placed between two electrodes is analyzed using the Landauer transport formulation within the framework of the single electron, and the tight binding approximations. Terminal side chains are expressed as self energy terms which map the branched conductor onto an effective linear chain Hamiltonian. The effect of uniform side branches on resonant zero-bias conductance is shown to be analytically solvable and particularly simple, w...

  2. Intelligent Transportation Control based on Proactive Complex Event Processing

    Directory of Open Access Journals (Sweden)

    Wang Yongheng

    2016-01-01

    Full Text Available Complex Event Processing (CEP has become the key part of Internet of Things (IoT. Proactive CEP can predict future system states and execute some actions to avoid unwanted states which brings new hope to intelligent transportation control. In this paper, we propose a proactive CEP architecture and method for intelligent transportation control. Based on basic CEP technology and predictive analytic technology, a networked distributed Markov decision processes model with predicting states is proposed as sequential decision model. A Q-learning method is proposed for this model. The experimental evaluations show that this method works well when used to control congestion in in intelligent transportation systems.

  3. Supporting a Design Driven Approach to Social Inclusion and Accessibility in Transport

    Directory of Open Access Journals (Sweden)

    Russell Marshall

    2016-06-01

    Full Text Available This paper presents research into the area of public transport and accessibility, addressing the support of practitioners in achieving socially inclusive solutions to the mobility issues of diverse populations. For decades, social policy has been underpinned by a stereotyping of populations into simplified sub groups: old, young, disabled, etc. and thus solutions often fail to properly address the richness of human variability. These shortcomings are often ‘managed’ through the ability for people to adapt, however, this is not a sustainable way in which to build a socially inclusive transport infrastructure. A software design tool called HADRIAN is presented. This tool provides a means to evaluate designs for their physical inclusiveness through the use of a virtual user group. This virtual user group is the embodiment of over 100 people that can be used to assess an existing or proposed design and to gain an understanding of what may be done to improve its accommodation. A case study exploring the use of the tool is described together with work in exploring the correlation of the individuals within the HADRIAN system with data on the UK population as a whole and how the inclusion or exclusion of individuals with specific characteristics can be used to inform a more representative view of the inclusiveness of a design.

  4. Data Access, Ownership, and Control: Toward Empirical Studies of Access Practices.

    Science.gov (United States)

    Hilgartner, Stephen; Brandt-Rauf, Sherry I.

    1994-01-01

    Examines how the new sociology of science can approach data access issues. A perspective is developed based on an analysis of the process of scientific production, data streams, and intellectual policy issues. (Contains 55 references.) (JLB)

  5. Band-selective ballistic energy transport in alkane oligomers: toward controlling the transport speed.

    Science.gov (United States)

    Yue, Yuankai; Qasim, Layla N; Kurnosov, Arkady A; Rubtsova, Natalia I; Mackin, Robert T; Zhang, Hong; Zhang, Boyu; Zhou, Xiao; Jayawickramarajah, Janarthanan; Burin, Alexander L; Rubtsov, Igor V

    2015-05-28

    Intramolecular transport of vibrational energy in two series of oligomers featuring alkane chains of various length was studied by relaxation-assisted two-dimensional infrared spectroscopy. The transport was initiated by exciting various end-group modes (tags) such as different modes of the azido (ν(N≡N) and ν(N═N)), carboxylic acid (ν(C═O)), and succinimide ester (νas(C═O)) with short mid-IR laser pulses. It is shown that the transport via alkane chains is ballistic and the transport speed is dependent on the type of the tag mode that initiates the transport. The transport speed of 8.0 Å/ps was observed when initiated by either ν(C═O) or νas(C═O). When initiated by ν(N≡N) and ν(N═N), the transport speed of 14.4 ± 2 and 11 ± 4 Å/ps was observed. Analysis of the vibrational relaxation channels of different tags, combined with the results for the group velocity evaluation, permits identification of the chain bands predominantly contributing to the transport for different cases of the transport initiation. For the transport initiated by ν(N≡N) the CH2 twisting and wagging chain bands were identified as the major energy transport channels. For the transport initiated by ν(C═O), the C-C stretching and CH2 rocking chain bands served as major energy transporters. The transport initiated by ν(N═N) results in direct formation of the wave packet within the CH2 twisting and wagging chain bands. These developments can aid in designing molecular systems featuring faster and more controllable energy transport in molecules.

  6. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  7. Accessibility of general practitioners and selected specialist physicians by car and by public transport in a rural region of Germany

    OpenAIRE

    Stentzel, Ulrike; Piegsa, Jens; Fredrich, Daniel; Hoffmann, Wolfgang; van den Berg, Neeltje

    2016-01-01

    Background The accessibility of medical care facilities in sparsely populated rural regions is relevant especially for elderly people which often represent a large segment of the population in such regions. Elderly people have higher morbidity risks and a higher demand for medical care. Although travelling with private cars is the dominating traffic mode in rural regions, accessibility by public transport is increasingly important especially because of limited mobility of elderly people. The ...

  8. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  9. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    Science.gov (United States)

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  10. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  11. Principles of Eliminating Access Control Lists within a Domain

    Directory of Open Access Journals (Sweden)

    Vic Grout

    2012-04-01

    Full Text Available The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy.

  12. REDUCTION IN PROBABILITY OF TRAFFIC CONGESTION ON HIGH-CLASS ROAD USING RAMP ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    R. Yu. Lagerev

    2016-01-01

    Full Text Available Мerging traffic junctions on high-class roads are considered as bottlenecks in the network and quality of their operation determines a probability for formation of traffic congestions. Investigations on congestion situations in the merging zones of ramp and freeway traffic flows have demonstrated that queuing ramp traffic flow leads to formation of so called “turbulence” effect due to re-arrangement of transport facilities and reduction in their speed on main road direction. Having high queuing traffic flow on main road the “turbulence” component can result in formation of an impact blow in the main traffic flow. It has been proved that an impact of the ramp traffic flow on congestion probability is higher in comparison with main road traffic flow. The paper makes it possible to establish that some transport facilities moving along a high-way simul taneously occupy two lanes in the merging traffic zones and they reduce capacity of the used road section. It is necessary to take into account this specific feature and it is necessary to pay attention to it in the zones of “turbulence” effect formation. The paper presents main approaches, methodology, principles and stages required for access control of high-class roads which are directed on higher quality of their operation including improvement of road traffic safety. The paper proposes a methodоlogy that allows to evaluate and optimize ramp control in the context of a transport queue length minimization at adjoining ramps for the purposes of probability reduction in transport congestion.

  13. Factors controlling large-wood transport in a mountain river

    Science.gov (United States)

    Ruiz-Villanueva, Virginia; Wyżga, Bartłomiej; Zawiejska, Joanna; Hajdukiewicz, Maciej; Stoffel, Markus

    2016-11-01

    As with bedload transport, wood transport in rivers is governed by several factors such as flow regime, geomorphic configuration of the channel and floodplain, or wood size and shape. Because large-wood tends to be transported during floods, safety and logistical constraints make field measurements difficult. As a result, direct observation and measurements of the conditions of wood transport are scarce. This lack of direct observations and the complexity of the processes involved in wood transport may result in an incomplete understanding of wood transport processes. Numerical modelling provides an alternative approach to addressing some of the unknowns in the dynamics of large-wood in rivers. The aim of this study is to improve the understanding of controls governing wood transport in mountain rivers, combining numerical modelling and direct field observations. By defining different scenarios, we illustrate relationships between the rate of wood transport and discharge, wood size, and river morphology. We test these relationships for a wide, multithread reach and a narrower, partially channelized single-thread reach of the Czarny Dunajec River in the Polish Carpathians. Results indicate that a wide range of quantitative information about wood transport can be obtained from a combination of numerical modelling and field observations and from document contrasting patterns of wood transport in single- and multithread river reaches. On the one hand, log diameter seems to have a greater importance for wood transport in the multithread channel because of shallower flow, lower flow velocity, and lower stream power. Hydrodynamic conditions in the single-thread channel allow transport of large-wood pieces, whereas in the multithread reach, logs with diameters similar to water depth are not being moved. On the other hand, log length also exerts strong control on wood transport, more so in the single-thread than in the multithread reach. In any case, wood transport strongly

  14. Impact of Transport Layer Protocols on Reliable Information Access in Smart Grids

    DEFF Research Database (Denmark)

    Shahid, Kamal; Saeed, Aamir; Kristensen, Thomas le Fevre

    2017-01-01

    Time is critical for certain types of dynamic information (e.g. frequency control) in a smart grid scenario. The usefulness of such information depends upon the arrival within a specific frame of time, which in other case may not serve the purpose and effect controller’s performance......-to-end delays at the cost of unreliable, best-effort data transportation service. The research question raised in this paper is thus, which is preferred for the delay-critical applications of smart grids, and to what degree of packet losses and round trip times, TCP is preferable to UDP and vice versa...... of events at grid assets as well as the information update strategy in one single metric which otherwise is not very intuitive and difficult to allow a similar useful comparison. Further, the analysis is concluded by providing a clear guide on the selection of the transport protocol to meet application...

  15. Synthesis from Design Requirements of a Hybrid System for Transport Aircraft Longitudinal Control. Volume 2

    Science.gov (United States)

    Hynes, Charles S.; Hardy, Gordon H.; Sherry, Lance

    2007-01-01

    Volume I of this report presents a new method for synthesizing hybrid systems directly from desi gn requirements, and applies the method to design of a hybrid system for longitudinal control of transport aircraft. The resulting system satisfies general requirement for safety and effectiveness specified a priori, enabling formal validation to be achieved. Volume II contains seven appendices intended to make the report accessible to readers with backgrounds in human factors, flight dynamics and control, and formal logic. Major design goals are (1) system design integrity based on proof of correctness at the design level, (2) significant simplification and cost reduction in system development and certification, and (3) improved operational efficiency, with significant alleviation of human-factors problems encountered by pilots in current transport aircraft. This report provides for the first time a firm technical basis for criteria governing design and certification of avionic systems for transport aircraft. It should be of primary interest to designers of next-generation avionic systems.

  16. Optogenetic control of organelle transport and positioning

    NARCIS (Netherlands)

    van Bergeijk, Petra; Adrian, Max; Hoogenraad, Casper C; Kapitein, Lukas C

    2015-01-01

    Proper positioning of organelles by cytoskeleton-based motor proteins underlies cellular events such as signalling, polarization and growth. For many organelles, however, the precise connection between position and function has remained unclear, because strategies to control intracellular organelle

  17. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  18. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  19. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  20. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access... Prescriptions § 1311.125 Requirements for establishing logical access control—Individual practitioner. (a) At... his two-factor authentication credential to satisfy the logical access controls. The second...

  1. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  2. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-09-26

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  3. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-07-01

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held July 15, 2011, from 10 a.m. to 1 p.m....

  4. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-01-21

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held February 8, 2011, from 10 a.m. to 5...

  5. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-11-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held December 9, 2010, from 10 a.m. to 5...

  6. Wi-Fi Networks Security and Accessing Control

    Directory of Open Access Journals (Sweden)

    Tarek S. Sobh

    2013-06-01

    Full Text Available As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

  7. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  8. Rebuilding women's livelihoods strategies at the city fringe: agency, spatial practices, and access to transportation from Semmencherry, Chennai

    NARCIS (Netherlands)

    Alberts, A.; Pfeffer, K.; Baud, I.

    2016-01-01

    Existing debates suggest that resettlement leads to exclusion of the urban poor from the city, linked to interrupted livelihoods and lack of accessibility to the city. This paper analyses the ways in which public transport mobility plays a role in the livelihood strategies of women living in a reset

  9. Optimal traffic control in highway transportation networks using linear programming

    KAUST Repository

    Li, Yanning

    2014-06-01

    This article presents a framework for the optimal control of boundary flows on transportation networks. The state of the system is modeled by a first order scalar conservation law (Lighthill-Whitham-Richards PDE). Based on an equivalent formulation of the Hamilton-Jacobi PDE, the problem of controlling the state of the system on a network link in a finite horizon can be posed as a Linear Program. Assuming all intersections in the network are controllable, we show that the optimization approach can be extended to an arbitrary transportation network, preserving linear constraints. Unlike previously investigated transportation network control schemes, this framework leverages the intrinsic properties of the Halmilton-Jacobi equation, and does not require any discretization or boolean variables on the link. Hence this framework is very computational efficient and provides the globally optimal solution. The feasibility of this framework is illustrated by an on-ramp metering control example.

  10. Role-based access control through on-demand classification of electronic health record.

    Science.gov (United States)

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority.

  11. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  12. The Model and Control Methods of Access to Information and Technology Resources of Automated Control Systems in Water Supply Industry

    Science.gov (United States)

    Rytov, M. Yu; Spichyack, S. A.; Fedorov, V. P.; Petreshin, D. I.

    2017-01-01

    The paper describes a formalized control model of access to information and technological resources of automated control systems at water supply enterprises. The given model considers the availability of various communication links with information systems and technological equipment. There are also studied control methods of access to information and technological resources of automated control systems at water supply enterprises. On the basis of the formalized control model and appropriate methods there was developed a software-hardware complex for rapid access to information and technological resources of automated control systems, which contains an administrator’s automated workplace and ultimate users.

  13. Integrated transportation and energy sector CO2 emission control strategies

    DEFF Research Database (Denmark)

    Lund, Henrik; Münster, Ebbe

    2006-01-01

    due to the high share of fluctuating renewable energy produced in the country. In the future, such issue will apply to other countries who plan to use a high share of renewable energy. In short, the energy sector can help the transport sector to replace oil by renewable energy and combined heat......This paper analyses the mutual benefits of integrating strategies for future energy and transport CO2 emissions control. The paper illustrates and quantifies the mutual benefits of integrating the transport and the energy sector in the case of Denmark. Today this issue is very relevant in Denmark...... and power production (CHP), while the transport sector can assist the energy system in integrating a higher degree of intermittent energy and CHP. Two scenarios for partial conversion of the transport fleet have been considered. One is battery cars combined with hydrogen fuel cell cars, while the other...

  14. Review of modeling and control during transport airdrop process

    Directory of Open Access Journals (Sweden)

    Bin Xu

    2016-12-01

    Full Text Available This article presents the review of modeling and control during the airdrop process of transport aircraft. According to the airdrop height, technology can be classified into high and low altitude airdrop and in this article, the research is reviewed based on the two scenarios. While high altitude airdrop is mainly focusing on the precise landing control of cargo, the low altitude flight airdrop is on the control of transport aircraft dynamics to ensure flight safety. The history of high precision airdrop system is introduced first, and then the modeling and control problem of the ultra low altitude airdrop in transport aircraft is presented. Finally, the potential problems and future direction of low altitude airdrop are discussed.

  15. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  16. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  17. An effective access control approach to support mobility in IPv6 networks

    Science.gov (United States)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  18. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...

  19. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  20. The control of purity and stoichiometry of compound semiconductors by high vapor pressure transport

    Science.gov (United States)

    Bachmann, Klaus J.; Ito, Kazufumi; Scroggs, Jeffery S.; Tran, Hien T.

    1995-01-01

    In this report we summarize the results of a three year research program on high pressure vapor transport (HPVT) of compound semiconductors. Most of our work focused onto pnictides, in particular ZnGeP2, as a model system. Access to single crystals of well controlled composition of this material is desired for advancing the understanding and control of its point defect chemistry in the contest of remote, real-time sensing of trace impurities, e.g., greenhouse gases, in the atmosphere by ZnGeP2 optical parametric oscillators (OPO's).

  1. Adiabatic control of atomic dressed states for transport and sensing

    Science.gov (United States)

    Cooper, N. R.; Rey, A. M.

    2015-08-01

    We describe forms of adiabatic transport that arise for dressed-state atoms in optical lattices. Focusing on the limit of weak tunnel-coupling between nearest-neighbor lattice sites, we explain how adiabatic variation of optical dressing allows control of atomic motion between lattice sites: allowing adiabatic particle transport in a direction that depends on the internal state, and force measurements via spectroscopic preparation and readout. For uniformly filled bands these systems display topologically quantized particle transport. An implementation of the dressing scheme using optical transitions in alkaline-earth atoms is discussed as well as its favorable features for precise force sensing.

  2. Terahertz field control of interlayer transport modes in cuprate superconductors

    Science.gov (United States)

    Schlawin, Frank; Dietrich, Anastasia S. D.; Kiffner, Martin; Cavalleri, Andrea; Jaksch, Dieter

    2017-08-01

    We theoretically show that terahertz pulses with controlled amplitude and frequency can be used to switch between stable transport modes in layered superconductors, modeled as stacks of Josephson junctions. We find pulse shapes that deterministically switch the transport mode between superconducting, resistive, and solitonic states. We develop a simple model that explains the switching mechanism as a destabilization of the center-of-mass excitation of the Josephson phase, made possible by the highly nonlinear nature of the light-matter coupling.

  3. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  4. Open access, readership, citations: a randomized controlled trial of scientific journal publishing.

    Science.gov (United States)

    Davis, Philip M

    2011-07-01

    Does free access to journal articles result in greater diffusion of scientific knowledge? Using a randomized controlled trial of open access publishing, involving 36 participating journals in the sciences, social sciences, and humanities, we report on the effects of free access on article downloads and citations. Articles placed in the open access condition (n=712) received significantly more downloads and reached a broader audience within the first year, yet were cited no more frequently, nor earlier, than subscription-access control articles (n=2533) within 3 yr. These results may be explained by social stratification, a process that concentrates scientific authors at a small number of elite research universities with excellent access to the scientific literature. The real beneficiaries of open access publishing may not be the research community but communities of practice that consume, but rarely contribute to, the corpus of literature.

