Access control mechanism of wireless gateway based on open flow
NASA Astrophysics Data System (ADS)
Peng, Rong; Ding, Lei
2017-08-01
In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.
An Attribute Based Access Control Framework for Healthcare System
NASA Astrophysics Data System (ADS)
Afshar, Majid; Samet, Saeed; Hu, Ting
2018-01-01
Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
Proximity-based access control for context-sensitive information provision in SOA-based systems
NASA Astrophysics Data System (ADS)
Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew
2014-06-01
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
A dynamic access control method based on QoS requirement
NASA Astrophysics Data System (ADS)
Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang
2013-03-01
A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
Sucurovic, Snezana; Milutinovic, Veljko
2008-01-01
The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.
Task Delegation Based Access Control Models for Workflow Systems
NASA Astrophysics Data System (ADS)
Gaaloul, Khaled; Charoy, François
e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.
Access Control in Location-Based Services
NASA Astrophysics Data System (ADS)
Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
Semantically Enriched Data Access Policies in eHealth.
Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin
2016-11-01
Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.
A Web-Based Remote Access Laboratory Using SCADA
ERIC Educational Resources Information Center
Aydogmus, Z.; Aydogmus, O.
2009-01-01
The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Atom-Role-Based Access Control Model
NASA Astrophysics Data System (ADS)
Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong
Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.
Spatiotemporal access model based on reputation for the sensing layer of the IoT.
Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651
An action-based fine-grained access control mechanism for structured documents and its application.
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT
Guo, Yunchuan; Yin, Lihua; Li, Chao
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
An improved task-role-based access control model for G-CSCW applications
NASA Astrophysics Data System (ADS)
He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang
2005-10-01
Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.
Access Control for Cooperation Systems Based on Group Situation
NASA Astrophysics Data System (ADS)
Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo
Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.
Access Control of Web and Java Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan
2011-01-01
Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Mandatory and Location-Aware Access Control for Relational Databases
NASA Astrophysics Data System (ADS)
Decker, Michael
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
A contextual role-based access control authorization model for electronic patient record.
Motta, Gustavo H M B; Furuie, Sergio S
2003-09-01
The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.
Efficient Access Control in Multimedia Social Networks
NASA Astrophysics Data System (ADS)
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
Yi, Meng; Chen, Qingkui; Xiong, Neal N
2016-11-03
This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
Information-Flow-Based Access Control for Web Browsers
NASA Astrophysics Data System (ADS)
Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu
The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
Simple measurement-based admission control for DiffServ access networks
NASA Astrophysics Data System (ADS)
Lakkakorpi, Jani
2002-07-01
In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.
Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943
Baek, Seungsoo; Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.
ERIC Educational Resources Information Center
Antony, Laljith
2016-01-01
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
Yi, Meng; Chen, Qingkui; Xiong, Neal N.
2016-01-01
This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878
Accessibility, stabilizability, and feedback control of continuous orbital transfer.
Gurfil, Pini
2004-05-01
This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.
Access Control Management for SCADA Systems
NASA Astrophysics Data System (ADS)
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
Health Information System Role-Based Access Control Current Security Trends and Challenges.
de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo
2018-01-01
This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
Takeda, Toshihiro; Ueda, Kanayo; Nakagawa, Akito; Manabe, Shirou; Okada, Katsuki; Mihara, Naoki; Matsumura, Yasushi
2017-01-01
Electronic health record (EHR) systems are necessary for the sharing of medical information between care delivery organizations (CDOs). We developed a document-based EHR system in which all of the PDF documents that are stored in our electronic medical record system can be disclosed to selected target CDOs. An access control list (ACL) file was designed based on the HL7 CDA header to manage the information that is disclosed.
Security middleware infrastructure for DICOM images in health information systems.
Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A
2003-12-01
In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.
On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)
2013-07-01
Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of
Secure access control and large scale robust representation for online multimedia event detection.
Liu, Changyu; Lu, Bin; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.
NASA Technical Reports Server (NTRS)
Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)
2000-01-01
A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.
Role-based access control permissions
Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander
2017-04-25
Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.
NASA Astrophysics Data System (ADS)
Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin
2017-10-01
Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.
Securely and Flexibly Sharing a Biomedical Data Management System
Wang, Fusheng; Hussels, Phillip; Liu, Peiya
2011-01-01
Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285
Experience with ActiveX control for simple channel access
DOE Office of Scientific and Technical Information (OSTI.GOV)
Timossi, C.; Nishimura, H.; McDonald, J.
2003-05-15
Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.
Embedded controller for GEM detector readout system
NASA Astrophysics Data System (ADS)
Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek
2013-10-01
This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses
NASA Astrophysics Data System (ADS)
Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon
This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-05-17
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
RBAC-Matrix-based EMR right management system to improve HIPAA compliance.
Lee, Hung-Chang; Chang, Shih-Hsin
2012-10-01
Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.
Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection
Liu, Changyu; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840
Design of an Efficient CAC for a Broadband DVB-S/DVB-RCS Satellite Access Network
NASA Astrophysics Data System (ADS)
Inzerilli, Tiziano; Montozzi, Simone
2003-07-01
This paper deals with efficient utilization of network resources in an advanced broadband satellite access system. It proposes a technique for admission control of IP streams with guaranteed QoS which does not interfere with the particular BoD (Bandwidth on Demand) algorithm that handles access to uplink bandwidth, an essential part of a DVB- RCS architecture. This feature of the admission control greatly simplify its integration in the satellite network. The purpose of this admission control algorithm in particular is to suitably and dynamically configure the overall traffic control parameters, in the access terminal of the user and service segment, with a simple approach which does not introduces limitations and/or constraints to the BoD algorithm. Performance of the proposed algorithm is evaluated thorugh Opnet simulations using an ad-hoc platform modeling DVB-based satellite access.The results presented in this paper were obtained within SATIP6 project, which is sponsored within the 5th EU Research Programme, IST. The aims of the project are to evaluate and demonstrate key issues of the integration of satellite-based access networks into the Internet in order to support multimedia services over wide areas. The satellite link layer is based on DVB-S on the forward link and DVB-RCS on the return link. Adaptation and optimization of the DVB-RCS access standard in order to support QoS provision are central issues of the project. They are handled through an integration of Connection Admission Control (CAC), Traffic Shaping and Policing techniques.
[Public control and equity of access to hospitals under non-State public administration].
Carneiro Junior, Nivaldo; Elias, Paulo Eduardo
2006-10-01
To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.
Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng
2016-10-12
Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.
Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng
2016-01-01
Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel. PMID:27754316
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.
A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-01-01
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840
Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks
NASA Astrophysics Data System (ADS)
Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan
2018-01-01
In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
NASA Astrophysics Data System (ADS)
Park, Chang-Seop; Kang, Hyun-Sun
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
Type-Based Access Control in Data-Centric Systems
NASA Astrophysics Data System (ADS)
Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio
Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.
Context-aware access control for pervasive access to process-based healthcare systems.
Koufi, Vassiliki; Vassilacopoulos, George
2008-01-01
Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.
An approach to access control in electronic health record.
Sucurovic, Snezana
2010-08-01
OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.
Protection of electronic health records (EHRs) in cloud.
Alabdulatif, Abdulatif; Khalil, Ibrahim; Mai, Vu
2013-01-01
EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.
Router Agent Technology for Policy-Based Network Management
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston
2011-01-01
This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
NASA Astrophysics Data System (ADS)
Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.
Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.
Snowden, Lonnie R; McClellan, Sean R
2013-09-01
We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California's Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997-2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services.
McClellan, Sean R.
2013-01-01
Objectives. We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California’s Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Methods. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997–2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. Results. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Conclusions. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services. PMID:23865663
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2011 CFR
2011-04-01
... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2012 CFR
2012-04-01
... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...
An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments
ERIC Educational Resources Information Center
Zhang, Yue
2010-01-01
Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…
Security of medical multimedia.
Tzelepi, S; Pangalos, G; Nikolacopoulou, G
2002-09-01
The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.
A Non-technical User-Oriented Display Notation for XACML Conditions
NASA Astrophysics Data System (ADS)
Stepien, Bernard; Felty, Amy; Matwin, Stan
Ideally, access control to resources in complex IT systems ought to be handled by business decision makers who own a given resource (e.g., the pay and benefits section of an organization should decide and manage the access rules to the payroll system). To make this happen, the security and database communities need to develop vendor-independent access management tools, useable by decision makers, rather than technical personnel detached from a given business function. We have developed and implemented such tool, based on XACML. The XACML is an important emerging tool for managing complex access control applications. As a formal notation, based on an XML schema representing the grammar of a given application, XACML is precise and non-ambiguous. But this very property puts it out of reach of non-technical users. We propose a new notation for displaying and editing XACML rules that is independent of XML, and we develop an editor for it. Our notation combines a tree representation of logical expressions with an accessible natural language layer. Our early experience indicates that such rules can be grasped by non-technical users wishing to develop and control rules for accessing their own resources.
Price, Matthew; Yuen, Erica K; Davidson, Tatiana M; Hubel, Grace; Ruggiero, Kenneth J
2015-08-01
Although Web-based treatments have significant potential to assess and treat difficult-to-reach populations, such as trauma-exposed adolescents, the extent that such treatments are accessed and used is unclear. The present study evaluated the proportion of adolescents who accessed and completed a Web-based treatment for postdisaster mental health symptoms. Correlates of access and completion were examined. A sample of 2,000 adolescents living in tornado-affected communities was assessed via structured telephone interview and invited to a Web-based treatment. The modular treatment addressed symptoms of posttraumatic stress disorder, depression, and alcohol and tobacco use. Participants were randomized to experimental or control conditions after accessing the site. Overall access for the intervention was 35.8%. Module completion for those who accessed ranged from 52.8% to 85.6%. Adolescents with parents who used the Internet to obtain health-related information were more likely to access the treatment. Adolescent males were less likely to access the treatment. Future work is needed to identify strategies to further increase the reach of Web-based treatments to provide clinical services in a postdisaster context. (c) 2015 APA, all rights reserved).
Price, Matthew; Yuen, Erica; Davidson, Tatiana M.; Hubel, Grace; Ruggiero, Kenneth J.
2015-01-01
Although web-based treatments have significant potential to assess and treat difficult to reach populations, such as trauma-exposed adolescents, the extent that such treatments are accessed and used is unclear. The present study evaluated the proportion of adolescents who accessed and completed a web-based treatment for post-disaster mental health symptoms. Correlates of access and completion were examined. A sample of 2,000 adolescents living in tornado-affected communities was assessed via structured telephone interview and invited to a web-based treatment. The modular treatment addressed symptoms of PTSD, depression, and alcohol and tobacco use. Participants were randomized to experimental or control conditions after accessing the site. Overall access for the intervention was 35.8%. Module completion for those who accessed ranged from 52.8% to 85.6%. Adolescents with parents who used the Internet to obtain health-related information were more likely to access the treatment. Adolescent males were less likely to access the treatment. Future work is needed to identify strategies to further increase the reach of web-based treatments to provide clinical services in a post-disaster context. PMID:25622071
Peter, Frank J.; Dalton, Larry J.; Plummer, David W.
2002-01-01
A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.
Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley
2010-10-01
Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.
The Role of Automatic Indexing in Access Control: A Modular View
ERIC Educational Resources Information Center
Hartson, H. Rex
1974-01-01
A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)
A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.
ERIC Educational Resources Information Center
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin
2003-01-01
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
NASA Astrophysics Data System (ADS)
Abramov, G. V.; Emeljanov, A. E.; Ivashin, A. L.
Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.
77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-17
... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...
75 FR 63170 - Access to Confidential Business Information by Avanti Corporation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-14
... control actions. They will also provide computer data base support related to providing information on...: Access to the confidential data will occur no sooner than October 21, 2010. FOR FURTHER INFORMATION... data, including CBI, will continue until October 31, 2015. If the contract is extended, this access...
Canonical formalism for modelling and control of rigid body dynamics.
Gurfil, P
2005-12-01
This paper develops a new paradigm for stabilization of rigid-body dynamics. The state-space model is formulated using canonical elements, known as the Serret-Andoyer (SA) variables, thus far scarcely used for engineering applications. The main feature of the SA formalism is the reduction of the dynamics via the underlying symmetry stemming from conservation of angular momentum and rotational kinetic energy. The controllability of the system model is examined using the notion of accessibility, and is shown to be accessible from all points. Based on the accessibility proof, two nonlinear asymptotic feedback stabilizers are developed: a damping feedback is designed based on the Jurdjevic-Quinn method, and a Hamiltonian controller is derived by using the Hamiltonian as a natural Lyapunov function for the closed-loop dynamics. It is shown that the Hamiltonian control is both passive and inverse optimal with respect to a meaningful performance index. The performance of the new controllers is examined and compared using simulations of realistic scenarios from the satellite attitude dynamics field.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bouchier, F.; Ahrens, J.S.; Wells, G.
One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometricmore » device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.« less
Research on a dynamic workflow access control model
NASA Astrophysics Data System (ADS)
Liu, Yiliang; Deng, Jinxia
2007-12-01
In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.
2010-04-01
failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE APR 2010 2. REPORT...The second is a ‘mechanical’ part that is controlled by circuit boards and is accessible by the technician via the serial console and running...was the use of conventional remote access solution designed for telecommuters or teleworkers in the Information Technology (IT) world, such as a
Controlling user access to electronic resources without password
Smith, Fred Hewitt
2017-08-22
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
The equipment access software for a distributed UNIX-based accelerator control system
NASA Astrophysics Data System (ADS)
Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé
1994-12-01
This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.
ERIC Educational Resources Information Center
Borden, P. A.; And Others
Summaries are presented of five conference papers on communication, control, and computer access for handicapped individuals. Papers have the following titles and authors: "Accessibility of Graphically Based User Interface Computer Systems for Individuals with Visual Impairments" (Charles Lee and Gregg Vanderheiden); "Data Base vs. Information…
NASA Technical Reports Server (NTRS)
2001-01-01
REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.
[Access control management in electronic health records: a systematic literature review].
Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio
2012-01-01
This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.
Satellite control system nucleus for the Brazilian complete space mission
NASA Astrophysics Data System (ADS)
Yamaguti, Wilson; Decarvalhovieira, Anastacio Emanuel; Deoliveira, Julia Leocadia; Cardoso, Paulo Eduardo; Dacosta, Petronio Osorio
1990-10-01
The nucleus of the satellite control system for the Brazilian data collecting and remote sensing satellites is described. The system is based on Digital Equipment Computers and the VAX/VMS operating system. The nucleus provides the access control, the system configuration, the event management, history files management, time synchronization, wall display control, and X25 data communication network access facilities. The architecture of the nucleus and its main implementation aspects are described. The implementation experience acquired is considered.
Huang, Qinlong; Yang, Yixian; Shi, Yuxiang
2018-02-24
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.
Yang, Yixian; Shi, Yuxiang
2018-01-01
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269
Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila
2011-01-01
Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10(-6). Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful.
Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila
2011-01-01
Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10−6. Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful. PMID:22195129
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
ERIC Educational Resources Information Center
Bergart, Jeffrey G.; And Others
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
ERIC Educational Resources Information Center
Kim, Paul; Olaciregui, Claudia
2008-01-01
An electronic portfolio system, designed to serve as a resource-based learning space, was tested in a fifth-grade science class. The control-group students accessed a traditional folder-based information display in the system and the experimental-group students accessed a concept map-based information display to review a science portfolio. The…
76 FR 54190 - Proposed Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-31
... decentralized, with each mission area and agency managing its respective FOIA programs. At the end of each year...-know basis. Role-based access controls are used, and FX is only accessible via the Internet using USDA...
Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Yadav, Rajesh; Varma, Shirshu; Malaviya, N.
2008-05-01
Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.
Ontology based log content extraction engine for a posteriori security control.
Azkia, Hanieh; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Coatrieux, Gouenou
2012-01-01
In a posteriori access control, users are accountable for actions they performed and must provide evidence, when required by some legal authorities for instance, to prove that these actions were legitimate. Generally, log files contain the needed data to achieve this goal. This logged data can be recorded in several formats; we consider here IHE-ATNA (Integrating the healthcare enterprise-Audit Trail and Node Authentication) as log format. The difficulty lies in extracting useful information regardless of the log format. A posteriori access control frameworks often include a log filtering engine that provides this extraction function. In this paper we define and enforce this function by building an IHE-ATNA based ontology model, which we query using SPARQL, and show how the a posteriori security controls are made effective and easier based on this function.
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.
Eom, Jieun; Lee, Dong Hoon; Lee, Kwangsu
2016-12-01
In recent years, many countries have been trying to integrate electronic health data managed by each hospital to offer more efficient healthcare services. Since health data contain sensitive information of patients, there have been much research that present privacy preserving mechanisms. However, existing studies either require a patient to perform various steps to secure the data or restrict the patient to exerting control over the data. In this paper, we propose patient-controlled attribute-based encryption, which enables a patient (a data owner) to control access to the health data and reduces the operational burden for the patient, simultaneously. With our method, the patient has powerful control capability of his/her own health data in that he/she has the final say on the access with time limitation. In addition, our scheme provides emergency medical services which allow the emergency staffs to access the health data without the patient's permission only in the case of emergencies. We prove that our scheme is secure under cryptographic assumptions and analyze its efficiency from the patient's perspective.
A development framework for artificial intelligence based distributed operations support systems
NASA Technical Reports Server (NTRS)
Adler, Richard M.; Cottman, Bruce H.
1990-01-01
Advanced automation is required to reduce costly human operations support requirements for complex space-based and ground control systems. Existing knowledge based technologies have been used successfully to automate individual operations tasks. Considerably less progress has been made in integrating and coordinating multiple operations applications for unified intelligent support systems. To fill this gap, SOCIAL, a tool set for developing Distributed Artificial Intelligence (DAI) systems is being constructed. SOCIAL consists of three primary language based components defining: models of interprocess communication across heterogeneous platforms; models for interprocess coordination, concurrency control, and fault management; and for accessing heterogeneous information resources. DAI applications subsystems, either new or existing, will access these distributed services non-intrusively, via high-level message-based protocols. SOCIAL will reduce the complexity of distributed communications, control, and integration, enabling developers to concentrate on the design and functionality of the target DAI system itself.
Meena, Yogesh Kumar; Cecotti, Hubert; Wong-Lin, Kongfatt; Dutta, Ashish; Prasad, Girijesh
2018-04-01
Virtual keyboard applications and alternative communication devices provide new means of communication to assist disabled people. To date, virtual keyboard optimization schemes based on script-specific information, along with multimodal input access facility, are limited. In this paper, we propose a novel method for optimizing the position of the displayed items for gaze-controlled tree-based menu selection systems by considering a combination of letter frequency and command selection time. The optimized graphical user interface layout has been designed for a Hindi language virtual keyboard based on a menu wherein 10 commands provide access to type 88 different characters, along with additional text editing commands. The system can be controlled in two different modes: eye-tracking alone and eye-tracking with an access soft-switch. Five different keyboard layouts have been presented and evaluated with ten healthy participants. Furthermore, the two best performing keyboard layouts have been evaluated with eye-tracking alone on ten stroke patients. The overall performance analysis demonstrated significantly superior typing performance, high usability (87% SUS score), and low workload (NASA TLX with 17 scores) for the letter frequency and time-based organization with script specific arrangement design. This paper represents the first optimized gaze-controlled Hindi virtual keyboard, which can be extended to other languages.
2015-03-01
a hotel and a hospital. 2. Event handler for emergency policies (item 2 above): this has been implemented in two UG projects, one project developed a...Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia, Brazil , September 2014. Electronic Notes in Theoretical Computer Science (to...Brasilia, Brazil , September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on
An integrated set of UNIX based system tools at control room level
NASA Astrophysics Data System (ADS)
Potepan, F.; Scafuri, C.; Bortolotto, C.; Surace, G.
1994-12-01
The design effort of providing a simple point-and-click approach to the equipment access has led to the definition and realization of a modular set of software tools to be used at the ELETTRA control room level. Point-to-point equipment access requires neither programming nor specific knowledge of the control system architecture. The development and integration of communication, graphic, editing and global database modules are described in depth, followed by a report of their use in the first commissioning period.
A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms
NASA Astrophysics Data System (ADS)
Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin
With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.
Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.
Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang
2017-04-10
In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.
Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs
NASA Astrophysics Data System (ADS)
Zhu, Yanfeng; Niu, Zhisheng
Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.
Fine-Grained Access Control for Electronic Health Record Systems
NASA Astrophysics Data System (ADS)
Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh
There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
A PC-Based Controller for Dextrous Arms
NASA Technical Reports Server (NTRS)
Fiorini, Paolo; Seraji, Homayoun; Long, Mark
1996-01-01
This paper describes the architecture and performance of a PC-based controller for 7-DOF dextrous manipulators. The computing platform is a 486-based personal computer equipped with a bus extender to access the robot Multibus controller, together with a single board computer as the graphical engine, and with a parallel I/O board to interface with a force-torque sensor mounted on the manipulator wrist.
A Model for Trust-based Access Control and Delegation in Mobile Clouds (Post Print)
2013-10-01
the access-granter knowing the identity of access requester beforehand and authenticating the requester, can no longer be applied. Mobile Wallet Cloud...TktC) for a reservation and con- tacts the user’s mobile wallet provider (MobWC) to purchase the ticket from TktC. For accessing different services...receiving regular services. For example, the human user in our scenario can be an elite member with the mobile wallet service provider that
Designing of smart home automation system based on Raspberry Pi
NASA Astrophysics Data System (ADS)
Saini, Ravi Prakash; Singh, Bhanu Pratap; Sharma, Mahesh Kumar; Wattanawisuth, Nattapol; Leeprechanon, Nopbhorn
2016-03-01
Locally networked or remotely controlled home automation system becomes a popular paradigm because of the numerous advantages and is suitable for academic research. This paper proposes a method for an implementation of Raspberry Pi based home automation system presented with an android phone access interface. The power consumption profile across the connected load is measured accurately through programming. Users can access the graph of total power consumption with respect to time worldwide using their Dropbox account. An android application has been developed to channelize the monitoring and controlling operation of home appliances remotely. This application facilitates controlling of operating pins of Raspberry Pi by pressing the corresponding key for turning "on" and "off" of any desired appliance. Systems can range from the simple room lighting control to smart microcontroller based hybrid systems incorporating several other additional features. Smart home automation systems are being adopted to achieve flexibility, scalability, security in the sense of data protection through the cloud-based data storage protocol, reliability, energy efficiency, etc.