  5. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  6. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  7. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... circumvention of copyright protection systems for access control technologies which was published July 27, 2010... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final...

  8. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-10-06

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): November 2, 2010 Welcome/Introductions/Administrative Remarks Agenda... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access...

  9. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-03-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda April 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access...

  10. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-12-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda January 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access...

  11. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, Mohsen; Sadighi, Babak

    2010-01-01

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based admin

  12. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  13. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  14. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover...

  15. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    the explicitly stated ones due to the hierarchical relations between the attributes of different entities. We implement a prototype of the proposed mechanism and demonstrate that the access control policies using our approach may be specified via eXtensible Access Control Markup Language (XACML)....

  16. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    XACML (eXtensible Access Control Markup Language) is a prominent access control language that is widely adopted both in industry and academia. XACML is an international standard in the field of information security. The problem with XACML is that its specification is described in natural language...

  17. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  18. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  19. Supermarket access, transport mode and BMI: the potential for urban design and planning policy across socio-economic areas.

    Science.gov (United States)

    Murphy, Maureen; Koohsari, Mohammad Javad; Badland, Hannah; Giles-Corti, Billie

    2017-09-07

    To investigate dietary intake, BMI and supermarket access at varying geographic scales and transport modes across areas of socio-economic disadvantage, and to evaluate the implementation of an urban planning policy that provides guidance on spatial access to supermarkets. Cross-sectional study used generalised estimating equations to investigate associations between supermarket density and proximity, vegetable and fruit intake and BMI at five geographic scales representing distances people travel to purchase food by varying transport modes. A stratified analysis by area-level disadvantage was conducted to detect optimal distances to supermarkets across socio-economic areas. Spatial distribution of supermarket and transport access was analysed using a geographic information system. Melbourne, Australia. Adults (n 3128) from twelve local government areas (LGA) across Melbourne. Supermarket access was protective of BMI for participants in high disadvantaged areas within 800 m (P=0·040) and 1000 m (P=0·032) road network buffers around the household but not for participants in less disadvantaged areas. In urban growth area LGA, only 26 % of dwellings were within 1 km of a supermarket, far less than 80-90 % of dwellings suggested in the local urban planning policy. Low public transport access compounded disadvantage. Rapid urbanisation is a global health challenge linked to increases in dietary risk factors and BMI. Our findings highlight the importance of identifying the most appropriate geographic scale to inform urban planning policy for optimal health outcomes across socio-economic strata. Urban planning policy implementation in disadvantaged areas within cities has potential for reducing health inequities.

  20. RF kicker cavity to increase control in common transport lines

    Science.gov (United States)

    Douglas, David R.; Ament, Lucas J. P.

    2017-04-18

    A method of controlling e-beam transport where electron bunches with different characteristics travel through the same beam pipe. An RF kicker cavity is added at the beginning of the common transport pipe or at various locations along the common transport path to achieve independent control of different bunch types. RF energy is applied by the kicker cavity kicks some portion of the electron bunches, separating the bunches in phase space to allow independent control via optics, or separating bunches into different beam pipes. The RF kicker cavity is operated at a specific frequency to enable kicking of different types of bunches in different directions. The phase of the cavity is set such that the selected type of bunch passes through the cavity when the RF field is at a node, leaving that type of bunch unaffected. Beam optics may be added downstream of the kicker cavity to cause a further separation in phase space.

  1. A dynamic access control method based on QoS requirement

    Science.gov (United States)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  2. The Study of Access Control for Service-Oriented Computing in Internet of Things

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2012-06-01

    Full Text Available In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC, and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  3. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  4. Structural controls on anomalous transport in fractured porous rock

    Science.gov (United States)

    Edery, Yaniv; Geiger, Sebastian; Berkowitz, Brian

    2016-07-01

    Anomalous transport is ubiquitous in a wide range of disordered systems, notably in fractured porous formations. We quantitatively identify the structural controls on anomalous tracer transport in a model of a real fractured geological formation that was mapped in an outcrop. The transport, determined by a continuum scale mathematical model, is characterized by breakthrough curves (BTCs) that document anomalous (or "non-Fickian") transport, which is accounted for by a power law distribution of local transition times ψ>(t>) within the framework of a continuous time random walk (CTRW). We show that the determination of ψ>(t>) is related to fractures aligned approximately with the macroscopic direction of flow. We establish the dominant role of fracture alignment and assess the statistics of these fractures by determining a concentration-visitation weighted residence time histogram. We then convert the histogram to a probability density function (pdf) that coincides with the CTRW ψ>(t>) and hence anomalous transport. We show that the permeability of the geological formation hosting the fracture network has a limited effect on the anomalous nature of the transport; rather, it is the fractures transverse to the flow direction that play the major role in forming the long BTC tail associated with anomalous transport. This is a remarkable result, given the complexity of the flow field statistics as captured by concentration transitions.

  5. Secure Remote Access Issues in a Control Center Environment

    Science.gov (United States)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  6. Controls Over the Contractor Common Access Card Life Cycle

    Science.gov (United States)

    2008-10-10

    Identification System SES Senior Executive Service SPOC Service Point of Contact TASM Trusted Agent Security Manager USD (AT&L) Under...the final report by October 31, 2008. 53 Finding D. Oversight of Common Access Card Sponsors DoD CVS Service Points of Contact ( SPOCs ...authorization to approve contractor CACs. Organization of CAC Application Sites Each Service agency has an SPOC who is responsible for coordinating with

  7. Evolutionary Games for Multiple Access Control: From Egoism to Altruism

    OpenAIRE

    Gaiech, Houssem; El-Azouzi, Rachid; Haddad, Majed; Altman, Eitan; Mabrouki, Issam

    2014-01-01

    International audience; This paper studies multiple access games within a large population of mobiles decomposed into several groups. Mobiles interfere with each other through many local interactions. We assume that each mobile (or player) cooperates with its group by taking into account the performance of its group. We parameterize the degree of cooperation which allows to cover the fully non-cooperative behavior, the fully cooperative behavior, and even more, the fully altruistic behavior, ...

  8. Direct product quality control for energy efficient climate controlled transport of agro-material

    NARCIS (Netherlands)

    Verdijck, G.J.C.; Preisig, H.A.; Straten, van G.

    2005-01-01

    A (model-based) Product Quality Controller is presented for climate controlled operations involving agro-material, such as storage and transport. This controller belongs to the class of Model Predictive Controllers and fits in a previously developed hierarchical control structure. The new Product

  9. Sensitized nucleus accumbens dopamine terminal responses to methylphenidate and dopamine transporter releasers after intermittent-access self-administration.

    Science.gov (United States)

    Calipari, Erin S; Jones, Sara R

    2014-07-01

    Long-access methylphenidate (MPH) self-administration has been shown to produce enhanced amphetamine potency at the dopamine transporter and concomitant changes in reinforcing efficacy, suggesting that MPH abuse may change the dopamine system in a way that promotes future drug abuse. While long-access self-administration paradigms have translational validity for cocaine, it may not be as relevant a model of MPH abuse, as it has been suggested that people often take MPH intermittently. Although previous work outlined the neurochemical and behavioral consequences of long-access MPH self-administration, it was not clear whether intermittent access (6 h session; 5 min access/30 min) would result in similar changes. For cocaine, long-access self-administration resulted in tolerance to cocaine's effects on dopamine and behavior while intermittent-access resulted in sensitization. Here we assessed the neurochemical consequences of intermittent-access MPH self-administration on dopamine terminal function. We found increased maximal rates of uptake, increased stimulated release, and subsensitive D2-like autoreceptors. Consistent with previous work using extended-access MPH paradigms, the potencies of amphetamine and MPH, but not cocaine, were increased, demonstrating that unlike cocaine, MPH effects were not altered by the pattern of intake. Although the potency results suggest that MPH may share properties with releasers, dopamine release was increased following acute application of MPH, similar to cocaine, and in contrast to the release decreasing effects of amphetamine. Taken together, these data demonstrate that MPH exhibits properties of both blockers and releasers, and that the compensatory changes produced by MPH self-administration may increase the abuse liability of amphetamines, independent of the pattern of administration.

  10. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    CERN Document Server

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  11. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf......Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC......), are not sufficient to address the new challenges introduced by these location-based applications. Several recent research efforts have enhanced RBAC with spatio-temporal features. Nevertheless, the state-of-the-art does not deal with mobility of both subjects and objects and does not support the utilization...... of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...

  12. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  13. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  14. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    CERN Document Server

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  15. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  16. Controlled Spin Transport in Planar Systems Through Topological Exciton

    CERN Document Server

    Abhinav, Kumar

    2015-01-01

    It is shown that a charge-neutral spin-1 exciton, possibly realizable only in planar systems like graphene and topological insulators, can be effectively used for controlled spin transport in such media. The effect of quantum and thermal fluctuations yield a parametric excitation threshold for its realization. This planar exciton differs from the conventional ones, as it owes its existence to the topological Chern-Simons (CS) term. The parity and time-reversal violating CS term can arise from quantum effects in systems with parity-breaking mass-gap. The spinning exciton naturally couples to magnetic field, leading to the possibility of controlled spin transport. Being neutral, it is immune to a host of effect, which afflicts spin transport through charged fermions.

  17. Output feedback control of heat transport mechanisms in parabolic distributed solar collectors

    KAUST Repository

    Elmetennani, Shahrazed

    2016-08-05

    This paper presents an output feedback control for distributed parabolic solar collectors. The controller aims at forcing the outlet temperature to track a desired reference in order to manage the produced heat despite the external disturbances. The proposed control strategy is derived using the distributed physical model of the system to avoid the loss of information due to model approximation schemes. The system dynamics are driven to follow reference dynamics defined by a transport equation with a constant velocity, which allows to control the transient behavior and the response time of the closed loop. The designed controller depends only on the accessible measured variables which makes it easy for real time implementation and useful for industrial plants. Simulation results show the efficiency of the reference tracking closed loop under different working conditions.

  18. Adaptive fuzzy-neural-network control for maglev transportation system.

    Science.gov (United States)

    Wai, Rong-Jong; Lee, Jeng-Dao

    2008-01-01

    A magnetic-levitation (maglev) transportation system including levitation and propulsion control is a subject of considerable scientific interest because of highly nonlinear and unstable behaviors. In this paper, the dynamic model of a maglev transportation system including levitated electromagnets and a propulsive linear induction motor (LIM) based on the concepts of mechanical geometry and motion dynamics is developed first. Then, a model-based sliding-mode control (SMC) strategy is introduced. In order to alleviate chattering phenomena caused by the inappropriate selection of uncertainty bound, a simple bound estimation algorithm is embedded in the SMC strategy to form an adaptive sliding-mode control (ASMC) scheme. However, this estimation algorithm is always a positive value so that tracking errors introduced by any uncertainty will cause the estimated bound increase even to infinity with time. Therefore, it further designs an adaptive fuzzy-neural-network control (AFNNC) scheme by imitating the SMC strategy for the maglev transportation system. In the model-free AFNNC, online learning algorithms are designed to cope with the problem of chattering phenomena caused by the sign action in SMC design, and to ensure the stability of the controlled system without the requirement of auxiliary compensated controllers despite the existence of uncertainties. The outputs of the AFNNC scheme can be directly supplied to the electromagnets and LIM without complicated control transformations for relaxing strict constrains in conventional model-based control methodologies. The effectiveness of the proposed control schemes for the maglev transportation system is verified by numerical simulations, and the superiority of the AFNNC scheme is indicated in comparison with the SMC and ASMC strategies.

  19. An adaptive robust controller for time delay maglev transportation systems

    Science.gov (United States)

    Milani, Reza Hamidi; Zarabadipour, Hassan; Shahnazi, Reza

    2012-12-01

    For engineering systems, uncertainties and time delays are two important issues that must be considered in control design. Uncertainties are often encountered in various dynamical systems due to modeling errors, measurement noises, linearization and approximations. Time delays have always been among the most difficult problems encountered in process control. In practical applications of feedback control, time delay arises frequently and can severely degrade closed-loop system performance and in some cases, drives the system to instability. Therefore, stability analysis and controller synthesis for uncertain nonlinear time-delay systems are important both in theory and in practice and many analytical techniques have been developed using delay-dependent Lyapunov function. In the past decade the magnetic and levitation (maglev) transportation system as a new system with high functionality has been the focus of numerous studies. However, maglev transportation systems are highly nonlinear and thus designing controller for those are challenging. The main topic of this paper is to design an adaptive robust controller for maglev transportation systems with time-delay, parametric uncertainties and external disturbances. In this paper, an adaptive robust control (ARC) is designed for this purpose. It should be noted that the adaptive gain is derived from Lyapunov-Krasovskii synthesis method, therefore asymptotic stability is guaranteed.

  20. Wheelchair Users’ Accessibility Problems in Public Transportation-Case of Metro Bus

    Directory of Open Access Journals (Sweden)

    Ayse Nilay Evcil

    2014-06-01

    Full Text Available Every day, in urban areas, the mobility of people and goods forms inner urban transportation. When urban transportation is carried in the form of public transportation, it becomes a public service. The urban public transport is one of the important services for all citizens since it is a public service provision. This service is provided by local government and it has been offered as a service without any distinctions between young, old, children, men, women, disabled, employee or retired or briefly to the society.  Additionally, traffic congestion and the expence of owing and maintaining vehicles increase public transport usage in cities.

  1. Dynamic one-way traffic control in automated transportation systems

    NARCIS (Netherlands)

    Ebben, M; van der Zee, DJ

    2004-01-01

    In a project on underground freight transportation using Automated Guided Vehicles, single lanes for traffic in two directions are constructed to reduce infrastructure investment. Intelligent control rules are required to manage vehicle flows such, that collision is avoided and waiting times are min

  2. The new control system of HLS linac and transport line

    Institute of Scientific and Technical Information of China (English)

    LIU Gong-Fa; LI Wei-Min; LI Jing-Yi; LI Chuan; CHEN Li-Ping; BAO Xun; WANG Ji-Gang; XUAN Ke

    2005-01-01

    The new linac and transport line control system of Hefei Light Source (HLS) is a distributed control system based on EPICS (Experimental Physics and Industrial Control System). Industrial PC (IPC) is widely used as not only Input/Output Controller (IOC) but also device controller. Besides industrial PC, PLC and microcontroller are also used as device controllers. The software for industrial PC based device controller is developed based on VxWorks real-time operating system. The software for PLC and microcontroller are written with ladder software package and assemble language, respectively. PC with Linux and SUN workstation with Solaris are used as operator interfaces (OPI). High level control is made up of some EPICS tools and Tcl/Tk scripts.

  3. Is air transport of stroke patients faster than ground transport? A prospective controlled observational study.

    Science.gov (United States)

    Hesselfeldt, Rasmus; Gyllenborg, Jesper; Steinmetz, Jacob; Do, Hien Quoc; Hejselbæk, Julie; Rasmussen, Lars S

    2014-04-01

    Helicopters are widely used for interhospital transfers of stroke patients, but the benefit is sparsely documented. We hypothesised that helicopter transport would reduce system delay to thrombolytic treatment at the regional stroke centre. In this prospective controlled observational study, we included patients referred to a stroke centre if their ground transport time exceeded 30 min, or they were transported by a secondarily dispatched, physician-staffed helicopter. The primary endpoint was time from telephone contact to triaging neurologist to arrival in the stroke centre. Secondary endpoints included modified Rankin Scale at 3 months, 30-day and 1-year mortality. A total of 330 patients were included; 265 with ground transport and 65 with helicopter, of which 87 (33%) and 22 (34%), received thrombolysis, respectively (p=0.88). Time from contact to triaging neurologist to arrival in the regional stroke centre was significantly shorter in the ground group (55 (34-85) vs 68 (40-85) min, pground group (67 (42-136) km) than in the helicopter group (83 (46-143) km) (pground and helicopter transport. We found significantly shorter time from contact to triaging neurologist to arrival in the regional stroke centre if stroke patients were transported by primarily dispatched ground ambulance compared with a secondarily dispatched helicopter.

  4. Accessible triple-phase boundary length: A performance metric to account for transport pathways in heterogeneous electrochemical materials

    Science.gov (United States)

    Nakajo, A.; Cocco, A. P.; DeGostin, M. B.; Peracchio, A. A.; Cassenti, B. N.; Cantoni, M.; Van herle, J.; Chiu, W. K. S.

    2016-09-01

    The performance of materials for electrochemical energy conversion and storage depends upon the number of electrocatalytic sites available for reaction and their accessibility by the transport of reactants and products. For solid oxide fuel/electrolysis cell materials, standard 3-D measurements such as connected triple-phase boundary (TPB) length and effective transport properties partially inform on how local geometry and network topology causes variability in TPB accessibility. A new measurement, the accessible TPB, is proposed to quantify these effects in detail and characterize material performance. The approach probes the reticulated pathways to each TPB using an analytical electrochemical fin model applied to a 3-D discrete representation of the heterogeneous structure provided by skeleton-based partitioning. The method is tested on artificial and real structures imaged by 3-D x-ray and electron microscopy. The accessible TPB is not uniform and the pattern varies depending upon the structure. Connected TPBs can be even passivated. The sensitivity to manipulations of the local 3-D geometry and topology that standard measurements cannot capture is demonstrated. The clear presence of preferential pathways showcases a non-uniform utilization of the 3-D structure that potentially affects the performance and the resilience to alterations due to degradation phenomena. The concepts presented also apply to electrochemical energy storage and conversion devices such as other types of fuel cells, electrolyzers, batteries and capacitors.

  5. A low power medium access control protocol for wireless medical sensor networks.

    Science.gov (United States)

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  6. Decentralized control of multi-agent aerial transportation system

    KAUST Repository

    Toumi, Noureddine

    2017-04-01

    Autonomous aerial transportation has multiple potential applications including emergency cases and rescue missions where ground intervention may be difficult. In this context, the following work will address the control of multi-agent Vertical Take-off and Landing aircraft (VTOL) transportation system. We develop a decentralized method. The advantage of such a solution is that it can provide better maneuverability and lifting capabilities compared to existing systems. First, we consider a cooperative group of VTOLs transporting one payload. The main idea is that each agent perceive the interaction with other agents as a disturbance while assuming a negotiated motion model and imposing certain magnitude bounds on each agent. The theoretical model will be then validated using a numerical simulation illustrating the interesting features of the presented control method. Results show that under specified disturbances, the algorithm is able to guarantee the tracking with a minimal error. We describe a toolbox that has been developed for this purpose. Then, a system of multiple VTOLs lifting payloads will be studied. The algorithm assures that the VTOLs are coordinated with minimal communication. Additionally, a novel gripper design for ferrous objects is presented that enables the transportation of ferrous objects without a cable. Finally, we discuss potential connections to human in the loop transportation systems.

  7. Fertility effects of abortion and birth control pill access for minors.

    Science.gov (United States)

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  8. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  9. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  10. Computer Program Development Specification Terminal Access Controller. Appendix B. Access Line Modes.

    Science.gov (United States)

    1979-04-06

    CG-510262 Part 1 of 2 6 April 1979 Page B17 iS U £ 44 0 o a, U, 00 0 ,.- C 2 50 St -: 2-, CG-510262 Part 1 of 2 6 April 1979 Page B18 00 0 0 0 4 4 0...receipt of RM as the response to a block and acknowledged wit , receive control character ACK2. CAN is never transmitted wit’iin t-ne text portion of a

  11. Advanced Transport Operating System (ATOPS) control display unit software description

    Science.gov (United States)

    Slominski, Christopher J.; Parks, Mark A.; Debure, Kelly R.; Heaphy, William J.

    1992-01-01

    The software created for the Control Display Units (CDUs), used for the Advanced Transport Operating Systems (ATOPS) project, on the Transport Systems Research Vehicle (TSRV) is described. Module descriptions are presented in a standardized format which contains module purpose, calling sequence, a detailed description, and global references. The global reference section includes subroutines, functions, and common variables referenced by a particular module. The CDUs, one for the pilot and one for the copilot, are used for flight management purposes. Operations performed with the CDU affects the aircraft's guidance, navigation, and display software.

  12. Preface: cardiac control pathways: signaling and transport phenomena.

    Science.gov (United States)

    Sideman, Samuel

    2008-03-01

    Signaling is part of a complex system of communication that governs basic cellular functions and coordinates cellular activity. Transfer of ions and signaling molecules and their interactions with appropriate receptors, transmembrane transport, and the consequent intracellular interactions and functional cellular response represent a complex system of interwoven phenomena of transport, signaling, conformational changes, chemical activation, and/or genetic expression. The well-being of the cell thus depends on a harmonic orchestration of all these events and the existence of control mechanisms that assure the normal behavior of the various parameters involved and their orderly expression. The ability of cells to sustain life by perceiving and responding correctly to their microenvironment is the basis for development, tissue repair, and immunity, as well as normal tissue homeostasis. Natural deviations, or human-induced interference in the signaling pathways and/or inter- and intracellular transport and information transfer, are responsible for the generation, modulation, and control of diseases. The present overview aims to highlight some major topics of the highly complex cellular information transfer processes and their control mechanisms. Our goal is to contribute to the understanding of the normal and pathophysiological phenomena associated with cardiac functions so that more efficient therapeutic modalities can be developed. Our objective in this volume is to identify and enhance the study of some basic passive and active physical and chemical transport phenomena, physiological signaling pathways, and their biological consequences.

  13. Enhancing Subject Access to OPACs: Controlled Vocabulary vs. Natural Language.

    Science.gov (United States)

    Cousins, Shirley Anne

    1992-01-01

    Investigation of retrieval performance of controlled vocabulary derived from natural language terms in tables of contents and book indexes assumed that controlled vocabulary representative of users' queries should adequately represent documents' contents. Queries were indexed using Library of Congress Subject Headings (LSCH), Dewey Decimal…

  14. Subsurface Access, Characterization, Acquisition, Transport, Storage and Delivery in Microgravity Project

    Data.gov (United States)

    National Aeronautics and Space Administration — This project will develop geotechnical measurements, sample extraction and transport equipment for subsurface regolith on NEOs, asteroids, moons and planets,...

  15. Traffic improvement and transportation pollution control in Xiamen

    Energy Technology Data Exchange (ETDEWEB)

    Dongxing Yuan; Zilin, Wu

    1996-12-31

    in this paper, the urban traffic improvement and transportation control in Xiamen are highlighted. Xiamen is a port city and an economical special zone of China. As the economy grows, the transportation is developing dramatically and becoming the key for further economic development. The air quality is threatened by the rapid growth of the vehicles in the city. The most urgent task in improving urban traffic is to establish a sound traffic system. The municipal government takes great effort to improve the traffic condition, as well as to reduce green house gases and protect air environment. Some management and technical measures are carried out. Those management measures are mainly as follows: (1) systematic planning of the city arrangement and city functional division, and integrated planning of the urban roads system, (2) putting great emphasis on tail gas monitoring and management, and (3) establishing optimized utilization of motor vehicles. Those included in the main technical measures are (1) making the roads clear, (2) enlarging traffic capacity, and (3) developing the public transport. The most urgent task in improving urban traffic is to establish a sound traffic system. The city municipal government and Transportation Management Bureau plan to make a series of reforms to improve the urban traffic condition, such as building high quality road around the city, reducing the number of one way roads and replacing gasoline buses with electric buses. An optimized traffic system of Xiamen, taking public transport as the main means, is the key to meet the needs of both traffic improvement and urban transportation pollution control.

  16. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Science.gov (United States)

    2012-05-07

    ... From the Federal Register Online via the Government Publishing Office ] INTERNATIONAL TRADE COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same; Determination Rescinding the Exclusion Order and Cease and Desist Orders...

  17. Role-Based Access Control for the Large Hadron Collider at CERN

    CERN Document Server

    Yastrebov, I

    2010-01-01

    Large Hadron Collider (LHC) is the largest scientific instrument ever created. It was built with the intention of testing the most extreme conditions of the matter. Taking into account the significant dangers of LHC operations, European Organization for Nuclear Research (CERN) has developed multi-pronged approach for machine safety, including access control system. This system is based on role-based access control (RBAC) concept. It was designed to protect from accidental and unauthorized access to the LHC and injector equipment. This paper introduces the new model of the role-based access control developed at CERN and gives detailed mathematical description of it. We propose a new technique called dynamic authorization that allows deploying RBAC gradually in the large systems. Moreover, we show how the protection for the very large distributed equipment control system may be implemented in efficient way. This paper also describes motivation of the project, requirements and overview of the main components: au...

  18. The Design of the M-B-Quadro Optical Switch and Its Access Control Strategies

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    This paper proposes a new simple contention resolution switching architecture, M-B-Quadro, and its underlying access control strategies. By incorporating delay and buffer lines, the switching node can effectively obtain very low packet deflection probability.

  19. Elevated expression of metal transporter genes in three accessions of the metal hyperaccumulator Thlaspi caerulescens

    NARCIS (Netherlands)

    Gonçalves Leite de Assunção, A.; Costa Martins, Da P.; Folter, de S.; Vooijs, R.; Aarts, M.G.M.

    2001-01-01

    Heavy metal hyperaccumulation in plants is an intriguing and poorly understood phenomenon. Transmembrane metal transporters are assumed to play a key role in this process. We describe the cloning and isolation of three zinc transporter cDNAs from the Zn hyperaccumulator Thlaspi caerulescens. The

  20. Perceived accessibility is an important factor in transport choice : results from the AVENUE project

    NARCIS (Netherlands)

    Scheepers, C.E. Wendel-Vos, G.C.W. Kempen, E.E.M.M. van Hollander, E.L. de Wijnen, H.J. van Maas, J. Hertog, F.R.J. den Staatsen, B.A.M. Stipdonk, H.L. Int Panis, L.L.R. Wesemael, P.J.V. van & Schuit, A.J.

    2016-01-01

    Stimulating active transport by encouraging replacement of short-distance car trips by active transport modes such as cycling or walking has become a popular policy strategy. It has been suggested that neighbourhoods, designed to facilitate healthy behaviour, can influence a person?s behavioural

  1. Integrated rural mobility and access: mainstreaming environmental issues in community transport planning and construction projects

    CSIR Research Space (South Africa)

    Mashiri, M

    2008-07-01

    Full Text Available endeavours to find innovative solutions to challenges related to accessing socio-economic opportunities by communities within the ambit of environmental sustainability. These interventions would include inter alia, the provision of appropriate and integrated...

  2. Distributed Medium Access Control with SDMA Support for WLANs

    Science.gov (United States)

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  3. Access Control in the ATLAS TDAQ Online Cluster

    CERN Document Server

    Leahu, Marius Constantin; Stoichescu, D A; Lehmann Miotto, G

    ATLAS (A Toroidal LHC Apparatus) is a general-purpose detector for studying high-energy particle interactions: it is the largest particle detector experiment at CERN and it is built around one of the interaction points of the proton beams accelerated by the Large Hadron Collider (LHC). The detector generates an impressive amount of raw data: 64 TB per second as a result of 40 MHz proton-proton collision rate with 1.6 MB data for each such event. The handling of such data rate is managed by a three levels Trigger and Data Acquisition (TDAQ) system, which filters out the events not relevant from physics research point of view and selects in the end in the order of 1000 events per second to be stored for offline analyses. This system comprises a significant number of hardware devices, software applications and human personnel to supervise the experiment operation. Their protection against damages as a result of misuse and their optimized exploitation by avoiding the conflicting accesses to resources are key requ...

  4. Smart packet access and call admission control for efficient resource management in advanced wireless networks

    OpenAIRE

    Phan, V. V. (Vinh V.)

    2005-01-01

    Abstract Efficient management of rather limited resources, including radio spectrum and mobile-terminal battery power, has been the fundamental design challenge of wireless networks and one of the most widespread research problems over the years. MAC (Medium Access Control) for packet access and CAC (Call Admission Control) for connection-oriented service domains are commonly used as effective tools to manage radio resources, capacity and performance of wireless networks while providing ad...

  5. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  6. The open access and the natural gas ducts: transport and distribution; O livre acesso e os dutos de gas natural: transporte e distribuicao

    Energy Technology Data Exchange (ETDEWEB)

    Siqueira, Mariana de; Xavier, Yanko Marcius de Alencar [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil)

    2008-07-01

    The present research, attempting for the economic relevance of the natural gas sector, for the lack of a law that disciplines it and, still, for the structural question of the natural gas ducts activities; it analyzes, in a comparative way, the monopoly of the natural gas ducts activities and the mechanisms of competition chosen to brighten up it: the open access and the by pas. The transport and the distribution of the natural gas are really similar, but the ways to insert the competition in its areas are not. (author)

  7. Sec16 alternative splicing dynamically controls COPII transport efficiency.

    Science.gov (United States)

    Wilhelmi, Ilka; Kanski, Regina; Neumann, Alexander; Herdt, Olga; Hoff, Florian; Jacob, Ralf; Preußner, Marco; Heyd, Florian

    2016-08-05

    The transport of secretory proteins from the endoplasmic reticulum (ER) to the Golgi depends on COPII-coated vesicles. While the basic principles of the COPII machinery have been identified, it remains largely unknown how COPII transport is regulated to accommodate tissue- or activation-specific differences in cargo load and identity. Here we show that activation-induced alternative splicing of Sec16 controls adaptation of COPII transport to increased secretory cargo upon T-cell activation. Using splice-site blocking morpholinos and CRISPR/Cas9-mediated genome engineering, we show that the number of ER exit sites, COPII dynamics and transport efficiency depend on Sec16 alternative splicing. As the mechanistic basis, we suggest the C-terminal Sec16 domain to be a splicing-controlled protein interaction platform, with individual isoforms showing differential abilities to recruit COPII components. Our work connects the COPII pathway with alternative splicing, adding a new regulatory layer to protein secretion and its adaptation to changing cellular environments.

  8. Springfield Processing Plant* (A Hypothetical Facility) SPP, Entry Control Point and Vehicle Gate Access Control Post Order

    Energy Technology Data Exchange (ETDEWEB)

    Baum, Gregory A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2014-06-01

    This hypothetical order provides the requirements and instructions for the Springfield Processing Plant (SPP) Vehicle Gate and Entry Control Point (ECP) in the perimeter access building. The purpose of this post is to prevent the theft, sabotage or diversion of nuclear material (NM), control access and exit at the protected area, and to respond to emergencies according the SPP Guard Force (GF) Contingency Plan and as directed by a Guard Force Supervisor.

  9. TEMPORAL, DELEGABLE AND CHEAP UPDATE ACCESS CONTROL TO PUBLISHED XML DOCUMENTS

    Directory of Open Access Journals (Sweden)

    Waleed Halboob

    2013-01-01

    Full Text Available Providing access control for published XML documents on the Web is an important topic. It involves the use of cryptographic techniques, addressing different requirements and, as a result, facing several challenges. Existing solutions still have some weaknesses such as system update cost, number of required secret encryption/decryption keys, size of encrypted document and supporting temporal and delegable access. This study propose a push--based access control policy enforcement mechanism for addressing these issues using a Dynamic Key Management Table (DKMT and based on Identity Based Encryption (IBE. The proposed mechanism addresses the existing challenges and provides a more acceptable solution.

  10. Unifying the Access Control Mechanism for the Enterprises Using XACML Policy Levels

    Directory of Open Access Journals (Sweden)

    N. Senthil Kumar

    2015-11-01

    Full Text Available —Many enterprises have intended to promote their applications with stern access control mechanism and yield the stringent authorization deployment in their individual proprietary manner. The development of this build up will result in tight coupling of authorization mechanisms within the enterprise applications. In many enterprises setup, the implicit authorization processes are embedded within the application and promote error prone accessing of requested policies. This sort of embedded authorization will let the users to carry out the specific actions without knowing the access control policy as well as its embedded setup with the help of third party involvement. But this approach has some serious effects in controlling the issues such as skipping the trust based applications, violates the policy setups and pave the way to exploit the authorized data to the end users. Many enterprises had faced serious problem in controlling its sensitive data from this implicit authorization decisions and hence decided to develop a security mechanism which can be totally controlled by centralized way of access policy. Therefore, the eXtensible Access Control Markup Language (XACML provides a very simple and powerful remedy for authorization mechanism and for the access policy set ups.

  11. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures that... develop, test, and implement the relevant risk management controls and supervisory procedures...

  12. Low temperature carrier transport properties in isotopically controlled germanium

    Energy Technology Data Exchange (ETDEWEB)

    Itoh, K.

    1994-12-01

    Investigations of electronic and optical properties of semiconductors often require specimens with extremely homogeneous dopant distributions and precisely controlled net-carrier concentrations and compensation ratios. The previous difficulties in fabricating such samples are overcome as reported in this thesis by growing high-purity Ge single crystals of controlled {sup 75}Ge and {sup 70}Ge isotopic compositions, and doping these crystals by the neutron transmutation doping (NTD) technique. The resulting net-impurity concentrations and the compensation ratios are precisely determined by the thermal neutron fluence and the [{sup 74}Ge]/[{sup 70}Ge] ratios of the starting Ge materials, respectively. This method also guarantees unprecedented doping uniformity. Using such samples the authors have conducted four types of electron (hole) transport studies probing the nature of (1) free carrier scattering by neutral impurities, (2) free carrier scattering by ionized impurities, (3) low temperature hopping conduction, and (4) free carrier transport in samples close to the metal-insulator transition.

  13. Control of corrosion product transport in PWR secondary cycles

    Energy Technology Data Exchange (ETDEWEB)

    Sawochka, S.G.; Pearl, W.L. [NWT Corp., San Josa, CA (United States); Passell, T.O.; Welty, C.S. [Electric Power Research Institute, Palo Alto, CA (United States)

    1992-12-31

    Transport of corrosion products to PWR steam generators by the feedwater leads to sludge buildup on the tubesheets and fouling of tube-to-tube support crevices. In these regions, chemical impurities concentrate and accelerate tubing corrosion. Deposit buildup on the tubes also can lead to power generation limitations and necessitate chemical cleaning. Extensive corrosion product transport data for PWR secondary cycles has been developed employing integrating sampling techniques which facilitate identification of major corrosion product sources and assessments of the effectiveness of various control options. Plant data currently are available for assessing the impact of factors such as pH, pH control additive, materials of construction, blowdown, condensate treatment, and high temperature drains and feedwater filtration.

  14. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    Science.gov (United States)

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  15. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...

  16. A Security Architecture for Data Aggregation and Access Control in Smart Grids

    CERN Document Server

    Ruj, Sushmita; Stojmenovic, Ivan

    2011-01-01

    We propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. We use homomorphic encryption technique to achieve this. The consumer data that is collected is sent to the substations where it is monitored by remote terminal units (RTU). The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. Users can be maintenance units, utility centers, pricing estimator units or analyzing and prediction groups. We solve this problem of access control using cryptographic technique of attribute-based encryption. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The ac...