Designing of smart home automation system based on Raspberry Pi
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saini, Ravi Prakash; Singh, Bhanu Pratap; Sharma, Mahesh Kumar
Locally networked or remotely controlled home automation system becomes a popular paradigm because of the numerous advantages and is suitable for academic research. This paper proposes a method for an implementation of Raspberry Pi based home automation system presented with an android phone access interface. The power consumption profile across the connected load is measured accurately through programming. Users can access the graph of total power consumption with respect to time worldwide using their Dropbox account. An android application has been developed to channelize the monitoring and controlling operation of home appliances remotely. This application facilitates controlling of operating pinsmore » of Raspberry Pi by pressing the corresponding key for turning “on” and “off” of any desired appliance. Systems can range from the simple room lighting control to smart microcontroller based hybrid systems incorporating several other additional features. Smart home automation systems are being adopted to achieve flexibility, scalability, security in the sense of data protection through the cloud-based data storage protocol, reliability, energy efficiency, etc.« less
Evaluation of Standards for Access Control Enabling PHR-S Federation.
Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan
2017-01-01
The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.
2012-01-01
Background Low fruit and vegetable ( FV) consumption is a key risk factor for morbidity and mortality. Consumption of FV is limited by a lack of access to FV. Enhanced understanding of interventions and their impact on both access to and consumption of FV can provide guidance to public health decision-makers. The purpose of this scoping review is to identify and map literature that has evaluated effects of community-based interventions designed to increase FV access or consumption among five to 18-year olds. Methods The search included 21 electronic bibliographic databases, grey literature, targeted organization websites, and 15 key journals for relevant studies published up to May 2011. Retrieved citations were screened in duplicate for relevance. Data extracted from included studies covered: year, country, study design, target audience, intervention setting, intervention strategies, interventionists, and reported outcomes. Results The search located 19,607 unique citations. Full text relevance screening was conducted on 1,908 studies. The final 289 unique studies included 30 knowledge syntheses, 27 randomized controlled trials, 55 quasi-experimental studies, 113 cluster controlled studies, 60 before-after studies, one mixed method study, and three controlled time series studies. Of these studies, 46 included access outcomes and 278 included consumption outcomes. In terms of target population, 110 studies focused on five to seven year olds, 175 targeted eight to 10 year olds, 192 targeted 11 to 14 year olds, 73 targeted 15 to 18 year olds, 55 targeted parents, and 30 targeted teachers, other service providers, or the general public. The most common intervention locations included schools, communities or community centres, and homes. Most studies implemented multi-faceted intervention strategies to increase FV access or consumption. Conclusions While consumption measures were commonly reported, this review identified a small yet important subset of literature examining access to FV. This is a critically important issue since consumption is contingent upon access. Future research should examine the impact of interventions on direct outcome measures of FV access and a focused systematic review that examines these interventions is also needed. In addition, research on interventions in low- and middle-income countries is warranted based on a limited existing knowledge base. PMID:22931474
Empowering citizens with access control mechanisms to their personal health resources.
Calvillo, J; Román, I; Roa, L M
2013-01-01
Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms are essential keys for this approach and they are accomplished by using semantic technologies (i.e., ontologies, rule languages, and inference engines). The results are mainly focused on the security and access control of the proposed scenario. An ontology has been designed and developed for the POVO covering the terminology of the scenario and easing the automation of administration tasks. Over that ontology, an access control mechanism based on rule languages allows specifying access control policies, and an inference engine performs the decision making process automatically. The usability of solutions to ease administration tasks to the SoC is improved by the Me-As-An-Admin (M3A) application. This guides the SoC through the specification of personal access control policies to his/her distributed resources by using semantic technologies (e.g., metamodeling, model-to-text transformations, etc.). All results are developed as services and included in an architecture in accordance with standards and principles of openness and interoperability. Current technology can bring health, social and well-being care actually centered on citizens, and granting each person the management of his/her health information. However, the application of technology without adopting methodologies or normalized guidelines will reduce the interoperability of solutions developed, failing in the development of advanced services and improved scenarios for health delivery. Standards and reference architectures can be cornerstones for future-proof and powerful developments. Finally, not only technology must follow citizen-centric approaches, but also the gaps needing legislative efforts that support these new paradigms of healthcare delivery must be identified and addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Rethinking unmet need: Determinants of contraceptive use in Santiago, the Dominican Republic.
DeGette, R Lipinsky; Jennings, A; Goyal, V
2015-04-01
Inadequate access to contraceptives is often considered the primary source of unmet need among women who desire to prevent pregnancy. This study evaluates two potential determinants of contraceptive use among Dominican women: (1) perceived access to family planning and (2) perceived personal reproductive control, a measure based in psychological theories of locus of control. Sexually active women aged 18-45 who did not desire fertility were surveyed to assess influences on contraceptive use. In-depth interviews were conducted among a subset of participants to contextualise survey results. Fewer than half (49%) of the 80 survey respondents had used contraception in the last 3 months. Higher personal reproductive control was significantly related to contraceptive use (aOR 1.18, 95% CI 1.04-1.34), however, higher perceived access to contraceptives was not (aOR 1.09, 95% CI 0.97-1.23). Male partner influence was identified as a barrier to contraceptive use. In this population, high personal reproductive control is a better predictor of contraceptive use than perceived access.
Gastroenterology-urology devices; reclassification of implanted blood access devices. Final rule.
2014-07-25
The Food and Drug Administration (FDA) is issuing a final order to reclassify implanted blood access devices, a preamendments class III device, into class II (special controls) based on new information and subject to premarket notification and to further clarify the identification.
Access Control for Mobile Assessment Systems Using ID.
Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma
2015-01-01
The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.
Epigenome data release: a participant-centered approach to privacy protection.
Dyke, Stephanie O M; Cheung, Warren A; Joly, Yann; Ammerpohl, Ole; Lutsik, Pavlo; Rothstein, Mark A; Caron, Maxime; Busche, Stephan; Bourque, Guillaume; Rönnblom, Lars; Flicek, Paul; Beck, Stephan; Hirst, Martin; Stunnenberg, Henk; Siebert, Reiner; Walter, Jörn; Pastinen, Tomi
2015-07-17
Large-scale epigenome mapping by the NIH Roadmap Epigenomics Project, the ENCODE Consortium and the International Human Epigenome Consortium (IHEC) produces genome-wide DNA methylation data at one base-pair resolution. We examine how such data can be made open-access while balancing appropriate interpretation and genomic privacy. We propose guidelines for data release that both reduce ambiguity in the interpretation of open-access data and limit immediate access to genetic variation data that are made available through controlled access.
47 CFR 90.475 - Operation of internal transmitter control systems in specially equipped systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... systems involving fixed systems whose base stations are controlled by such systems may automatically access these base stations through the microwave or operational fixed systems from positions in the PSTN, so long as the base stations and mobile units meet the requirements of § 90.483 and if a separate...
Urban search mobile platform modeling in hindered access conditions
NASA Astrophysics Data System (ADS)
Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.
2018-05-01
The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.
Williams, Christopher; McClay, Carrie-Anne; Martinez, Rebeca; Morrison, Jill; Haig, Caroline; Jones, Ray; Farrand, Paul
2016-04-27
Low mood is a common mental health problem with significant health consequences. Studies have shown that cognitive behavioural therapy (CBT) is an effective treatment for low mood and anxiety when delivered one-to-one by an expert practitioner. However, access to this talking therapy is often limited and waiting lists can be long, although a range of low-intensity interventions that can increase access to services are available. These include guided self-help materials delivered via books, classes and online packages. This project aims to pilot a randomized controlled trial of an online CBT-based life skills course with community-based individuals experiencing low mood and anxiety. Individuals with elevated symptoms of depression will be recruited directly from the community via online and newspaper advertisements. Participants will be remotely randomized to receive either immediate access or delayed access to the Living Life to the Full guided online CBT-based life skills package, with telephone or email support provided whilst they use the online intervention. The primary end point will be at 3 months post-randomization, at which point the delayed-access group will be offered the intervention. Levels of depression, anxiety, social functioning and satisfaction will be assessed. This pilot study will test the trial design, and ability to recruit and deliver the intervention. Drop-out rates will be assessed and the completion and acceptability of the package will be investigated. The study will also inform a sample size power calculation for a subsequent substantive randomized controlled trial. ISRCTN ISRCTN12890709.
RFID - based Staff Control System (SCS) in Kazakhstan
NASA Astrophysics Data System (ADS)
Saparkhojayev, N.
2015-06-01
RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.
Moghaddam, Sina Siavash; Jaafar, Hawa; Ibrahim, Rusli; Rahmat, Asmah; Aziz, Maheran Abdul; Philip, Elizabeth
2011-06-17
In the present study, two accessions of Centella asiatica (CA03 and CA23) were subjected to gamma radiation to examine the response of these accessions in terms of survival rate, flavonoid contents, leaf gas exchange and leaf mass. Radiation Sensitivity Tests revealed that based on the survival rate, the LD(50) (gamma doses that killed 50% of the plantlets) of the plantlets were achieved at 60 Gy for CA03 and 40 Gy for CA23. The nodal segments were irradiated with gamma rays at does of 30 and 40 Gy for Centella asiatica accession 'CA03' and 20 and 30 Gy for accession 'CA23. The nodal segment response to the radiation was evaluated by recording the flavonoid content, leaf gas exchange and leaf biomass. The experiment was designed as RCBD with five replications. Results demonstrated that the irradiated plantlets exhibited greater total flavonoid contents (in eight weeks) significantly than the control where the control also exhibited the highest total flavonoid contents in the sixth week of growth; 2.64 ± 0.02 mg/g DW in CA03 and 8.94 ± 0.04 mg/g DW in CA23. The total flavonoid content was found to be highest after eight weeks of growth, and this, accordingly, stands as the best time for leaf harvest. Biochemical differentiation based on total flavonoid content revealed that irradiated plantlets in CA23 at 20 and 30 Gy after eight weeks contained the highest total flavonoid concentrations (16.827 ± 0.02; 16.837 ± 0.008 mg/g DW, respectively) whereas in CA03 exposed to 30 and 40 Gy was found to have the lowest total flavonid content (5.83 ± 0.11; 5.75 ± 0.03 mg/g DW). Based on the results gathered in this study, significant differences were found between irradiated accessions and control ones in relation to the leaf gas. The highest PN and gs were detected in CA23 as control followed by CA23 irradiated to 20Gy (CA23G20) and CA23G30 and the lowest PN and gs were observed in CA03 irradiated to 40Gy (CA03G40). Moreover, there were no significant differences in terms of PN and gs among the irradiated plants in each accession. The WUE of both irradiated accessions of Centella asiatica were reduced as compared with the control plants (p < 0.01) while Ci and E were enhanced. There were no significant differences in the gas exchange parameters among radiated plants in each accession. Moreover, malondialdehyde (MDA) of accessions after gamma treatments were significantly higher than the control, however, flavonoids which were higher concentration in irradiated plants can scavenge surplus free radicals. Therefore, the findings of this study have proven an efficient method of in vitro mutagenesis through gamma radiation based on the pharmaceutical demand to create economically superior mutants of C. asiatica. In other words, the results of this study suggest that gamma irradiation on C. asiatica can produce mutants of agricultural and economical importance.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-08
...--Commerce Country Chart [Reason for control] Countries Chemical & biological Nuclear National Security Missile Regional Stability Firearms Crime control Anti-terrorism weapons nonproliferation Tech convention...
Remote Authentication: The Obvia Solution.
ERIC Educational Resources Information Center
Eckley, Tami-Jo
1999-01-01
This article focuses on Obvia Corporation, a New York-based company that offers remote data access (RDA) through a server software system allowing for an easy, controllable, cost-effective management solution to the remote access problem. Using Obvia's RDA service, librarians can focus on administrative and professional decisions and spend more…
Researchers at the Gate: Factors Influencing Districts' Right of Entry Decisions
ERIC Educational Resources Information Center
Melnick, Steven A.; Henk, William A.
2006-01-01
Background: The No Child Left Behind legislation creates an increased need for new school-based empirical studies whose implementation will depend largely on researchers' access to various school populations and records. Access decisions are typically made by superintendents, or their designees, functioning as gatekeepers who control right of…
77 FR 2054 - Proposed Agency Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-13
... Consumption Data Access and Control Questionnaire; (3) Type of Request: New; (4) Purpose: The U.S. Department of Energy (DOE) will generate a ``crowd-sourced map'' that discloses consumer access to personal... questionnaire device that captures and publishes the necessary information as a series of web-based maps upon...
2014-04-12
Group 1 (Control): Access to a Static Version of the Website Containing Only Static Features (i.e. Library, First Aid, and FAQ); Group2 (Intervention) Access to an Interactive Version of the Website Containing Both Static and Interactive Features
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei
2016-05-01
This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.
Reports of insurance-based discrimination in health care and its association with access to care.
Han, Xinxin; Call, Kathleen Thiede; Pintor, Jessie Kemmick; Alarcon-Espinoza, Giovann; Simon, Alisha Baines
2015-07-01
We examined reports of insurance-based discrimination and its association with insurance type and access to care in the early years of the Patient Protection and Affordable Care Act. We used data from the 2013 Minnesota Health Access Survey to identify 4123 Minnesota adults aged 18 to 64 years who reported about their experiences of insurance-based discrimination. We modeled the association between discrimination and insurance type and predicted odds of having reduced access to care among those reporting discrimination, controlling for sociodemographic factors. Data were weighted to represent the state's population. Reports of insurance-based discrimination were higher among uninsured (25%) and publicly insured (21%) adults than among privately insured adults (3%), which held in the regression analysis. Those reporting discrimination had higher odds of lacking a usual source of care, lacking confidence in getting care, forgoing care because of cost, and experiencing provider-level barriers than those who did not. Further research and policy interventions are needed to address insurance-based discrimination in health care settings.
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-02-01
Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model.
Traffic handling capability of a broadband indoor wireless network using CDMA multiple access
NASA Astrophysics Data System (ADS)
Zhang, Chang G.; Hafez, H. M.; Falconer, David D.
1994-05-01
CDMA (code division multiple access) may be an attractive technique for wireless access to broadband services because of its multiple access simplicity and other appealing features. In order to investigate traffic handling capabilities of a future network providing a variety of integrated services, this paper presents a study of a broadband indoor wireless network supporting high-speed traffic using CDMA multiple access. The results are obtained through the simulation of an indoor environment and the traffic capabilities of the wireless access to broadband 155.5 MHz ATM-SONET networks using the mm-wave band. A distributed system architecture is employed and the system performance is measured in terms of call blocking probability and dropping probability. The impacts of the base station density, traffic load, average holding time, and variable traffic sources on the system performance are examined. The improvement of system performance by implementing various techniques such as handoff, admission control, power control and sectorization are also investigated.
Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks
Lu, Zhaoming; Pan, Qi; Wang, Luhan; Wen, Xiangming
2016-01-01
Because of the limited resources on radio access channels of third generation partnership projection (3GPP) network, one of the most challenging tasks posted by 3GPP cellular-based machine type communications (MTC) is congestion due to massive requests for connection to radio access network (RAN). In this paper, an overload control algorithm in 3GPP RAN is proposed, which proactively disperses the simultaneous access attempts in evenly distributed time window. Through periodic reservation strategy, massive access requests of MTC devices are dispersed in time, which reduces the probability of confliction of signaling. By the compensation and prediction mechanism, each device can communicate with MTC server with dynamic load of air interface. Numerical results prove that proposed method makes MTC applications friendly to 3GPP cellular network. PMID:27936011
Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks.