  17. DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

    Directory of Open Access Journals (Sweden)

    S.R. Kodituwakku

    2010-11-01

    Full Text Available Role Based Access Control is very useful for providing a high level description of access control for organizational applications. This paper proposes a role based framework that deals with security problems in an intranet environment. The proposed framework protects intranet resources from unauthorized users. The salient feature of the framework is that it allows intranet users to access only authorized resources. It consists of two kinds of role hierarchies: global role hierarchy and local role hierarchy, and two levels of permissions: server permission and object permission. They simplify the way of structuring authority and responsibility in the whole intranet and the allocation of privileges for different objects within a particular server. The proposed framework is implemented over Windows platform and tested for the validity. The test results indicated that it can successfully be used to control accessing network objects.

  18. Volume transport data from a submarine cable in the Florida Strait in 2014 (NODC Accession 0125429)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Daily mean and raw voltage volume transport data of the Florida Current collected with a submarine cable spanning from South Florida to the Grand Bahama Island in...

  19. Volume transport data from a submarine cable in the Florida Strait in 2013 (NODC Accession 0115895)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Daily mean and raw voltage volume transport data of the Florida Current collected with a submarine cable spanning from South Florida to the Grand Bahama Island in...

  20. Volume transport data from a submarine cable in the Florida Strait from 2015 (NCEI Accession 0140278)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Daily mean and raw voltage volume transport data of the Florida Current collected with a submarine cable spanning from South Florida to the Grand Bahama Island in...

  1. Generalized access control strategies for integrated services token passing systems

    Science.gov (United States)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  2. Converged wireline and wireless signal transport over optical fibre access links

    DEFF Research Database (Denmark)

    Tafur Monroy, Idelfonso; Prince, Kamau; Osadchiy, Alexey Vladimirovich

    2009-01-01

    This article reviews emerging trends in converged optical-wireless communication systems and outline the role that photonic technologies are playing in making the vision of a wireline-wireless converged signal transport network a reality.......This article reviews emerging trends in converged optical-wireless communication systems and outline the role that photonic technologies are playing in making the vision of a wireline-wireless converged signal transport network a reality....

  3. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  4. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    Directory of Open Access Journals (Sweden)

    Mang Su

    2014-01-01

    Full Text Available This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  5. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  6. ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud

    Directory of Open Access Journals (Sweden)

    Sudha Senthilkumar

    2014-11-01

    Full Text Available Cloud storage has emerged as a popular paradigm to outsource data to third party and share it with the collaborators. While this new paradigm enables users to outsource their sensitive data and reduces data management costs, it brings forth the new challenges to the user to keep their data secure. Data storage security and access control in the cloud is one of the challenging ongoing research works to alleviate the data leakage problem from unauthorized users. Existing solutions that use pure cryptographic techniques suffers from heavy computation work with respect to key management and key distribution.  Attribute based encryption is an alternative solution that map the user access structure with the data file attributes to control the data access. However any of the existing schemes doesn’t address the access control with assured deletion of the files upon revocation of user access. This article addresses this open issue using a trusted authority that manages the access control list and takes care of key management and key distribution and file deletion upon user revocation. The prototype of model has been presented and analyzed the security features over existing scheme.

  7. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Control (MAC) protocols that are following the receiver-initiated paradigm of asynchronous communication. According to the receiver-initiated paradigm the communication is initiated by the receiver that states its availability to receive data through beacons. The sender is passively listening...... to the channel until it receives the beacon of interest. In this context, the dissertation begins with an in-depth survey of all the receiverinitiated MAC protocols and presents their unique optimization features, which deal with several challenges of the link layer such as mitigation of the energy consumption......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  8. Distributed Random Access Algorithm: Scheduling and Congesion Control

    CERN Document Server

    Jiang, Libin; Shin, Jinwoo; Walrand, Jean

    2009-01-01

    This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement. The setup is a network of wireless nodes with a fixed conflict graph that identifies pairs of nodes whose simultaneous transmissions conflict. The paper studies two algorithms. The first algorithm schedules transmissions to keep up with given arrival rates of packets. The second algorithm controls the arrivals in addition to the scheduling and attempts to maximize the sum of the utilities of the flows of packets at the different nodes. For the first algorithm, the paper proves rate stability for strictly feasible arrival rates and also Harris recurrence of the queues. For the second algorithm, the paper proves the epsilon-optimality. Both algorithms operate with strictly local information in the case of decreasing step sizes, and operate with the additional info...

  9. Using IP as Transport Technology in Third Generation and Beyond Radio Access Networks

    NARCIS (Netherlands)

    Bader, Attila; Westberg, Lars; Karagiannis, Georgios; de Meer, H; Bhatti, N.T.

    This paper discusses the motivation for developing a new QoS signaling protocol for IP-based Radio Access Networks. It describes the main characteristics of these networks and the special requirements imposed by these characteristics on QoS signaling solutions.

  10. 75 FR 43747 - Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles

    Science.gov (United States)

    2010-07-26

    ... weight rating of 30,000 pounds or more, and adds a requirement for a forward excursion barrier at rear... accessible transit vehicles,'' 32 Medical Engineering & Physics 230-236 (2010). T303.8.1 simplifies the... direction in large vehicles with a gross vehicle weight rating of 30,000 pounds or more. The design force...

  11. Design of Active Queue Management for Robust Control on Access Router for Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Åhlund Christer

    2011-01-01

    Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.

  12. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  13. A Traffic Forecasting Method with Function to Control Residual Error Distribution for IP Access Networks

    Science.gov (United States)

    Kitahara, Takeshi; Furuya, Hiroki; Nakamura, Hajime

    Since traffic in IP access networks is less aggregated than in backbone networks, its variance could be significant and its distribution may be long-tailed rather than Gaussian in nature. Such characteristics make it difficult to forecast traffic volume in IP access networks for appropriate capacity planning. This paper proposes a traffic forecasting method that includes a function to control residual error distribution in IP access networks. The objective of the proposed method is to grasp the statistical characteristics of peak traffic variations, while conventional methods focus on average rather than peak values. In the proposed method, a neural network model is built recursively while weighting residual errors around the peaks. This enables network operators to control the trade-off between underestimation and overestimation errors according to their planning policy. Evaluation with a total of 136 daily traffic volume data sequences measured in actual IP access networks demonstrates the performance of the proposed method.

  14. Efficient control variates for uncertainty quantification of radiation transport

    Science.gov (United States)

    Frankel, A.; Iaccarino, G.

    2017-03-01

    Numerical simulations of problems involving radiation transport are challenging because of the associated computational cost; moreover, it is typically difficult to describe the optical properties of the system very precisely, and therefore uncertainties abound. We aim to represent the uncertainties explicitly and to characterize their impact on the output of interest. While stochastic collocation and polynomial chaos methods have been applied previously, these methods can suffer from the curse of dimensionality and fail in cases where the system response is discontinuous or highly non-linear. Monte Carlo methods are more robust, but they converge slowly. To that end, we apply the control variate method to uncertainty propagation via Monte Carlo. We leverage the modeling hierarchy of radiation transport to use low fidelity models such as the diffusion approximation and coarse angular discretizations to reduce the confidence interval on the quantity of interest. The efficiency of the control variate method is demonstrated in several problems involving stochastic media, thermal emission, and radiation properties with different quantities of interest. The control variates are able to provide significant variance reduction and efficiency increase in all problems considered. We conclude our study with a discussion of choosing optimal control variates and other extensions of Monte Carlo methods.

  15. Fault tolerant computer control for a Maglev transportation system

    Science.gov (United States)

    Lala, Jaynarayan H.; Nagle, Gail A.; Anagnostopoulos, George

    1994-01-01

    Magnetically levitated (Maglev) vehicles operating on dedicated guideways at speeds of 500 km/hr are an emerging transportation alternative to short-haul air and high-speed rail. They have the potential to offer a service significantly more dependable than air and with less operating cost than both air and high-speed rail. Maglev transportation derives these benefits by using magnetic forces to suspend a vehicle 8 to 200 mm above the guideway. Magnetic forces are also used for propulsion and guidance. The combination of high speed, short headways, stringent ride quality requirements, and a distributed offboard propulsion system necessitates high levels of automation for the Maglev control and operation. Very high levels of safety and availability will be required for the Maglev control system. This paper describes the mission scenario, functional requirements, and dependability and performance requirements of the Maglev command, control, and communications system. A distributed hierarchical architecture consisting of vehicle on-board computers, wayside zone computers, a central computer facility, and communication links between these entities was synthesized to meet the functional and dependability requirements on the maglev. Two variations of the basic architecture are described: the Smart Vehicle Architecture (SVA) and the Zone Control Architecture (ZCA). Preliminary dependability modeling results are also presented.

  16. Embedded real-time control of optically amplified repeaters in broadband access networks

    Science.gov (United States)

    Stubbe, Brecht; Vaes, Peter; Gouwy, Lieven; Coene, Chris; Qiu, Xing-Zhi; Staelens, Bart; Vandewege, Jan; Slabbinck, B. Hans; Martin, Claire M.; Van de Voorde, Ingrid

    1997-10-01

    This paper presents the use of distributed, intelligent control and management in optically amplified repeaters. These optical repeater units (ORUs) are used in an optical access network. A semiconductor optical amplifier (SOA) has been used in the upstream direction because of the possibility of fast switching. The real time control platform consists of both a hard- and a software part. The software control is handled with the embedded control system FORTRESS developed by IMEC.

  17. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  18. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    of contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell......In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  19. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  20. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    OpenAIRE

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some st...

  1. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...

  2. Synthesis from Design Requirements of a Hybrid System for Transport Aircraft Longitudinal Control. Volume 1

    Science.gov (United States)

    Hynes, Charles S.; Hardy, Gordon H.; Sherry, Lance

    2007-01-01

    Volume I of this report presents a new method for synthesizing hybrid systems directly from design requirements, and applies the method to design of a hybrid system for longitudinal control of transport aircraft. The resulting system satisfies general requirement for safety and effectiveness specified a priori, enabling formal validation to be achieved. Volume II contains seven appendices intended to make the report accessible to readers with backgrounds in human factors, fli ght dynamics and control. and formal logic. Major design goals are (1) system desi g n integrity based on proof of correctness at the design level, (2), significant simplification and cost reduction in system development and certification, and (3) improved operational efficiency, with significant alleviation of human-factors problems encountered by pilots in current transport aircraft. This report provides for the first time a firm technical basis for criteria governing design and certification of avionic systems for transport aircraft. It should be of primary interest to designers of next-generation avionic systems.

  3. Access management in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    NARCIS (Netherlands)

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  4. Housing and Transport: Access Issues for Disabled International Students in British Universities

    Science.gov (United States)

    Soorenian, Armineh

    2013-01-01

    This article explores two disabled people's "Seven Needs" to independent living, those of "housing" and "transport" issues, in relation to disabled international students in British universities. Firstly, students' living arrangements, including issues related to the suitability of university accommodation to their…

  5. Modelling public transport route choice, with multiple access and egress modes

    NARCIS (Netherlands)

    Brands, T.; Romph, de E.; Veitch, T.; Cook, J.

    2014-01-01

    Public transport (PT) is important, because the current traffic system faces well known problems like congestion, environmental impact and use of public space. To be able to assess the effects of policy measures properly, it is necessary to model the behavior of the (PT) traveler in a realistic way.

  6. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    Science.gov (United States)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  7. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  8. Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism

    Directory of Open Access Journals (Sweden)

    Apurva R. Naik

    2016-10-01

    Full Text Available Social networking and growing popularity of cloud services have made everyone to communicate each other in an easiest way. File sharing and distribution are the frequently used services provided by cloud service providers, although these facilities reduce cost of data sharing but at the same time data security and access control is the major problem. Many renowned service providers have faced the challenges to secure data and provide better access control, and we know once the data is leaked we cannot recover the data loss. Thus in order to ensure better security we need for focus on the two major problems, and those are access control and encryption policy. Cipher text policy attribute based encryption is the most effective solution for access control in real time scenarios where owner can actually decide the access rights for the end-user, but it comes with key escrow problem. We are proposing our modified escrow-free key issuing protocol to solve the problem of key escrow and our Modified Attribute Based Encryption scheme to achieve all security requirements to get a robust and secure system. Further we evaluate our model on the basis of results and lastly we conclude the paper.

  9. Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available Recent advances in information communication technology and software have enabled mobile terminals to employ various capabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile services are also transferred from voice to data. Mobile terminals can access Internet for data services anytime anywhere. By using location-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment, it is required that mobile terminals should efficiently use wireless network resources. In addition, because video stream becomes a major service among the data services of mobile terminals in heterogeneous networks, the necessity of the efficient network access control for heterogeneous wireless networks is raised as an important topic. That is, quality of services of the location-based video stream is determined by the network access control. Therefore, this paper proposes a novel network access control in the heterogeneous wireless networks. The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status. Thus, it improves data transmission efficiency to satisfy the quality of services. The efficiency of the proposed method is validated through the extensive computer simulation.

  10. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned......Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... attacks. The protocol evaluation by using security protocol verification tool shows that IECAC is secure against these attacks. This paper also discusses performance analysis of the protocol in terms of computational time and compared with other existing solutions....

  11. A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2015-01-01

    Full Text Available A digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN. The scheme is founded on the access control scheme on the basis of characteristic expression (named CEB scheme. Data is divided by characteristics and the key for encryption is related to characteristic expression. Only the key matching with characteristic expression can decrypt the data. Meanwhile, three distributed certificate detection methods are designed to prevent the certificate from being misappropriated by hostile anonymous users. When a user starts query, the key access control method can judge whether the query is valid. In this case, the scheme can achieve public certificate of users and effectively protect query privacy as well. The security analysis and experiments show that the proposed scheme is superior in communication overhead, storage overhead, and detection probability.

  12. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  13. Distributed Access Control Based on Proxy Signature in M2M Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lingyu Lee

    2013-05-01

    Full Text Available In this study, we have a research of the distributed access control based on proxy signature in M2M sensor networks M2M sensor networks. As M2M sensor networks are usually deployed in hostile environment, the global communication security of M2M sensor networks is and will continue to be a major concern. Although there are many related works on access control in WSNs (Wireless Sensor Networks, Ad-hoc networks, MANETs (Mobile Ad-hoc Networks and etc., they cannot be applied to M2M sensor networks directly. Motivated by this consideration, we develop a secure and distributed access control scheme based on proxy signature for M2M sensor networks, which provides strong authentication and achieves efficiency. Moreover, security of the proposed technique does not rely on availability of a secure channel.

  14. Automating Access Control Logics in Simple Type Theory with LEO-II (Techreport)

    CERN Document Server

    Benzmueller, Christoph

    2009-01-01

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory (which is also known as higher-order logic) and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound and complete embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in prominent access control logics.

  15. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    Science.gov (United States)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  16. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  17. Perceptions of transport corridors and intermodal transport - as ways to control the space of freight transport flows

    DEFF Research Database (Denmark)

    Hansen, Leif Gjesing

    2009-01-01

    -efficient choice of road routes, etc. This represents potentials and barriers for promotion of intermodal transport solutions, since it points to the importance of governance of transport networks by different transport stakeholders as "gate-keepers" for what kind of transport modes and routes are selected...

  18. CNG transport by ship with FRP pressure vessels access to east coast gas

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, S. [Trans Ocean Gas Inc., St. John' s, NL (Canada)

    2005-07-01

    This paper discussed the Trans Ocean Gas (TOG) method for transporting compressed natural gas (CNG). CNG transportation offers an alternative method for transporting stranded natural gas to existing markets and for creating new natural gas markets that are not feasible for liquefied natural gas (LNG) or pipelines. Trans Ocean Gas Inc. (TOG) modified an existing fibre reinforced plastic (FRP) pressure vessel technology to safely store CNG on a ship. The newly developed containment system has proven to overcome all the deficiencies of steel-based systems. TOG patented the containment system and will license its use to owners of stranded gas and shipping service providers around the world. The CNG systems will be built and assembled throughout facilities in Atlantic Canada. FRP pressure vessels have been proven safe and reliable through critical applications in the national defense, aerospace, and natural gas vehicle industries. They are light-weight, highly reliable, have very safe failure modes, are corrosion resistant, and have excellent low temperature characteristics. Under TOG's scheme, natural gas can be stored at two thirds the density of LNG without costly processing. TOG's proposed design and testing of a CNG system was reviewed in detail. figs.

  19. Variation in molybdenum content across broadly distributed populations of Arabidopsis thaliana is controlled by a mitochondrial molybdenum transporter (MOT1.

    Directory of Open Access Journals (Sweden)

    Ivan Baxter

    2008-02-01

    Full Text Available Molybdenum (Mo is an essential micronutrient for plants, serving as a cofactor for enzymes involved in nitrate assimilation, sulfite detoxification, abscisic acid biosynthesis, and purine degradation. Here we show that natural variation in shoot Mo content across 92 Arabidopsis thaliana accessions is controlled by variation in a mitochondrially localized transporter (Molybdenum Transporter 1 - MOT1 that belongs to the sulfate transporter superfamily. A deletion in the MOT1 promoter is strongly associated with low shoot Mo, occurring in seven of the accessions with the lowest shoot content of Mo. Consistent with the low Mo phenotype, MOT1 expression in low Mo accessions is reduced. Reciprocal grafting experiments demonstrate that the roots of Ler-0 are responsible for the low Mo accumulation in shoot, and GUS localization demonstrates that MOT1 is expressed strongly in the roots. MOT1 contains an N-terminal mitochondrial targeting sequence and expression of MOT1 tagged with GFP in protoplasts and transgenic plants, establishing the mitochondrial localization of this protein. Furthermore, expression of MOT1 specifically enhances Mo accumulation in yeast by 5-fold, consistent with MOT1 functioning as a molybdate transporter. This work provides the first molecular insight into the processes that regulate Mo accumulation in plants and shows that novel loci can be detected by association mapping.