Lu, Zhaoming; Pan, Qi; Wang, Luhan; Wen, Xiangming
2016-01-01
Because of the limited resources on radio access channels of third generation partnership projection (3GPP) network, one of the most challenging tasks posted by 3GPP cellular-based machine type communications (MTC) is congestion due to massive requests for connection to radio access network (RAN). In this paper, an overload control algorithm in 3GPP RAN is proposed, which proactively disperses the simultaneous access attempts in evenly distributed time window. Through periodic reservation strategy, massive access requests of MTC devices are dispersed in time, which reduces the probability of confliction of signaling. By the compensation and prediction mechanism, each device can communicate with MTC server with dynamic load of air interface. Numerical results prove that proposed method makes MTC applications friendly to 3GPP cellular network.
Design of Accelerator Online Simulator Server Using Structured Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shen, Guobao; /Brookhaven; Chu, Chungming
2012-07-06
Model based control plays an important role for a modern accelerator during beam commissioning, beam study, and even daily operation. With a realistic model, beam behaviour can be predicted and therefore effectively controlled. The approach used by most current high level application environments is to use a built-in simulation engine and feed a realistic model into that simulation engine. Instead of this traditional monolithic structure, a new approach using a client-server architecture is under development. An on-line simulator server is accessed via network accessible structured data. With this approach, a user can easily access multiple simulation codes. This paper describesmore » the design, implementation, and current status of PVData, which defines the structured data, and PVAccess, which provides network access to the structured data.« less
Organization and management of heterogeneous, dispersed data bases in nuclear engineering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eastman, C.M.
1986-01-01
Large, complex, multiperson engineering projects in many areas, nuclear, aerospace, electronics, and manufacturing, have inherent needs for coordination, control, and management of the related engineering data. Taken in the abstract, the notion of an integrated engineering data base (IED) for such projects is attractive. The potential capabilities of an (IED) are that all data are managed in a coordinated way, are made accessible to all users who need it, allow relations between all parts of the data to be tracked and managed, provide backup, recovery, audit trails, security and access control, and allow overall project status to be monitored andmore » managed. Common data accessing schemes and user interfaces to applications are also part of an IED. This paper describes a new software product that allows incremental realization of many of the capabilities of an IED, without the massive disruption and risk.« less
Packet spacing : an enabling mechanism for delivering multimedia content in computational grids /
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feng, A. C.; Feng, W. C.; Belford, Geneva G.
2001-01-01
Streaming multimedia with UDP has become increasingly popular over distributed systems like the Internet. Scientific applications that stream multimedia include remote computational steering of visualization data and video-on-demand teleconferencing over the Access Grid. However, UDP does not possess a self-regulating, congestion-control mechanism; and most best-efort traflc is served by congestion-controlled TCF! Consequently, UDP steals bandwidth from TCP such that TCP$ows starve for network resources. With the volume of Internet traffic continuing to increase, the perpetuation of UDP-based streaming will cause the Internet to collapse as it did in the mid-1980's due to the use of non-congestion-controlled TCP. To address thismore » problem, we introduce the counterintuitive notion of inter-packet spacing with control feedback to enable UDP-based applications to perform well in the next-generation Internet and computational grids. When compared with traditional UDP-based streaming, we illustrate that our approach can reduce packet loss over SO% without adversely afecting delivered throughput. Keywords: network protocol, multimedia, packet spacing, streaming, TCI: UDlq rate-adjusting congestion control, computational grid, Access Grid.« less
Secure web-based access to radiology: forms and databases for fast queries
NASA Astrophysics Data System (ADS)
McColl, Roderick W.; Lane, Thomas J.
2002-05-01
Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.
Meigs, James B; Cagliero, Enrico; Dubey, Anil; Murphy-Sheehy, Patricia; Gildesgame, Catharyn; Chueh, Henry; Barry, Michael J; Singer, Daniel E; Nathan, David M
2003-03-01
To test effects of a web-based decision support tool, the diabetes Disease Management Application (DMA), developed to improve evidence-based management of type 2 diabetes. We conducted a group randomized controlled trial of 12 intervention and 14 control staff providers and 307 intervention and 291 control patients with type 2 diabetes in a hospital-based internal medicine clinic. Providers were randomly assigned from May 1998 through April 1999 to have access to the DMA (intervention) or not to have access (control). The DMA displays interactive patient-specific clinical data, treatment advice, and links to other web-based care resources. We compared patients in the intervention and control groups for changes in processes and outcomes of care from the year preceding the study through the year of the study by intention-to-treat analysis. The DMA was used for 42% of scheduled patient visits. The number of HbA(1c) tests obtained per year increased significantly in the intervention group (+0.3 tests/year) compared with the control group (-0.04 tests/year, P = 0.008), as did the number of LDL cholesterol tests (intervention, +0.2 tests/year; control, +0.01 tests/year; P = 0.02) and the proportions of patients undergoing at least one foot examination per year (intervention, +9.8%; control, -0.7%; P = 0.003). Levels of HbA(1c) decreased by 0.2 in the intervention group and increased by 0.1 in the control group (P = 0.09); proportions of patients with LDL cholesterol levels <130 mg/dl increased by 20.3% in the intervention group and 10.5% in the control group (P = 0.5). Web-based patient-specific decision support has the potential to improve evidence-based parameters of diabetes care.
Privacy and Access Control for IHE-Based Systems
NASA Astrophysics Data System (ADS)
Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian
Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.
The OPL Access Control Policy Language
NASA Astrophysics Data System (ADS)
Alm, Christopher; Wolf, Ruben; Posegga, Joachim
Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.
USDA-ARS?s Scientific Manuscript database
This study examined weight loss between a community-based, intensive behavioral counseling program (Weight Watchers PointsPlus that included three treatment access modes and a self-help condition. A total of 292 participants were randomized to a Weight Watchers (WW; n=147) or a self-help condition (...
Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
Wang, Shangping; Zhao, Duqiao; Zhang, Yaling
2017-01-01
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.
A passive RFID-based location system for personnel and asset monitoring.
Hsiao, Rong-Shue; Kao, Chun-Hao; Chen, Tian-Xiang; Chen, Jui-Lun
2018-01-01
Typical radio frequency identification (RFID) access control system can be ineffective if an unauthorized person tailgates an authorized person through an access area. To propose a system by using indoor locating and tracking techniques address this problem, which is to prevent unauthorized Alzheimer's and dementia patients from getting lost including by tailgating. To achieve accurate target location, passive RFID deployment strategy is studied and a fingerprinting based passive RFID localization algorithm is proposed. The proposed system was evaluated in a building environment to simulate the performance of access control. RFID reader was installed on ceiling near the access area and tags were stitched on both shoulders of the experiment subject's garments. The probability of the error distance within 0.3 m achieved 97% in the warning area; the location precision achieved 97% within 0.4 m in the monitoring area. The result showed that if an unauthorized person enters the restricted area, the system can initiate an alert signal accurately. Therefore, the proposed system is very suitable to be used in nursing home or hospital to prevent unauthorized personnel and assets entering/exiting a confined location.