  20. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  1. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  2. Virus spreading in wireless sensor networks with a medium access control mechanism

    Institute of Scientific and Technical Information of China (English)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper,an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks.Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks,which has been ignored in previous studies.It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes.The theoretical results are confirmed by numerical simulations.

  3. Cross-polar transport and scavenging of Siberian aerosols containing black carbon during the 2012 ACCESS summer campaign

    Energy Technology Data Exchange (ETDEWEB)

    Raut, Jean-Christophe; Marelle, L.; Fast, Jerome D.; Thomas, J. L.; Weinzierl, B.; Law, K. S.; Berg, Larry K.; Roiger, A.; Easter, Richard C.; Heimerl, Katharina; Onishi, T.; Delanoe, Julien; Schlager, H.

    2017-09-15

    During the ACCESS airborne campaign in July 2012, extensive boreal forest fires resulted in significant aerosol transport to the Arctic. A 10 day episode combining intense biomass burning over Siberia and low-pressure systems over the Arctic Ocean resulted in efficient transport of plumes containing black carbon (BC) towards the Arctic, mostly in the upper troposphere (6 − 8 km). A combination of in situ observations (DLR Falcon aircraft), satellite analysis and WRF-Chem simulations are used to understand the vertical and horizontal transport mechanisms of BC with a focus on the role of wet removal. Between the northwestern Norwegian coast and the Svalbard archipelago, the Falcon aircraft sampled plumes with enhanced CO concentrations up to 200 ppbv and BC mixing ratios up to 25 ng kg−1. During transport to the Arctic region, a large fraction of BC particles are scavenged by two wet deposition processes, namely wet removal by large-scale precipitation and removal in wet convective updrafts, with both processes contributing almost equally to the total accumulated deposition of BC. Our results underline that applying a finer horizontal resolution (40 instead of 100 km) improves the model performance, as it significantly reduces the overestimation of BC levels observed at a coarser resolution in the mid-troposphere. According to the simulations at 40 km, the transport efficiency of BC (TEBC) in biomass burning plumes is about 60%, which is impacted by small accumulated precipitation along trajectory (APT) (1 mm). In contrast TEBC is very small (< 30%) and APT is larger (5 − 10 mm) in plumes influenced by urban anthropogenic sources and flaring activities in Northern Russia, resulting in as it significantly reduces the overestimation of BC levels observed at a coarser resolution in the mid-troposphere. According to the simulations at 40 km, the transport efficiency of BC (TEBC) in biomass burning plumes is about 60%, which is impacted by small accumulated

  4. Environmental control of microtubule-based bidirectional cargo-transport

    CERN Document Server

    Klein, Sarah; Santen, Ludger

    2014-01-01

    Inside cells, various cargos are transported by teams of molecular motors. Intriguingly, the motors involved generally have opposite pulling directions, and the resulting cargo dynamics is a biased stochastic motion. It is an open question how the cell can control this bias. Here we develop a model which takes explicitly into account the elastic coupling of the cargo with each motor. We show that bias can be simply controlled or even reversed in a counterintuitive manner via a change in the external force exerted on the cargo or a variation of the ATP binding rate to motors. Furthermore, the superdiffusive behavior found at short time scales indicates the emergence of motor cooperation induced by cargo-mediated coupling.

  5. Environmental control of microtubule-based bidirectional cargo transport

    Science.gov (United States)

    Klein, Sarah; Appert-Rolland, Cécile; Santen, Ludger

    2014-07-01

    Inside cells, various cargos are transported by teams of molecular motors. Intriguingly, the motors involved generally have opposite pulling directions, and the resulting cargo dynamics is a biased stochastic motion. It is an open question how the cell can control this bias. Here we develop a model which takes explicitly into account the elastic coupling of the cargo with each motor. We show that bias can be simply controlled or even reversed in a counterintuitive manner via a change in the external force exerted on the cargo or a variation of the environmental properties. Furthermore, the superdiffusive behavior found at short time scales indicates the emergence of motor cooperation induced by cargo-mediated coupling.

  6. Measurements of fluid transport by controllable vertical migrations of plankton

    Science.gov (United States)

    Houghton, Isabel A.; Dabiri, John O.

    2016-11-01

    Diel vertical migration of zooplankton has been proposed to be a significant contributor to local and possibly large-scale fluid transport in the ocean. However, studies of this problem to date have been limited to order-of-magnitude estimates based on first principles and a small number of field observations. In this work, we leverage the phototactic behavior of zooplankton to stimulate controllable vertical migrations in the laboratory and to study the associated fluid transport and mixing. Building upon a previous prototype system, a laser guidance system induces vertical swimming of brine shrimp (Artemia salina) in a 2.1 meter tall, density-stratified water tank. The animal swimming speed and spacing during the controlled vertical migration is characterized with video analysis. A schlieren imaging system is utilized to visualize density perturbations to a stable stratification for quantification of fluid displacement length scales and restratification timescales. These experiments can add to our understanding of the dynamics of active particles in stratified flows. NSF and US-Israel Binational Science Foundation.

  7. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    and communication networks on the controller performance. We start by investigating the effects of a communication network that introduces delays in the information access for the central controller. The control performance as measured by accumulated fatigue is shown to be significantly impacted by communication....... This information quality metric is called mismatch probability, mmPr, and is used to express quantitatively the information accuracy in a given scenario. Lastly measurements of different communication technologies have been performed in order to carry out the analysis in a practically relevant scenario......In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  8. Optimum feedback strategy for access control mechanism modelled as stochastic differential equation in computer network

    Directory of Open Access Journals (Sweden)

    Ahmed N. U.

    2004-01-01

    Full Text Available We consider optimum feedback control strategy for computer communication network, in particular, the access control mechanism. The dynamic model representing the source and the access control system is described by a system of stochastic differential equations developed in our previous works. Simulated annealing (SA was used to optimize the parameters of the control law based on neural network. This technique was found to be computationally intensive. In this paper, we have proposed to use a more powerful algorithm known as recursive random search (RRS. By using this technique, we have been able to reduce the computation time by a factor of five without compromising the optimality. This is very important for optimization of high-dimensional systems serving a large number of aggregate users. The results show that the proposed control law can improve the network performance by improving throughput, reducing multiplexor and TB losses, and relaxing, not avoiding, congestion.

  9. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mesay Hailu Dangisso

    2015-11-01

    Full Text Available Background: Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs and treatment outcome in the Sidama Zone, southern Ethiopia. Design: We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results: Over a decade the health service coverage (the health facility–to-population ratio increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km between kebeles (the smallest administrative units and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km. In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001 and altitude (b-estimate=−0.31, p<0.001 increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001 and altitude (b-estimate=−0.30, p<0.001 were inversely associated with treatment success (proportion of treatment completed or cured cases

  10. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  11. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  12. 49 CFR 176.89 - Control of transport vehicles.

    Science.gov (United States)

    2010-10-01

    ... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL Special Requirements for Transport Vehicles Loaded With Hazardous Materials and Transported on Board Ferry... be transported on board a ferry vessel, subject to the following conditions: (1) The operator or...

  13. 78 FR 41993 - Transport Handling Specialists, Inc.-Continuance in Control Exemption-RSL Railroad, LLC

    Science.gov (United States)

    2013-07-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Surface Transportation Board Transport Handling Specialists, Inc.--Continuance in Control Exemption--RSL Railroad, LLC Transport Handling Specialists, Inc. (THS), has filed a verified notice of exemption...

  14. 76 FR 77888 - Student Transportation of America, Inc.-Control-Dairyland Buses, Inc.

    Science.gov (United States)

    2011-12-14

    ... Surface Transportation Board Student Transportation of America, Inc.--Control--Dairyland Buses, Inc... Transaction. SUMMARY: Student Transportation of America, Inc., a motor carrier of passengers (Student... 1182.8. DATES: Comments must be filed by January 27, 2012. Student Transportation may file a reply...

  15. PRESENTATION OF MANDATORY POLICY OF ACCESS CONTROL VIA THE HARRISONRUSSO-WILLIAM’S MODEL

    Directory of Open Access Journals (Sweden)

    Korolev I. D.

    2015-03-01

    Full Text Available The accepted model of the access control is realized with the monitor of safety in the protected automated information system. Models of safety are considered, as a rule, as a system which is a single whole and has the uniform monitor of safety. Nevertheless, the architecture of the real automated information systems and processes of their functioning can be characterized by distribution. The distributed automated information system consists more than of one local segment representing isolated set of subjects and objects of access. In the distributed system local segments can be realized both on the basis of discretionary, and on the basis of mandatory models of safety (i.e. to be diverse. One of directions of a safety in this case is realization of the general monitor of the safety providing the uniform (coordinated policy of access control. For safe interaction of patchwork systems it’s necessary to bring them to a single model. Hence, while the integration of information systems the problem of their interaction becomes persistent. Thus in the systems processing the information of a various level of confidentiality, it is necessary to realize mandatory access control. In given clause the mandatory policy of the safety presented by classical model of Bell-LaPadula, is described by the elements of classical model of Harrison-Russo-William. Using the mechanisms of change of a matrix access the opportunity of assignment and change of confidentiality marks is described and the observance of safe practices within the limits of mandatory access control is analyzed. The safety of application of the given approach has been proved. The perspective direction of research has been defined

  16. Controlling signal transport in a carbon nanotube opto-transistor

    Science.gov (United States)

    Li, Jinjin; Chu, Yanhui; Zhu, Ka-Di

    2016-11-01

    With the highly competitive development of communication technologies, modern information manufactures place high importance on the ability to control the transmitted signal using easy miniaturization materials. A controlled and miniaturized optical information device is, therefore, vital for researchers in information and communication fields. Here we propose a controlled signal transport in a doubly clamped carbon nanotube system, where the transmitted signal can be controlled by another pump beam. Pump off results in the transmitted signal off, while pump on results in the transmitted signal on. The more pump, the more amplified output signal transmission. Analogous with traditional cavity optomechanical system, the role of optical cavity is played by a localized exciton in carbon nanotube while the role of the mechanical element is played by the nanotube vibrations, which enables the realization of an opto-transistor based on carbon nanotube. Since the signal amplification and attenuation have been observed in traditional optomechanical system, and the nanotube optomechanical system has been realized in laboratory, the proposed carbon nanotube opto-transistor could be implemented in current experiments and open the door to potential applications in modern optical networks and future quantum networks.

  17. Manual Throttles-Only Control Effectivity for Emergency Flight Control of Transport Aircraft

    Science.gov (United States)

    Stevens, Richard; Burcham, Frank W., Jr.

    2009-01-01

    If normal aircraft flight controls are lost, emergency flight control may be attempted using only the thrust of engines. Collective thrust is used to control flightpath, and differential thrust is used to control bank angle. One issue is whether a total loss of hydraulics (TLOH) leaves an airplane in a recoverable condition. Recoverability is a function of airspeed, altitude, flight phase, and configuration. If the airplane can be recovered, flight test and simulation results on several transport-class airplanes have shown that throttles-only control (TOC) is usually adequate to maintain up-and-away flight, but executing a safe landing is very difficult. There are favorable aircraft configurations, and also techniques that will improve recoverability and control and increase the chances of a survivable landing. The DHS and NASA have recently conducted a flight and simulator study to determine the effectivity of manual throttles-only control as a way to recover and safely land a range of transport airplanes. This paper discusses TLOH recoverability as a function of conditions, and TOC landability results for a range of transport airplanes, and some key techniques for flying with throttles and making a survivable landing. Airplanes evaluated include the B-747, B-767, B-777, B-757, A320, and B-737 airplanes.

  18. Manual Throttles-Only Control Effectivity for Emergency Flight Control of Transport Aircraft

    Science.gov (United States)

    Stevens, Richard; Burcham, Frank W., Jr.

    2009-01-01

    If normal aircraft flight controls are lost, emergency flight control may be attempted using only the thrust of engines. Collective thrust is used to control flightpath, and differential thrust is used to control bank angle. One issue is whether a total loss of hydraulics (TLOH) leaves an airplane in a recoverable condition. Recoverability is a function of airspeed, altitude, flight phase, and configuration. If the airplane can be recovered, flight test and simulation results on several transport-class airplanes have shown that throttles-only control (TOC) is usually adequate to maintain up-and-away flight, but executing a safe landing is very difficult. There are favorable aircraft configurations, and also techniques that will improve recoverability and control and increase the chances of a survivable landing. The DHS and NASA have recently conducted a flight and simulator study to determine the effectivity of manual throttles-only control as a way to recover and safely land a range of transport airplanes. This paper discusses TLOH recoverability as a function of conditions, and TOC landability results for a range of transport airplanes, and some key techniques for flying with throttles and making a survivable landing. Airplanes evaluated include the B-747, B-767, B-777, B-757, A320, and B-737 airplanes.

  19. Cross-polar transport and scavenging of Siberian aerosols containing black carbon during the 2012 ACCESS summer campaign

    Science.gov (United States)

    Raut, Jean-Christophe; Marelle, Louis; Fast, Jerome D.; Thomas, Jennie L.; Weinzierl, Bernadett; Law, Katharine S.; Berg, Larry K.; Roiger, Anke; Easter, Richard C.; Heimerl, Katharina; Onishi, Tatsuo; Delanoë, Julien; Schlager, Hans

    2017-09-01

    During the ACCESS airborne campaign in July 2012, extensive boreal forest fires resulted in significant aerosol transport to the Arctic. A 10-day episode combining intense biomass burning over Siberia and low-pressure systems over the Arctic Ocean resulted in efficient transport of plumes containing black carbon (BC) towards the Arctic, mostly in the upper troposphere (6-8 km). A combination of in situ observations (DLR Falcon aircraft), satellite analysis and WRF-Chem simulations is used to understand the vertical and horizontal transport mechanisms of BC with a focus on the role of wet removal. Between the northwestern Norwegian coast and the Svalbard archipelago, the Falcon aircraft sampled plumes with enhanced CO concentrations up to 200 ppbv and BC mixing ratios up to 25 ng kg-1. During transport to the Arctic region, a large fraction of BC particles are scavenged by two wet deposition processes, namely wet removal by large-scale precipitation and removal in wet convective updrafts, with both processes contributing almost equally to the total accumulated deposition of BC. Our results underline that applying a finer horizontal resolution (40 instead of 100 km) improves the model performance, as it significantly reduces the overestimation of BC levels observed at a coarser resolution in the mid-troposphere. According to the simulations at 40 km, the transport efficiency of BC (TEBC) in biomass burning plumes was larger (60 %), because it was impacted by small accumulated precipitation along trajectory (1 mm). In contrast TEBC was small (urban anthropogenic sources and flaring activities in northern Russia, resulting in transport to lower altitudes. TEBC due to large-scale precipitation is responsible for a sharp meridional gradient in the distribution of BC concentrations. Wet removal in cumulus clouds is the cause of modeled vertical gradient of TEBC, especially in the mid-latitudes, reflecting the distribution of convective precipitation, but is dominated in

  20. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    Science.gov (United States)

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care.

  1. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  2. Solvent-driven electron trapping and mass transport in reduced graphites to access perfect graphene

    Science.gov (United States)

    Vecera, Philipp; Holzwarth, Johannes; Edelthalhammer, Konstantin F.; Mundloch, Udo; Peterlik, Herwig; Hauke, Frank; Hirsch, Andreas

    2016-08-01

    Herein, we report on a significant discovery, namely, the quantitative discharging of reduced graphite forms, such as graphite intercalation compounds, graphenide dispersions and graphenides deposited on surfaces with the simple solvent benzonitrile. Because of its comparatively low reduction potential, benzonitrile is reduced during this process to the radical anion, which exhibits a red colour and serves as a reporter molecule for the quantitative determination of negative charges on the carbon sheets. Moreover, this discovery reveals a very fundamental physical-chemical phenomenon, namely a quantitative solvent reduction induced and electrostatically driven mass transport of K+ ions from the graphite intercalation compounds into the liquid. The simple treatment of dispersed graphenides suspended on silica substrates with benzonitrile leads to the clean conversion to graphene. This unprecedented procedure represents a rather mild, scalable and inexpensive method for graphene production surpassing previous wet-chemical approaches.

  3. Towards scalable parellelism in Monte Carlo particle transport codes using remote memory access

    Energy Technology Data Exchange (ETDEWEB)

    Romano, Paul K [Los Alamos National Laboratory; Brown, Forrest B [Los Alamos National Laboratory; Forget, Benoit [MIT

    2010-01-01

    One forthcoming challenge in the area of high-performance computing is having the ability to run large-scale problems while coping with less memory per compute node. In this work, they investigate a novel data decomposition method that would allow Monte Carlo transport calculations to be performed on systems with limited memory per compute node. In this method, each compute node remotely retrieves a small set of geometry and cross-section data as needed and remotely accumulates local tallies when crossing the boundary of the local spatial domain. initial results demonstrate that while the method does allow large problems to be run in a memory-limited environment, achieving scalability may be difficult due to inefficiencies in the current implementation of RMA operations.

  4. Socio-economic status influences blood pressure control despite equal access to care

    DEFF Research Database (Denmark)

    Paulsen, M S; Andersen, M; Munck, A P

    2012-01-01

    OBJECTIVE: Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general...