NASA Astrophysics Data System (ADS)
Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen
2010-05-01
CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand of the development efforts within CEDA has been the NDG (NERC Datagrid) Security system. This system has been extended to interoperate with ESG, greatly assisted by the standards based approach adopted for the ESG security architecture. Drawing from experience from previous projects the decision was taken to refactor the NDG Security software into a component based architecture to enable a separation of concerns between access control and the functionality of a given application being protected. Such an approach is only possible through a generic interface. At CEDA, this has been realised in the Python programming language using the WSGI (Web Server Gateway Interface) specification. A parallel Java filter based implementation is also under development with our US partners for use with the THREDDS Data Server. Using such technologies applications and middleware can be assembled into custom configurations to meet different requirements. In the case of access control, NDG Security middleware can be layered over the top of existing applications without the need to modify them. A RESTful approach to the application of authorisation policy has been key in this approach. We explore the practical implementation of such a scheme alongside the application of the ESG security architecture to CEDA's OGC web services implementation COWS.
Cloud-assisted mobile-access of health data with privacy and auditability.
Tong, Yue; Sun, Jinyuan; Chow, Sherman S M; Li, Pan
2014-03-01
Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and auditability for misusing health data. Specifically, we propose to integrate key management from pseudorandom number generator for unlinkability, a secure indexing method for privacy-preserving keyword search which hides both search and access patterns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with auditability to prevent potential misbehavior, in both normal and emergency cases.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nicklaus, Dennis J.
2013-10-13
We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less
SERVER DEVELOPMENT FOR NSLS-II PHYSICS APPLICATIONS AND PERFORMANCE ANALYSIS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shen, G.; Kraimer, M.
2011-03-28
The beam commissioning software framework of NSLS-II project adopts a client/server based architecture to replace the more traditional monolithic high level application approach. The server software under development is available via an open source sourceforge project named epics-pvdata, which consists of modules pvData, pvAccess, pvIOC, and pvService. Examples of two services that already exist in the pvService module are itemFinder, and gather. Each service uses pvData to store in-memory transient data, pvService to transfer data over the network, and pvIOC as the service engine. The performance benchmarking for pvAccess and both gather service and item finder service are presented inmore » this paper. The performance comparison between pvAccess and Channel Access are presented also. For an ultra low emittance synchrotron radiation light source like NSLS II, the control system requirements, especially for beam control are tight. To control and manipulate the beam effectively, a use case study has been performed to satisfy the requirement and theoretical evaluation has been performed. The analysis shows that model based control is indispensable for beam commissioning and routine operation. However, there are many challenges such as how to re-use a design model for on-line model based control, and how to combine the numerical methods for modeling of a realistic lattice with the analytical techniques for analysis of its properties. To satisfy the requirements and challenges, adequate system architecture for the software framework for beam commissioning and operation is critical. The existing traditional approaches are self-consistent, and monolithic. Some of them have adopted a concept of middle layer to separate low level hardware processing from numerical algorithm computing, physics modelling, data manipulating and plotting, and error handling. However, none of the existing approaches can satisfy the requirement. A new design has been proposed by introducing service oriented architecture technology, and client interface is undergoing. The design and implementation adopted a new EPICS implementation, namely epics-pvdata [9], which is under active development. The implementation of this project under Java is close to stable, and binding to other language such as C++ and/or Python is undergoing. In this paper, we focus on the performance benchmarking and comparison for pvAccess and Channel Access, the performance evaluation for 2 services, gather and item finder respectively.« less
A game-theoretical approach to multimedia social networks security.
Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong
2014-01-01
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.
A Game-Theoretical Approach to Multimedia Social Networks Security
Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong
2014-01-01
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226
Detection and response to unauthorized access to a communication device
Smith, Rhett; Gordon, Colin
2015-09-08
A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.
A web-based biosignal data management system for U-health data integration.
Ro, Dongwoo; Yoo, Sooyoung; Choi, Jinwook
2008-11-06
In the ubiquitous healthcare environment, the biosignal data should be easily accessed and properly maintained. This paper describes a web-based data management system. It consists of a device interface, a data upload control, a central repository, and a web server. For the user-specific web services, a MFER Upload ActiveX Control was developed.
Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2007-01-01
This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.
Network-based production quality control
NASA Astrophysics Data System (ADS)
Kwon, Yongjin; Tseng, Bill; Chiou, Richard
2007-09-01
This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.
Patients' experiences of an open access follow up arrangement in managing inflammatory bowel disease
Rogers, A; Kennedy, A; Nelson, E; Robinson, A
2004-01-01
Background: Improving access is a key policy issue in improving quality of care and extending patient choice and participation. People's experience of changing from fixed outpatient appointments to more flexible direct access arrangements for chronic disease has been underexplored. Objectives: To examine patients' views on using an open system of access compared with fixed outpatient appointments as part of a guided self-management intervention for inflammatory bowel disease (IBD). Design: Embedded qualitative study undertaken alongside a randomised controlled trial. Semi-structured interviews were undertaken to obtain an in depth understanding of patients' experience of the change in access arrangements. Participants: A purposive sample (n = 30) was drawn from the intervention group (n = 700) according to a range of responses to the trial baseline and follow up quantitative measures. Results: 28 interviews were included in the analysis. Compared with the previous system of fixed appointments, preference for the new open access system was based on enhanced personal control in contacting services and the view that it fitted better with everyday routine management and the requirement for urgent medical contact when symptoms fail to respond to medication. Preference for retaining fixed appointments was based on a sense of security from gaining access which did not require the individual to initiate the request for medical help. Conclusions: Open access may fit better with patients' self-management of their condition and everyday routines, roles and responsibilities. Ensuring that outpatient organisational arrangements and personnel are responsive to patient initiated requests for appointments is likely to impact on the acceptability of this type of access arrangement. Some people may continue to prefer the fixed appointment system which should be retained if patient choice is to be respected. PMID:15465941
77 FR 36951 - Gastroenterology-Urology Devices; Reclassification of Implanted Blood Access Devices
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-20
... into class II (special controls). FDA is proposing this reclassification on its own initiative based on... categories (classes) of devices, reflecting the regulatory controls needed to provide reasonable assurance of their safety and effectiveness. The three categories of devices are class I (general controls), class II...
Enrollment Quota Control, Elite Selection and Access to Education in Rural China
ERIC Educational Resources Information Center
Zhao, Luan
2010-01-01
In China, the access to education is determined by not only student's demand for schooling, but also the allocation of educational resources and the schools' selection of candidate students. Based on the data obtained from the rural life level and rural social assistance household surveys in four provinces in 2005, the demand-identified bivariate…
Attribute-Based Proxy Re-Encryption with Keyword Search
Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo
2014-01-01
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257
Attribute-based proxy re-encryption with keyword search.
Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo
2014-01-01
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.
Reports of Insurance-Based Discrimination in Health Care and Its Association With Access to Care
Call, Kathleen Thiede; Pintor, Jessie Kemmick; Alarcon-Espinoza, Giovann; Simon, Alisha Baines
2015-01-01
Objectives. We examined reports of insurance-based discrimination and its association with insurance type and access to care in the early years of the Patient Protection and Affordable Care Act. Methods. We used data from the 2013 Minnesota Health Access Survey to identify 4123 Minnesota adults aged 18 to 64 years who reported about their experiences of insurance-based discrimination. We modeled the association between discrimination and insurance type and predicted odds of having reduced access to care among those reporting discrimination, controlling for sociodemographic factors. Data were weighted to represent the state’s population. Results. Reports of insurance-based discrimination were higher among uninsured (25%) and publicly insured (21%) adults than among privately insured adults (3%), which held in the regression analysis. Those reporting discrimination had higher odds of lacking a usual source of care, lacking confidence in getting care, forgoing care because of cost, and experiencing provider-level barriers than those who did not. Conclusions. Further research and policy interventions are needed to address insurance-based discrimination in health care settings. PMID:25905821
Stock, Steven E; Davies, Daniel K; Wehmeyer, Michael L; Lachapelle, Yves
2011-01-01
The concept of community access is a multidimensional term, which may involve issues related to physical access, knowledge and information, power and control, relationships and communications, advocacy, participation and quality of life [21]. This paper discusses historical and emerging practices and interventions related to physical access to community and community based information for individuals with cognitive disabilities such as intellectual disability, autism or traumatic brain injury. While much societal attention has been paid to features of independent community access for populations such as individuals with hearing, vision or physical disabilities, less attention has focused on independent community access for people with intellectual and other significant cognitive disabilities. Attitudes and actions by families and professional service communities are often mixed for some individuals in this population. The somewhat limited research base in these areas is explored, including a case study review and results from several promising feasibility studies. The paper concludes with comments concerning future prospects and recommendations for improving independent community access for persons with significant cognitive disabilities.