  5. Access and control of agro-biotechnology : Bt cotton, ecological change and risk in China

    NARCIS (Netherlands)

    Ho, Peter; Zhao, Jennifer H.; Xue, Dayuan

    2009-01-01

    This article argues that if the introduction of genetically modified crops (GM crops) in developing countries is to be successful, we can and should not evade questions of access and control of technology. It implies probing into the experiences, perceptions and understanding of GM crops by the prim

  6. A Random-Walk Based Privacy-Preserving Access Control for Online Social Networks

    Directory of Open Access Journals (Sweden)

    You-sheng Zhou

    2016-02-01

    Full Text Available Online social networks are popularized with people to connect friends, share resources etc. Meanwhile, the online social networks always suffer the problem of privacy exposure. The existing methods to prevent exposure are to enforce access control provided by the social network providers or social network users. However, those enforcements are impractical since one of essential goal of social network application is to share updates freely and instantly. To better the security and availability in social network applications, a novel random walking based access control of social network is proposed in this paper. Unlike using explicit attribute based match in the existing schemes, the results from random walking are employed to securely compute L1 distance between two social network users in the presented scheme, which not only avoids the leakage of private attributes, but also enables each social network user to define access control policy independently. The experimental results show that the proposed scheme can facilitate the access control for online social network.

  7. Access and control of agro-biotechnology : Bt cotton, ecological change and risk in China

    NARCIS (Netherlands)

    Ho, Peter; Zhao, Jennifer H.; Xue, Dayuan

    2009-01-01

    This article argues that if the introduction of genetically modified crops (GM crops) in developing countries is to be successful, we can and should not evade questions of access and control of technology. It implies probing into the experiences, perceptions and understanding of GM crops by the prim

  8. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  9. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  10. Policy Based Access Control in Dynamic Grid-based Collaborative Environment

    NARCIS (Netherlands)

    Y. Demchenko; L. Gommans; A. Tokmakoff; R. van Buuren

    2006-01-01

    This paper describes the design and development of a flexible, customer-driven, security infrastructure for Gridbased Collaborative Environments. The paper proposes further development of the access control model built around a service or resource provisioning agreement (e.g., an experiment or proje

  11. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    Science.gov (United States)

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  12. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to b

  13. Data is key: introducing the data-based access control paradigm

    NARCIS (Netherlands)

    Pieters, Wolter; Tang, Qiang

    2009-01-01

    According to the Jericho forum, the trend in information security is moving the security perimeter as close to the data as possible. In this context, we suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what

  14. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    Cleeff, van André; Pieters, Wolter; Wieringa, Roel

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been inve

  15. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases

    DEFF Research Database (Denmark)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina

    2011-01-01

    for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken...

  16. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator...

  17. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall—...

  18. Accessing health care in a rural area: an evaluation of a voluntary medical transport scheme in the English Midlands.

    Science.gov (United States)

    Sherwood, K B; Lewis, G J

    2000-12-01

    In recent years notions of self-help and voluntarism have emerged as key elements in the delivery of services in rural England. This paper explores these themes by reference to 'Rural Wheels', a voluntary medical transport scheme in rural Northamptonshire, introduced to overcome the closure of branch surgeries and to provide access to a new medical centre. By focusing upon the organisation and operations of the scheme, the paper highlights the important role it plays in the welfare of rural residents, particularly elderly women. Yet, because effectively it is run by a small core group, the paper raises questions not just about the viability of this scheme but also about the increasing commitment of central government to the voluntary sector as a means of delivering health care to rural people.

  19. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Science.gov (United States)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  20. Controlling and measuring quantum transport of heat in trapped-ion crystals.

    Science.gov (United States)

    Bermudez, A; Bruderer, M; Plenio, M B

    2013-07-26

    Measuring heat flow through nanoscale devices poses formidable practical difficulties as there is no "ampere meter" for heat. We propose to overcome this problem in a chain of trapped ions, where laser cooling the chain edges to different temperatures induces a heat current of local vibrations (vibrons). We show how to efficiently control and measure this current, including fluctuations, by coupling vibrons to internal ion states. This demonstrates that ion crystals provide an ideal platform for studying quantum transport, e.g., through thermal analogues of quantum wires and quantum dots. Notably, ion crystals may give access to measurements of the elusive bosonic fluctuations in heat currents and the onset of Fourier's law. Our results are strongly supported by numerical simulations for a realistic implementation with specific ions and system parameters.

  1. RCT: Module 2.10, Access Control and Work Area Setup, Course 8776

    Energy Technology Data Exchange (ETDEWEB)

    Hillmer, Kurt T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-11

    This course presents information on radiological work permits (RWPs), various types of postings used in radiological areas, radiological area setups, access controls, and releases of material from radiological areas. All of these are fundamental duties of RCTs. This course will prepare the student with the skills necessary for radiological control technician (RCT) qualification by passing quizzes, tests, and the RCT Comprehensive Phase 1, Unit 2 Examination (TEST 27566) and providing in-thefield skills.

  2. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are so

  3. 78 FR 721 - California State Nonroad Engine Pollution Control Standards; Transport Refrigeration Units...

    Science.gov (United States)

    2013-01-04

    ... AGENCY California State Nonroad Engine Pollution Control Standards; Transport Refrigeration Units... Transport Refrigeration Units (TRU) and TRU Generator Sets and Facilities Where TRUs Operate.'' CARB has...''), regarding its ``Airborne Toxic Control Measure for In-Use Diesel-Fueled Transport Refrigeration Units...

  4. A survey of medium access control protocols for wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Elvio João Leonardo

    2004-01-01

    Full Text Available A number of issues distinguishes Medium Access Control (MAC protocols for wireless networks from those used in wireline systems. In addition, for ad-hoc networks, the characteristics of the radio channel, the diverse physical-layer technologies available and the range of services envisioned make it a difficult task to design an algorithm to discipline the access to the shared medium that results efficient, fair, power consumption sensitive and delay bound. This article presents the current “state-of-art” in this area, including solutions already commercially available as well as those still in study.

  5. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  6. Joint power and multiple access control for wireless mesh network with Rose projection method.

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  7. Media access control and resource allocation for next generation passive optical networks

    CERN Document Server

    Ansari, Nirwan

    2013-01-01

    This book focuses on various Passive optical networks (PONs)  types, including currently deployed Ethernet PON (EPON) and Gigabit PON (GPON) as well as next generation WDM PON and OFDM PON. Also this book examines the integrated optical and wireless access networks. Concentrating on two issues in these networks: media access control (MAC) and resource allocation. These two problems can greatly affect performances of PONs such as network resource utilization and QoS of end users. Finally this book will discuss various solutions to address the MAC and resource allocation issues in various PON networks.

  8. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    Science.gov (United States)

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  9. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  10. Secured Resource Sharing in Cloud Storage using Policy based Access Control

    Directory of Open Access Journals (Sweden)

    S. Imavathy

    2015-11-01

    Full Text Available Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS, over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health. In this approach, a secured cloud storage system that achieves policy-based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The access policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built upon a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.

  11. Potentials and limitations for the use of accessibility measures for national transport policy goals in freight transport and logistics: evidence from Västra Götaland County, Sweden

    Directory of Open Access Journals (Sweden)

    Anders Larsson

    2017-05-01

    Full Text Available In Swedish national transport policy is freight transport regarded as a major facilitator for economic development on all geographical levels. At the same time it is noted that methods and data on business location and transportation is not adequate in order to follow-up transport policy objectives. This paper reports on a pilot study on the potential to develop accessibility measures to support and follow up policy objectives in Swedish context. The concept of accessibility and its practical use in concrete measures is discussed and problematized. A number of practical examples from Region Västra Götaland are used as illustrations. In terms of results the study identifies a number of potentials and limitations of using accessibility measures for freight transport issues. The usefulness is mainly driven by the integration capability of transport and land-use. This opens up for more complex questions and measures and thus supports the integration between planning specialisations. Limitations are to a large extent related to data availability and quality and to the degree of which models are possible to communicate to non-experts. The concluding discussion highlights how the policy and governance context is key in understanding how to best utilise the potential strengths of the accessibility concept and measures.

  12. Optimal Medium Access Control in Cognitive Radios: A Sequential Design Approach

    CERN Document Server

    Lai, Lifeng; Jiang, Hai; Poor, H Vincent

    2008-01-01

    The design of medium access control protocols for a cognitive user wishing to opportunistically exploit frequency bands within parts of the radio spectrum having multiple bands is considered. In the scenario under consideration, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring the availability of channels and exploiting the opportunities identified thus far. Using a sequential design approach, an optimal medium access strategy is derived. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is also developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels.

  13. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani;

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... to the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well known...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  14. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova;

    2015-01-01

    It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...... is connected via a communication network to the sensors and actuators on the asset. Such a distributed control scheme may be implemented over a communication network that introduces delay and possibly also message loss. In this paper, we look at the impact of such an imperfect communication network on a wind...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance...

  15. Controls on radium transport by adsorption to iron minerals

    Science.gov (United States)

    Chen, M.; Wang, T.; Kocar, B. D.

    2015-12-01

    Radium is a naturally occurring radioactive metal found in many subsurface environments. Radium isotopes are generated by uranium and thorium decay, and are particularly abundant within groundwaters where minimal porewater flux leads to accumulation. These isotopes are used as natural tracers for estimating submarine groundwater discharge (SGD) [1], allowing for large scale estimation of GW fluxes into and out of the ocean [2]. They also represent a substantial hazard in wastewater produced after hydraulic fracturing for natural gas extraction [3], resulting in a significant risk of environmental release to surface and near-surface waters, and increased cost for water treatment or disposal. Adsorption to mineral surfaces represents a dominant pathway of radium retention in subsurface environments. For SGD studies, adsorption processes impact estimates of GW fluxes, while in hydraulic fracturing, radium adsorption to aquifer solids mediates wastewater radium activities. Analysis of past sorption studies revealed large variability in partition coefficients [4], while examination of radium adsorption kinetics and surface complexation have only recently started [5]. Accordingly, we present the results of sorption and column experiments of radium with a suite of iron minerals representative of those found within deep saline and near-surface (freshwater) aquifers, and evaluate impacts of varying salinity solutions through artificial waters. Further, we explore the impacts of pyrite oxidation and ferrihydrite transformation to other iron-bearing secondary minerals on the transport and retention of radium. These results will provide critical information on the mineralogical controls on radium retention in subsurface environments, and will therefore improve predictions of radium groundwater transport in natural and contaminated systems. [1] Charette, M.A., Buesseler, K.O. & Andrews, J.E., Limnol. Oceanogr. (2001). [2] Moore, W.S., Ann. Rev. Mar. Sci. (2010). [3] Vengosh, A

  16. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases

    DEFF Research Database (Denmark)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina;

    2011-01-01

    After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark...... for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken...

  17. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of IoT...... of a system can be accessed by other parties by means of a set of access policies. For an IoT system such as Radio Frequency Identification (RFID) that collects huge amounts of RFID events data and may store it in the cloud storage for tracking purpose, access control to such data becomes a critical point...... management in RFID system is of paramount importance. A distributed cloud platform approach for the IoT/M2M, which consists of a set of IoT/M2M gateways, is introduced to cope with some inherent issues of IoT network which is highly heterogeneous and distributed in nature. As aresult, access control becomes...

  18. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  19. Distributed joint power and access control algorithm for secondary spectrum sharing

    Science.gov (United States)

    Li, Hongyan; Chen, Enqing; Fu, Hongliang

    2010-08-01

    Based on interference temperature model, the problem of efficient secondary spectrum sharing is formulated as a power optimization problem with some constraints at physical layer. These constraints and optimization objective limit a feasible power vector set which leads to the need of access control besides power control. In this paper, we consider the decentralized cognitive radio network scenario where short-term data service is required, and the problem of distributed joint power and access control is studied to maximize the total secondary system throughput, subject to Quality of Service (QoS) constraints from individual secondary users and interference temperature limit (ITL) from primary system. Firstly, a pricing-based game model was used to solve distributed power allocation optimization problem in both high and low signal to interference noise ratio (SINR) scenarios. Secondly, when not all the secondary links can be supported with their QoS requirement and ITL, a distributed joint power and access control algorithm was introduced to find the allowable links which results in maximum network throughput with all the constraints satisfied, and the convergence performance is tested by simulations.

  20. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  1. Control system of HLS transport line and Linac focusing power supplies

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The control system of transport line and Linac focusing power supplies of Hefei Light Source was built upon Experimental Physics and Industrial Control System. The hardware construction, software design and performance test of the control system are described.

  2. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  3. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  4. An Extension for Combination of Duty Constraints in Role-Based Access Control

    CERN Document Server

    Hosseini, Ali

    2010-01-01

    Among access control models, Role Based Access Control (RBAC) is very useful and is used in many computer systems. Static Combination of Duty (SCD) and Dynamic Combination of Duty (DCD) constraints have been introduced recently for this model to handle dependent roles. These roles must be used together and can be considered as a contrary point of conflicting roles. In this paper, we propose several new types of SCD and DCD constraints. Also, we introduce strong dependent roles and define new groups of SCD constraints for these types of roles as SCD with common items and SCD with union items. In addition, we present an extension for SCD constraints in the presence of hierarchy.

  5. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... is secure against aforementioned attacks. This paper also discusses performance analysis of the protocol in terms of computational time compared to other existing solutions. Furthermore, this paper addresses challenges in IoT and security attacks are modelled with the use cases to give an actual view of IoT......In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...

  6. Medium Access Control for Wireless Sensor Networks based on Impulse Radio Ultra Wideband

    CERN Document Server

    Berthe, Abdoulaye; Dragomirescu, Daniela; Plana, Robert

    2010-01-01

    This paper describes a detailed performance evaluation of distributed Medium Access Control (MAC) protocols for Wireless Sensor Networks based on Impulse Radio Ultra Wideband (IR-UWB) Physical layer (PHY). Two main classes of Medium Access Control protocol have been considered: Slotted and UnSlotted with reliability. The reliability is based on Automatic Repeat ReQuest (ARQ). The performance evaluation is performed using a complete Wireless Sensor Networks (WSN) simulator built on the Global Mobile Information System Simulator (GloMoSim). The optimal operating parameters are first discussed for IR-UWB in terms of slot size, retransmission delay and the number of retransmission, then a comparison between IR-UWB and other transmission techniques in terms of reliability latency and power efficiency.

  7. Proposal for the award of a contract for security and access control services

    CERN Document Server

    2005-01-01

    This document concerns the award of a contract for security and access control services. The Finance Committee is invited to agree to the negotiation of a contract with ENTREPRISE TECHNIQUE DE SECURITE (FR), the lowest bidder, for the provision of security and access control services for three years for a total amount of 7 105 750 euros (11 078 466 Swiss francs), not subject to revision until 1 July 2008, with options for additional services, for an additional amount of 192 420 euros (300 000 Swiss francs), not subject to revision until 1 July 2008, bringing the total amount to 7 298 170 euros (11 378 466 Swiss francs), not subject to revision until 1 July 2008. The contract will include options for two one-year extensions beyond the initial three-year period. The rate of exchange used is that stipulated in the tender

  8. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  9. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  10. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  11. A threat intelligence framework for access control security in the oil industry

    Science.gov (United States)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  12. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  13. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  14. Quality Test Template toward Multi-user Access Control of Internet-Based System

    Directory of Open Access Journals (Sweden)

    Nan Nie

    2011-06-01

    Full Text Available Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

  15. A virtual curtain for the detection of humans and access control

    OpenAIRE

    2010-01-01

    Biometrics has become a popular field for the development of techniques that aim at recognizing humans based upon one or more intrinsic physical or behavioral traits. In particular, many solutions dedicated to access control integrate biometric features like fingerprinting or face recognition. This paper describes a new method designed to interpret what happens when crossing an invisible vertical plane, called virtual curtain hereafter, at the footstep of a door frame. It relies on the use...

  16. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...... a solution for anonymous yet reliable access control and account-ability based on ring and group signatures....

  17. Request Stream Control for the Access to Broadband Multimedia Educational Resources in the Distance Learning System

    Directory of Open Access Journals (Sweden)

    Irina Pavlovna Bolodurina

    2013-10-01

    Full Text Available This article presents a model of queuing system for broadband multimedia educational resources, as well as a model of access to a hybrid cloud system storage. These models are used to enhance the efficiency of computing resources in a distance learning system. An additional OpenStack control module has been developed to achieve the distribution of request streams and balance the load between cloud nodes.

  18. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    Science.gov (United States)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  19. Secured Resource Sharing in Cloud Storage using Policy based Access Control

    Directory of Open Access Journals (Sweden)

    S.Imavathy

    2014-06-01

    Full Text Available Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS, over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health. In this approach, a secured cloud storage system that achieves policy -based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The ac cess policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built up on a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.

  20. Design of Novel Online Access and Control Interface for Remote Experiment on DC Drives

    Directory of Open Access Journals (Sweden)

    Jagadeesh Chandra A.P

    2009-05-01

    Full Text Available Internet has revolutionized the way in which the information is delivered. Laboratory based courses play an important role in technical education. Automation is changing the nature of these laboratories and the system designer’s focus on Internet accessed experiments owing to the availability of several tools to integrate electronic and mechanical hardware with the World Wide Web. Stand-alone approaches in remote learning have grown tremendously in the recent years. One of the important components in remote experimentation is the integration of Virtual Instruments to perform real hardware tasks in near real-time. The paper describes a web interface to the electrical hardware and integration of LabVIEW Virtual Instruments to the remote access and control of DC Drives. Customized electrical hardware serves as the web interface, supporting various features to remotely control and measure the parameters of the electrical machine. Novel techniques have been used to interface a low power data acquisition system with the DC machine driven by the AC power supply. The system uses the client-server architecture to access the web page of the Virtual Instruments through web browser. The developed system imitates the real control of experiment hardware, but being operated remotely through Internet.

  1. A 4D-Role Based Access Control Model for Multitenancy Cloud Platform

    Directory of Open Access Journals (Sweden)

    Jiangfeng Li

    2016-01-01

    Full Text Available Since more and more applications and services have been transferred from servers in the B/S architecture to cloud, user access control has become a significant part in a multitenancy cloud platform. Role based access control model makes users participate in an enterprise system as particular identities. However, in a multitenancy cloud environment, it has a high probability that the information of tenants has been leaked by using existing role based access control (RBAC model. Moreover, management problems may emerge in the multitenancy platform with the increment of the number of tenants. In this paper, a novel concept of 4D-role is presented. With a detailed definition on the concept of 4D-role, a 4D-role based multitenancy model is proposed for running various applications and services in the multitenancy cloud platform. A theoretical analysis indicates that the model has the characters of tenant isolation, role hierarchy, and administration independence. The three characters are also verified by experimental evaluation. Moreover, the evaluation results indicate that the model has a good performance in using cloud resources when large-scale users are operating in the cloud platform simultaneously.

  2. Controllable spin transport in dual-gated silicene

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yu, E-mail: ywang@semi.ac.cn [Department of Physics, Faculty of Science, Kunming University of Science and Technology, Kunming, 650500 Yunnan (China); Lou, Yiyi [Center of Student Community Education and Management, Kunming University of Science and Technology, Kunming, 650500 Yunnan (China)

    2014-07-11

    Based on the dual-gated silicene, we have evaluated theoretically the spin-dependent transport in lateral resonant tunneling structure. By aligning the completely valley-polarized beam with spin-resolved well state in concerned structure, large spin polarization can be expected owing to spin-dependent resonant tunneling mechanism. Under the gate electric field modulation, the forming quantum well state can be externally manipulated, triggering further the emergence of externally-controllable spin polarization. Importantly, integrating the considered structure with a proper valley-filter, which might be constructed from valley-contrasting physics as that in graphene valleytronics, completely-polarized spin beam can also be attained without the assistance of ferromagnetic component, providing thus some profitable strategies to develop nonmagnetic spintronic devices residing on silicene. - Highlights: • Dual-gated silicene forms a lateral spin-resonant tunneling diode. • Resonant spin polarization can be electrically modulated in the concerned spin-RTD. • Dual-gated silicene can be used as beam-dependent spin/valley filter.

  3. A human rights view on access to controlled substances for medical purposes under the international drug control framework.

    Science.gov (United States)

    Gispen, Marie Elske C

    2013-11-05

    The world is confronted with a major public health deficit caused by poor access to controlled essential medicines under the international drug control framework. This is affecting millions of patients on a daily basis and resulting in numerous human rights violations. The present review contextualises this deficit from a human rights perspective. Drug control efforts are informed by a twofold objective stemming from the double nature of scheduled substances: free access for medical purposes should be ensured, though non-medical use of substances such as opium should be restricted. The international drug control framework is, in theory, based on this twofold notion, however at the level of interpretation, monitoring, and implementation, a one-sided emphasis is demonstrated. By tracing a parallel between the obligations of states under the international drug control framework and those that derive from human rights law, the review shows that the two systems seem incoherent and conflicting in nature and flags the importance of cross-disciplinary research into drug control and human rights.

  4. Monoubiquitin-dependent endocytosis of the IRON-REGULATED TRANSPORTER 1 (IRT1) transporter controls iron uptake in plants

    OpenAIRE

    Barberon, Marie; Zelazny, Enric; Robert, Stéphanie; Conejero, Geneviève; Curie, Catherine; Friml, Jìrí; Vert, Grégory

    2011-01-01

    Plants take up iron from the soil using the IRON-REGULATED TRANSPORTER 1 (IRT1) high-affinity iron transporter at the root surface. Sophisticated regulatory mechanisms allow plants to tightly control the levels of IRT1, ensuring optimal absorption of essential but toxic iron. Here, we demonstrate that overexpression of Arabidopsis thaliana IRT1 leads to constitutive IRT1 protein accumulation, metal overload, and oxidative stress. IRT1 is unexpectedly found in trans-Golgi network/early endosom...

  5. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  6. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  7. A concurrent access MAC protocol for cognitive radio ad hoc networks without common control channel

    Science.gov (United States)

    Timalsina, Sunil K.; Moh, Sangman; Chung, Ilyong; Kang, Moonsoo

    2013-12-01

    Cognitive radio ad hoc networks (CRAHNs) consist of autonomous nodes that operate in ad hoc mode and aim at efficient utilization of spectrum resources. Usually, the cognitive nodes in a CRAHN exploit a number of available channels, but these channels are not necessarily common to all nodes. Such a network environment poses the problem of establishing a common control channel (CCC) as there might be no channel common to all the network members at all. In designing protocols, therefore, it is highly desirable to consider the network environment with no CCC. In this article, we propose a MAC protocol called concurrent access MAC (CA-MAC) that operates in the network environment with no CCC. The two devices in a communication pair can communicate with each other even if they have only one common channel available. Therefore, the problems with CCC (such as channel saturation and denial of service attacks) can also be resolved. In CA-MAC, channel accesses are distributed over communication pairs, resulting in increased network connectivity. In addition, CA-MAC allows different communication pairs to access multiple channels concurrently. According to our performance study, CA-MAC provides higher network connectivity with shorter channel access delay compared to SYN-MAC, which is the conventional key MAC protocol for the network environment with no CCC, resulting in better network throughput.

  8. Analysis of transport accessibility in rural areas of Olsztyn county Dostępność transportowa obszarów wiejskich powiatu olsztyńskiego

    Directory of Open Access Journals (Sweden)

    Waldemar Kozłowski

    2012-12-01

    Full Text Available A significant impact on the multifunctional development of rural areas is the so-called transport accessibility. This applies mainly to the capabilities and reach the pace of the in-habitants of the so-called areas peripheral to the main economic centers of the province. The research includes analysis of the availability of transport in quantitative and qualitative as-pects, which was defined for the purposes of research. Quantity and quality of transport in-frastructure, the number of connections, length and travel time to the most important eco-nomic centers were taken into consideration. Analysis of transport availability sets the target application development, which is to determine the key investment priorities for the next programming periods of transport infrastructure development of the Warmia and Mazury province.

  9. 48 CFR 247.370 - DD Form 1384, Transportation Control and Movement Document.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false DD Form 1384... Transportation in Supply Contracts 247.370 DD Form 1384, Transportation Control and Movement Document. The transportation office of the shipping activity prepares the DD Form 1384 to accompany all shipments made...

  10. Layered Multicast Encryption of Motion JPEG2000 Code Streams for Flexible Access Control

    Science.gov (United States)

    Nakachi, Takayuki; Toyoshima, Kan; Tonomura, Yoshihide; Fujii, Tatsuya

    In this paper, we propose a layered multicast encryption scheme that provides flexible access control to motion JPEG2000 code streams. JPEG2000 generates layered code streams and offers flexible scalability in characteristics such as resolution and SNR. The layered multicast encryption proposal allows a sender to multicast the encrypted JPEG2000 code streams such that only designated groups of users can decrypt the layered code streams. While keeping the layering functionality, the proposed method offers useful properties such as 1) video quality control using only one private key, 2) guaranteed security, and 3) low computational complexity comparable to conventional non-layered encryption. Simulation results show the usefulness of the proposed method.

  11. A method for controlling enterprises access to an eco-industrial park.

    Science.gov (United States)

    Zhu, Li; Zhou, Jianren; Cui, Zhaojie; Liu, Lei

    2010-09-15

    Member enterprises have a vital effect on the stability and system efficiency of an eco-industrial park (EIP), and a selection and control for them is an important part. This paper proposes a new method which is an establishment of both an access indicator system and an extendable optimal degree evaluation model. The indicator system comprises seven primary indicators and twenty-seven secondary indicators. The first three primary indicators, matching the existing industrial chains or not, park capacity and park environmental performance improvement, are proposed from the perspective of an EIP. The others including eco-design, economic benefit, utilization of resources, and pollution control, are suggested from the point of view of enterprises. This new access indicator system provides a basis for evaluating candidate enterprises. The extendable optimal degree evaluation which was proposed by Prof. Caiwen is a method to assess the satisfactoriness of all the indicators and to assign an optimal degree order to each candidate enterprise accordingly. There are four steps to conduct the evaluation after establishing the access indicator system: (1) selecting correlation function; (2) calculating correlations; (3) assigning weights and current values of indicators; and (4) calculating the optimal degree of all the candidate enterprises. The enterprises can be ranked based on optimal degree results. The highest-ranked enterprise should have the highest priority of entering the EIP. This study provides the specifics of applying the method by examining the case of Yantai Economy Technology Development Zone EIP (YTEIP) in Shandong province. The method provides a practical tool for controling enterprise access to an EIP. However, the reasonability and validity of indicators and effectiveness of the established method of extendable optimal degree evaluation merit further studies.

  12. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases.

    Directory of Open Access Journals (Sweden)

    Eveline Hürlimann

    2011-12-01

    Full Text Available BACKGROUND: After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs. Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. METHODOLOGY: With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature', contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques. The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. PRINCIPAL FINDINGS: At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. CONCLUSIONS: An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment

  13. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  14. An interaction-based access control model (IBAC) for collaborative services

    Energy Technology Data Exchange (ETDEWEB)

    Altunay, Mine; /Fermilab; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  15. A Network Access Control Framework for 6LoWPAN Networks

    Directory of Open Access Journals (Sweden)

    Amaro F. de Sousa

    2013-01-01

    Full Text Available Low power over wireless personal area networks (LoWPAN, in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes.

  16. Frequency-selective design of wireless power transfer systems for controlled access applications

    Science.gov (United States)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  17. Can “Feature” be used to Model the Changing Access Control Policies?

    Directory of Open Access Journals (Sweden)

    K.Shantha Kumari

    2012-11-01

    Full Text Available Access control policies [ACPs] regulate the access to data and resources in information systems. These ACPs are framed from the functional requirements and the Organizational security & privacy policies. It was found to be beneficial, when the ACPs are included in the early phases of the software development leading to secure development of information systems. Many approaches are available for including the ACPs in requirements and design phase. They relied on UML artifacts, Aspects and also Feature for this purpose. But the earlier modeling approaches are limited in expressing the evolving ACPs due to organizational policy changes and business process modifications. In this paper, we analyze, whether “Feature”- defined as an increment in program functionality can be used as a modeling entity to represent the Evolving Access control requirements. We discuss the two prominent approaches that use Feature in modeling ACPs. Also we have a comparative analysis to find the suitability of Features in the context of changing ACPs. We conclude with our findings and provide directions for further research.

  18. New orientation and accessibility option for persons with visual impairment: transportation applications for remote infrared audible signage.

    Science.gov (United States)

    Crandall, William; Bentzen, Billie Louise; Myers, Linda; Brabyn, John

    2001-05-01

    BACKGROUND: For a blind or visually impaired person, a vital prerequisite to accessing any feature of the built environment is being able to find this feature. Braille signs, even where available, do not replace the functions of print signage because they cannot be read from a distance. Remotely readable infrared signs utilise spoken infrared message transmissions to label key environmental features, so that a blind person with a suitable receiver can locate and identify them from a distance. METHODS: Three problems that are among the most challenging and dangerous faced by blind travellers are negotiating complex transit stations, locating bus stops and safely and efficiently crossing light-controlled intersections. We report the results of human factors studies using a remote infrared audible sign system (RIAS), Talking Signs(R), in these critical tasks, examining issues such as the amount of training needed to use the system, its impact on performance and safety, benefits for different population subgroups and user opinions of its value. RESULTS: Results are presented in the form of both objective performance measures and in subjects' ratings of the usefulness of the system in performing these tasks. Findings are that blind people can quickly and easily learn to use remote infrared audible signage effectively and that its use improves travel safety, efficiency and independence.? CONCLUSIONS: The technology provides equal access to a wide variety of public facilities.

  19. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    CERN Document Server

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  20. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  1. In-home Power Line Communication Media Access Control Protocol Based on Collision Resolution

    Institute of Scientific and Technical Information of China (English)

    WANG Bo; HUANG Pei-wei; ZHONG You-ping; QI Ying-hao

    2009-01-01

    Most existing media access control (MAC) protocols in power line communication (PLC) networks just discard the colliding data packets when collision occurs. The collision deteriorates throughput and delay performance of system under high traffic conditions. This article presents a novel media access scheme with fast collision resolution for in-home power line networks. It works by first recognizing the colliding stations through detecting the inserted unique ID sequence ahead of data packets, then the source nodes retransmitting their packets immediately after the collision slot. The proposed protocol maintains the benefits of ALOHA systems. It needs no scheduling overhead and is suitable for bursty sources, such as multimedia data packets. Computer simulations have demonstrated that this approach can achieve high throughput due to its ability of resolving collisions.

  2. Incoherent optical correlators and phase encoding of identification codes for access control or authentication

    Science.gov (United States)

    Brasher, James D.; Johnson, Eric G.

    1997-09-01

    We show how phase-only filters can be used in incoherent optical correlators for security applications such as access control, identification, or authentication. As a specific example, a biometric signature, a fingerprint, is encoded in a phase-only representation. The phase encoding is accomplished with the method of generalized projections onto constraint sets implemented by an iterated Fourier transform algorithm. The operation of an incoherent optical security system using both a phase-only filter generated with the generalized projections algorithm and a phase-only matched filter is simulated. The results demonstrate that the selected access pattern was accepted while a false pattern was rejected by the security system and that better recognition and discrimination performance was attained with the phase-only filter produced by the generalized projections algorithm.

  3. Centralized Role-Based Access Control for Federated Multi-Domain Environments

    Institute of Scientific and Technical Information of China (English)

    YU Guangcan; LU Zhengding; LI Ruixuan; MUDAR Sarem

    2006-01-01

    The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains.

  4. Contribution of Glucose Transport to the Control of the Glycolytic Flux in Trypanosoma brucei

    Science.gov (United States)

    Bakker, Barbara M.; Walsh, Michael C.; Ter Kuile, Benno H.; Mensonides, Femke I. C.; Michels, Paul A. M.; Opperdoes, Fred R.; Westerhoff, Hans V.

    1999-08-01

    The rate of glucose transport across the plasma membrane of the bloodstream form of Trypanosoma brucei was modulated by titration of the hexose transporter with the inhibitor phloretin, and the effect on the glycolytic flux was measured. A rapid glucose uptake assay was developed to measure the transport activity independently of the glycolytic flux. Phloretin proved a competitive inhibitor. When the effect of the intracellular glucose concentration on the inhibition was taken into account, the flux control coefficient of the glucose transporter was between 0.3 and 0.5 at 5 mM glucose. Because the flux control coefficients of all steps in a metabolic pathway sum to 1, this result proves that glucose transport is not the rate-limiting step of trypanosome glycolysis. Under physiological conditions, transport shares the control with other steps. At glucose concentrations much lower than physiological, the glucose carrier assumed all control, in close agreement with model predictions.

  5. Randomized controlled trials in central vascular access devices: A scoping review

    Science.gov (United States)

    Keogh, Samantha; Rickard, Claire M.

    2017-01-01

    Background Randomized controlled trials evaluate the effectiveness of interventions for central venous access devices, however, high complication rates remain. Scoping reviews map the available evidence and demonstrate evidence deficiencies to focus ongoing research priorities. Method A scoping review (January 2006–December 2015) of randomized controlled trials evaluating the effectiveness of interventions to improve central venous access device outcomes; including peripherally inserted central catheters, non-tunneled, tunneled and totally implanted venous access catheters. MeSH terms were used to undertake a systematic search with data extracted by two independent researchers, using a standardized data extraction form. Results In total, 178 trials were included (78 non-tunneled [44%]; 40 peripherally inserted central catheters [22%]; 20 totally implanted [11%]; 12 tunneled [6%]; 6 non-specified [3%]; and 22 combined device trials [12%]). There were 119 trials (68%) involving adult participants only, with 18 (9%) pediatric and 20 (11%) neonatal trials. Insertion-related themes existed in 38% of trials (67 RCTs), 35 RCTs (20%) related to post-insertion patency, with fewer trials on infection prevention (15 RCTs, 8%), education (14RCTs, 8%), and dressing and securement (12 RCTs, 7%). There were 46 different study outcomes reported, with the most common being infection outcomes (161 outcomes; 37%), with divergent definitions used for catheter-related bloodstream and other infections. Conclusion More high quality randomized trials across central venous access device management are necessary, especially in dressing and securement and patency. These can be encouraged by having more studies with multidisciplinary team involvement and consumer engagement. Additionally, there were extensive gaps within population sub-groups, particularly in tunneled devices, and in pediatrics and neonates. Finally, outcome definitions need to be unified for results to be meaningful and

  6. Safeguarding Schiphol airports accessibility for freight transport : the design of a fully automated underground transport system with an extensive use of simulation

    NARCIS (Netherlands)

    Heijden, van der M.C.; Harten, van A.; Ebben, M.J.R.; Saanen, Y.A.; Valentin, E.C.; Verbraeck, A.

    2001-01-01

    Automated, underground freight transport should enable sustainable economic growth in the Amsterdam area in the Netherlands. An innovative transport system, which guarantees reliable logistics and which avoids congestion problems, is currently being developed. This logistics system will be highly au

  7. Transmission Control of Transport and Technological Cars in Acceleration Mode

    Directory of Open Access Journals (Sweden)

    B. I. Plujnikov

    2015-01-01

    Full Text Available In most structures a transmission of the transport-technological machine (TTM is controlled by automatic systems. In their creating it is necessary to specify the appropriate parameters and algorithms. In the total balance of the machine run time the acceleration mode is the most important. Therefore, an algorithm of the transmission gear ratio change during acceleration largely provides desirable rating of machines.It is known that the process of acceleration is estimated by its dynamic quality and fuel economy. To reach the best rating of both simultaneously is impossible. Therefore, as the criteria of estimate, were chosen the time and fuel consumption during acceleration to a fixed speed value.From a mathematical point of view, these criteria represent the sum of integrals, each of which defines the time or the fuel consumption during acceleration with a certain transmission gear ratio. The problem is formulated as follows: to determine the speed values of the TTM at the moments when the transmission gear ratio is changed providing the minimum values during fixed fuel supply for the estimate criteria. The latter condition in a certain way limits the task, but in explicit form there is no this control action in the dependence data.Given the variety of possible design options for the TTM, the solution is given by a specific example that simplifies the mathematics and makes it easier to understand the results obtained. As a TTM, is considered a passenger car with petrol engine and automatic transmission, which includes a hydrodynamic transformer and three-speed gearbox.A chosen way of solving the problem involves using the theory of ordinary maxima and minima, which allows finding the unknown values of independent variables. The expressions of sub-integral functions are in explicit form obtained and studied for meeting the necessary and sufficient conditions for existence of the extreme point. The result was a proof that in the case of

  8. Perti Net-Based Workflow Access Control Model%基于Perti网的工作流访问控制模型研究

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems.This paper shows how to make access control in workflow system.We give a workflow access control model (WACM) based on several current access control models.The model supports roles assignment and dynamic authorization.The paper defines the workflow using Petri net.It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM).Finally, an example of an e-commerce workflow access control model is discussed in detail.

  9. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    Science.gov (United States)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  10. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  11. Wireless Access Control with Smart Antenna for M2M Communications

    Science.gov (United States)

    Sakamoto, Hiroshi; Bandai, Masaki; Watanabe, Takashi

    Machine to machine (M2M) is a promising technology to achieve an ubiquitous environment by uniting machines and machines over the Internet. The network used for M2M consists of core network and access network. This paper discusses effective controls of the wireless access network for M2M. Among typical examples of the wireless access network for M2M is a wireless sensor network (WSN). WSN for M2M may require energy efficiency, high reliability and throughput. For these requirements, in this paper, we propose a scheme to build a hierarchical sensor network using smart antenna. The proposed scheme uses omni-directional antennas together with smart antennas. Since smart antennas can extend communications distance, the proposed scheme enables reduction of number of hops to reduce the traffic load on relay nodes. As a result, the energy consumption, data collection ratio and throughput can be improved. We implement the proposed scheme on a real testbed. The testbed uses UNAGI as smart antenna nodes and Mica Mote as sensor nodes. In addition to the fundamental evaluation on the testbed, we simulate large-scale sensor networks. The results show the effectiveness of the proposed hierarchical sensor network with smart antennas.

  12. An Efficient Medium Access Control Protocol with Parallel Transmission for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mitsuji Matsumoto

    2012-08-01

    Full Text Available In this paper, we present a novel low power medium access control protocol for wireless sensor networks (WSNs. The proposed protocol, EP-MAC (Efficient MAC with Parallel Transmission achieves high energy efficiency and high packet delivery ratio under different traffic load. EP-MAC protocol is basically based on the Time Division Multiple Access (TDMA approach. The power of Carrier Sense Multiple Access (CSMA is used in order to offset the fundamental problems that the stand-alone TDMA method suffers from, i.e., problems such as lack of scalability, adaptability to varying situations, etc. The novel idea behind the EP-MAC is that it uses the parallel transmission concept with the TDMA link scheduling. EP-MAC uses the methods for the transmission power adjustment, i.e., uses the minimum level power necessary to reach the intended neighbor within a specified bit error rate [BER] target. This reduces energy consumption, as well as further enhances the scope of parallel transmission of the protocol. The simulation studies support the theoretical results, and validate the efficiency of our proposed EP-MAC protocol.

  13. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  14. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  15. A Fuzzy Logic Based Power Control for Wideband Code Division Multiple Access Wireless Networks

    Directory of Open Access Journals (Sweden)

    T. Ravichandran

    2012-01-01

    Full Text Available Problem statement: Resource management is one of the most important engineering issues in 3G systems where multiple traffic classes are supported each being characterized by its required Quality of Service (QoS parameters. Call Admission Control (CAC is one of the resource management functions, which regulates network access to ensure QoS provisioning. Efficient CAC is necessary for the QoS provisioning in WCDMA environment. The effective functioning of WCDMA systems is influenced by the power control utility. Approach: In this study, we propose to design a fuzzy logic based power control for Wideband Code Division Multiple Access Wireless Networks. This proposed technique is aimed at multiple services like voice, video and data for multiclass users. The fuzzy logic technique is used to estimate the optimal admissible users group inclusive of optimum transmitting power level. This technique reduces the interference level and call rejection rate. Results: By simulation results, we demonstrate that the proposed technique achieve reduced energy consumption for a cell with increased throughput. Conclusion: The proposed technique minimizes the power consumption and call rejection rate.

  16. Human Rights and Drug Control : Access to Controlled Essential Medicines in Resource-Constrained Countries

    NARCIS (Netherlands)

    Gispen, M.E.C.

    2017-01-01

    Millions of people worldwide suffer a range of health and socio-economic related problems because of inadequate availability and use of controlled essential medicines like morphine and codeine for pain treatment. As a result, millions of people, often living in lesser-advanced conditions, suffer in

  17. Human Rights and Drug Control : Access to Controlled Essential Medicines in Resource-Constrained Countries

    NARCIS (Netherlands)

    Gispen, M.E.C.

    2017-01-01

    Millions of people worldwide suffer a range of health and socio-economic related problems because of inadequate availability and use of controlled essential medicines like morphine and codeine for pain treatment. As a result, millions of people, often living in lesser-advanced conditions, suffer in

  18. 角色访问控制%Role based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    毛碧波; 孙玉芳

    2003-01-01

    Role based access control (RBAC)was proposed in 70's, and prevailed in 90's, and then Sandhu etc pro-posed formal RBAC model. Now RBAC is attracting increasing attention, and many governmental and commercial or-ganizations have adopted it, its importance is more and more apparent. In this paper we illuminates the distinctionsand similarities of role and user groups, and based the model that was proposed by Sandhu, we examine the relation-ship of role hierarchies and role constraints and formally describes that, and explain the most important part of roleconstraints ,which is separation of duties.

  19. Locks and raspberries: a comparative study of single-board computers for access control

    OpenAIRE

    Romin, Andreas

    2016-01-01

    Over the past decade, there has been a drastic development of the single-board computer market. These computers are now in a position where they can compete with classic embedded hardware. Such fast improvement has led ASSA ABLOY, a well-known lock and security company, to see value in replacing some of their existing access control hardware with an off-the-shelf single-board computer. Therefore, a comparative study of single-board computers was performed for this company. Some of the compare...

  20. Design and Implementation of File Access and Control System Based on Dynamic Web

    Institute of Scientific and Technical Information of China (English)

    GAO Fuxiang; YAO Lan; BAO Shengfei; YU Ge

    2006-01-01

    A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained.

  1. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    OpenAIRE

    Kilhung Lee

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is eit...

  2. Development and process control of magnetic tunnel junctions for magnetic random access memory devices

    Science.gov (United States)

    Kula, Witold; Wolfman, Jerome; Ounadjela, Kamel; Chen, Eugene; Koutny, William

    2003-05-01

    We report on the development and process control of magnetic tunnel junctions (MTJs) for magnetic random access memory (MRAM) devices. It is demonstrated that MTJs with high magnetoresistance ˜40% at 300 mV, resistance-area product (RA) ˜1-3 kΩ μm2, low intrinsic interlayer coupling (Hin) ˜2-3 Oe, and excellent bit switching characteristics can be developed and fully integrated with complementary metal-oxide-semiconductor circuitry into MRAM devices. MTJ uniformity and repeatability level suitable for mass production has been demonstrated with the advanced processing and monitoring techniques.

  3. Context-Sensitive Access Control Policy Evaluation and Enforcement Using Vulnerability Exploitation Data

    Directory of Open Access Journals (Sweden)

    Hassan Rasheed

    2013-09-01

    Full Text Available Conventional approaches for adapting security enforcement in the face of attacks rely on administrators to make policy changes that will limit damage to the system. Paradigm shifts in the capabilities of attack tools demand supplementary strategies that can also adjust policy enforcement dynamically. We extend the current research by proposing an approach for integrating real-time security assessment data into access control systems. Critical application scenarios are tested to examine the impact of using risk data in policy evaluation and enforcement.

  4. A Flexible Component based Access Control Architecture for OPeNDAP Services

    Science.gov (United States)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  5. Power of the Pill or Power of Abortion? Re-Examining the Effects of Young Women's Access to Reproductive Control

    OpenAIRE

    Myers, Caitlin Knowles

    2012-01-01

    Recent research postulating that the diffusion of confidential access to the birth control pill to young women in the United States contributed to the dramatic social changes of the late 1960s and 1970s has not adequately accounted for the largely contemporaneous diffusion of access to abortion. Estimates using a new panel of data on state policies related to access to the pill and abortion indicate that while access to the pill may have played a role in the sexual revolution, it had little e...

  6. Ion Transport through Diffusion Layer Controlled by Charge Mosaic Membrane

    Directory of Open Access Journals (Sweden)

    Akira Yamauchi

    2012-01-01

    Full Text Available The kinetic transport behaviors in near interface of the membranes were studied using commercial anion and cation exchange membrane and charge mosaic membrane. Current-voltage curve gave the limiting current density that indicates the ceiling of conventional flux. From chronopotentiometry above the limiting current density, the transition time was estimated. The thickness of boundary layer was derived with conjunction with the conventional limiting current density and the transition time from steady state flux. On the other hand, the charge mosaic membrane was introduced in order to examine the ion transport on the membrane surface in detail. The concentration profile was discussed by the kinetic transport number with regard to the water dissociation (splitting on the membrane surface.

  7. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  8. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  9. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  10. Spin-polarized transport in Rashba controlled rings

    Energy Technology Data Exchange (ETDEWEB)

    Romeo, F. [Dipartimento di Fisica ' E. R. Caianiello' and Unita C.N.I.S.M., Universita di Salerno, I-84081 Baronissi (Italy); Citro, R. [Dipartimento di Fisica ' E. R. Caianiello' and Unita C.N.I.S.M., Universita di Salerno, I-84081 Baronissi (Italy)]. E-mail: citro@sa.infn.it

    2007-09-15

    We study spin-polarized transport in a Rashba one-dimensional ring interrupted by a tunnel barrier placed in one arm and symmetrically coupled to two external leads. By means of the scattering matrix approach, we investigate the effects on the transport properties of both an applied magnetic flux (Aharonov-Bohm flux) and an effective Aharonov-Casher flux induced by the spin-orbit (SO) Rashba interaction. By varying the model parameters we show a spin-filtering effect relevant for the experimental detection of SO interaction in mesoscopic structures.

  11. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    Science.gov (United States)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  12. Safeguarding Schiphol airports accessibility for freight transport : the design of a fully automated underground transport system with an extensive use of simulation

    OpenAIRE

    Heijden, van der, Hans; Harten, van, A.; Ebben, M.J.R.; Saanen, Y.A.; Valentin, E.C.; Verbraeck, A

    2001-01-01

    Automated, underground freight transport should enable sustainable economic growth in the Amsterdam area in the Netherlands. An innovative transport system, which guarantees reliable logistics and which avoids congestion problems, is currently being developed. This logistics system will be highly automated, using AGVs (Automatic Guided Vehicles) for transport and automated loading and unloading equipment. It is unique in its scale, covering a 15-25 km tube system, and in its complexity, using...

  13. Bedload transport controls bedrock erosion under sediment-starved conditions

    Science.gov (United States)

    Beer, A. R.; Turowski, J. M.

    2015-07-01

    Fluvial bedrock incision constrains the pace of mountainous landscape evolution. Bedrock erosion processes have been described with incision models that are widely applied in river-reach and catchment-scale studies. However, so far no linked field data set at the process scale had been published that permits the assessment of model plausibility and accuracy. Here, we evaluate the predictive power of various incision models using independent data on hydraulics, bedload transport and erosion recorded on an artificial bedrock slab installed in a steep bedrock stream section for a single bedload transport event. The influence of transported bedload on the erosion rate (the "tools effect") is shown to be dominant, while other sediment effects are of minor importance. Hence, a simple temporally distributed incision model, in which erosion rate is proportional to bedload transport rate, is proposed for transient local studies under detachment-limited conditions. This model can be site-calibrated with temporally lumped bedload and erosion data and its applicability can be assessed by visual inspection of the study site. For the event at hand, basic discharge-based models, such as derivatives of the stream power model family, are adequate to reproduce the overall trend of the observed erosion rate. This may be relevant for long-term studies of landscape evolution without specific interest in transient local behavior. However, it remains to be seen whether the same model calibration can reliably predict erosion in future events.

  14. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    Science.gov (United States)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  15. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-06-01

    Full Text Available At the center of core technologies for a future cyber world, such as Internet of Things (IoT or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC-based electronic payments. Near-field Communication (NFC integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.

  16. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  17. Stability of multiple access network control schemes with carrier sensing and exponential backoff

    Science.gov (United States)

    Barany, Ernest; Krupa, Maciej

    2006-05-01

    A new approach to determine the stability of multiple access network control schemes is presented. A “busy” network (the precise meaning of the term “busy” will be presented in the text) is modelled as a switched single-server hybrid dynamical system whose switching laws are stochastic and are based on typical multiple access network control protocols such as ALOHA and ethernet. The techniques are used to compute the critical ratio of traffic production per network node to total available bandwidth that ensures that data packets will not accumulate unboundedly in waiting queues at each node. This is a measure of stability of the network and is an emergent, global, property determined by decentralized, autonomous behavior of each node. The behavior of each individual node is regarded as “microscopic” and the collective behavior of the network as a whole are emergent consequences of such microscopic laws. The results follow from the stationary distribution property of ergodic Markov chains.

  18. CONTEXT BASED ANDROID APPLICATIONADMINISTRATIVE ACCESS CONTROL (CBAA–AAC FOR SMART PHONES

    Directory of Open Access Journals (Sweden)

    S. Sharavanan

    2016-07-01

    Full Text Available Android applications in smart phones are generally towards provide greater flexibility and convince for users. Considering the fact that the Android applications are having privilege to access data and resources in mobile after it gets installed (one time permission provided by end user on the time installation, these application may also lead to issues in security for the user data as well as issues relate smart phone with peripheral environment. A practical example for an issue which relates smart phone with peripheral environment can be even an Android smart phone application of a college student use camera resource to capture photos of R&D cell and transfer without user or organization permission. The security of the organization and user should be prevented by providing an adoptable solution. The proposed concept of CBAA-AAC (Context Based Android Application Administrative Access Control is used to control the privileges of any Android application over a corresponding longitude and latitude by the organization administrator. In this way, administrator is able to block malicious application of every individual smart phone which can have activity towards utilizing services and resources that may affect the security of the organization, such an move is must for assuring security of any organization and educational institutions while they allow users to “bring their own smart phones/mobile devices” into the campus.

  19. Numerical and Experimental Investigation of Turbulent Transport Control via Shaping of Radial Plasma Flow Profiles

    Energy Technology Data Exchange (ETDEWEB)

    Gilmore, Mark Allen [Univ. of New Mexico, Albuquerque, NM (United States)

    2017-02-05

    Turbulence, and turbulence-driven transport are ubiquitous in magnetically confined plasmas, where there is an intimate relationship between turbulence, transport, instability driving mechanisms (such as gradients), plasma flows, and flow shear. Though many of the detailed physics of the interrelationship between turbulence, transport, drive mechanisms, and flow remain unclear, there have been many demonstrations that transport and/or turbulence can be suppressed or reduced via manipulations of plasma flow profiles. This is well known in magnetic fusion plasmas [e.g., high confinement mode (H-mode) and internal transport barriers (ITB’s)], and has also been demonstrated in laboratory plasmas. However, it may be that the levels of particle transport obtained in such cases [e.g. H-mode, ITB’s] are actually lower than is desirable for a practical fusion device. Ideally, one would be able to actively feedback control the turbulent transport, via manipulation of the flow profiles. The purpose of this research was to investigate the feasibility of using both advanced model-based control algorithms, as well as non-model-based algorithms, to control cross-field turbulence-driven particle transport through appropriate manipulation of radial plasma flow profiles. The University of New Mexico was responsible for the experimental portion of the project, while our collaborators at the University of Montana provided plasma transport modeling, and collaborators at Lehigh University developed and explored control methods.

  20. Preliminary assessment of Tongue Drive System in medium term usage for computer access and wheelchair control.

    Science.gov (United States)

    Yousefi, Behnaz; Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless, wearable assistive technology that enables individuals with severe motor impairments access computers, drive wheelchairs, and control their environments using tongue motion. In this paper, we have evaluated the TDS performance as a computer input device using ISO9241-9 standard tasks for pointing and selecting, based on the well known Fitts' Law, and as a powered wheelchair controller through an obstacle course navigation task. Nine able-bodied subjects who already had tongue piercing participated in this trial over 5 sessions during 5 weeks, allowing us to study the TDS learning process and its current limiting factors. Subjects worn tongue rings made of titanium in the form of a barbell with a small rare earth magnetic tracer hermetically sealed inside the upper ball. Comparing the results between 1(st) and 5(th) sessions showed that subjects' performance improved in all the measures through 5 sessions, demonstrating the effects of learning.