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks
Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo
2014-01-01
Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814
NASA Astrophysics Data System (ADS)
Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung
2010-12-01
This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.
An E-Hospital Security Architecture
NASA Astrophysics Data System (ADS)
Tian, Fang; Adams, Carlisle
In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.
A service-oriented data access control model
NASA Astrophysics Data System (ADS)
Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali
2017-01-01
The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.
Mansoor, Awais; Ahmed, Wamiq M; Samarapungavan, Ala; Cirillo, John; Schwarte, David; Robinson, J Paul; Duerstock, Bradley S
2010-01-01
A web-based application was developed to remotely view slide specimens and control all functions of a research-level light microscopy workstation, called AccessScope. Students and scientists with upper limb mobility and visual impairments are often unable to use a light microscope by themselves and must depend on others in its operation. Users with upper limb mobility impairments and low vision were recruited to assist in the design process of the AccessScope personal computer (PC) user interface. Participants with these disabilities were evaluated in their ability to use AccessScope to perform microscopical tasks. AccessScope usage was compared with inspecting prescanned slide images by grading participants' identification and understanding of histological features and knowledge of microscope operation. With AccessScope subjects were able to independently perform common light microscopy functions through an Internet browser by employing different PC pointing devices or accessibility software according to individual abilities. Subjects answered more histology and microscope usage questions correctly after first participating in an AccessScope test session. AccessScope allowed users with upper limb or visual impairments to successfully perform light microscopy without assistance. This unprecedented capability is crucial for students and scientists with disabilities to perform laboratory coursework or microscope-based research and pursue science, technology, engineering, and mathematics fields.
Can your software engineer program your PLC?
NASA Astrophysics Data System (ADS)
Borrowman, Alastair J.; Taylor, Philip
2016-07-01
The use of Programmable Logic Controllers (PLCs) in the control of large physics experiments is ubiquitous1, 2, 3. The programming of these controllers is normally the domain of engineers with a background in electronics, this paper introduces PLC program development from the software engineer's perspective. PLC programs provide the link between control software running on PC architecture systems and physical hardware controlled and monitored by digital and analog signals. The higher-level software running on the PC is typically responsible for accepting operator input and from this deciding when and how hardware connected to the PLC is controlled. The PLC accepts demands from the PC, considers the current state of its connected hardware and if correct to do so (based upon interlocks or other constraints) adjusts its hardware output signals appropriately for the PC's demands. A published ICD (Interface Control Document) defines the PLC memory locations available to be written and read by the PC to control and monitor the hardware. Historically the method of programming PLCs has been ladder diagrams that closely resemble circuit diagrams, however, PLC manufacturers nowadays also provide, and promote, the use of higher-level programming languages4. Based on techniques used in the development of high-level PC software to control PLCs for multiple telescopes, this paper examines the development of PLC programs to operate the hardware of a medical cyclotron beamline controlled from a PC using the Experimental Physics and Industrial Control System (EPICS), which is also widely used in telescope control5, 6, 7. The PLC used is the new generation Siemens S7-1200 programmed using Siemens Pascal based Structured Control Language (SCL), which is their implementation of Structured Text (ST). The approach described is that from a software engineer's perspective, utilising Siemens Totally Integrated Automation (TIA) Portal integrated development environment (IDE) to create modular PLC programs based upon reusable functions capable of being unit tested without the PLC connected to hardware. Emphasis has been placed on designing an interface between EPICS and SCL that enforces correct operation of hardware through stringent separation of PC accessible PLC memory and hardware I/O addresses used only by the PLC. The paper also introduces the method used to automate the creation, from the same source document, the PLC memory structure (tag) definitions (defining memory used to access hardware I/O and that accessed by the PC) and creation of the PC program data structures (EPICS database records) used to access the permitted PLC addresses. From direct experience this paper demonstrates the advantages of PLC program development being shared between electronic and software engineers, to enable use of the most appropriate processes from both the perspective of the hardware and the higher-level software used to control it.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-01-01
Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model. PMID:25485311
Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks
NASA Astrophysics Data System (ADS)
Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie
2008-12-01
Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.
Nesting behavior of house mice (Mus domesticus) selected for increased wheel-running activity.
Carter, P A; Swallow, J G; Davis, S J; Garland, T
2000-03-01
Nest building was measured in "active" (housed with access to running wheels) and "sedentary" (without wheel access) mice (Mus domesticus) from four replicate lines selected for 10 generations for high voluntary wheel-running behavior, and from four randombred control lines. Based on previous studies of mice bidirectionally selected for thermoregulatory nest building, it was hypothesized that nest building would show a negative correlated response to selection on wheel-running. Such a response could constrain the evolution of high voluntary activity because nesting has also been shown to be positively genetically correlated with successful production of weaned pups. With wheel access, selected mice of both sexes built significantly smaller nests than did control mice. Without wheel access, selected females also built significantly smaller nests than did control females, but only when body mass was excluded from the statistical model, suggesting that body mass mediated this correlated response to selection. Total distance run and mean running speed on wheels was significantly higher in selected mice than in controls, but no differences in amount of time spent running were measured, indicating a complex cause of the response of nesting to selection for voluntary wheel running.
The use of twin-screen-based WIMPS in spacecraft control
NASA Astrophysics Data System (ADS)
Klim, R. D.
1990-10-01
The ergonomic problems of designing a sophisticated Windows Icons Mouse Pop-up (WIMP) based twin screen workstation are outlined. These same problems will be encountered by future spacecraft controllers. The design of a modern, advanced workstation for use on a distributed multicontrol center in a multisatellite control system is outlined. The system uses access control mechanisms to ensure that only authorized personnel can undertake certain operations on the workstation. Rules governing the use of windowing features, screen attributes, icons, keyboard and mouse in spacecraft control are discussed.
Systematic plan of building Web geographic information system based on ActiveX control
NASA Astrophysics Data System (ADS)
Zhang, Xia; Li, Deren; Zhu, Xinyan; Chen, Nengcheng
2003-03-01
A systematic plan of building Web Geographic Information System (WebGIS) using ActiveX technology is proposed in this paper. In the proposed plan, ActiveX control technology is adopted in building client-side application, and two different schemas are introduced to implement communication between controls in users¡ browser and middle application server. One is based on Distribute Component Object Model (DCOM), the other is based on socket. In the former schema, middle service application is developed as a DCOM object that communicates with ActiveX control through Object Remote Procedure Call (ORPC) and accesses data in GIS Data Server through Open Database Connectivity (ODBC). In the latter, middle service application is developed using Java language. It communicates with ActiveX control through socket based on TCP/IP and accesses data in GIS Data Server through Java Database Connectivity (JDBC). The first one is usually developed using C/C++, and it is difficult to develop and deploy. The second one is relatively easy to develop, but its performance of data transfer relies on Web bandwidth. A sample application is developed using the latter schema. It is proved that the performance of the sample application is better than that of some other WebGIS applications in some degree.
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
Code of Federal Regulations, 2011 CFR
2011-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2010 CFR
2010-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2013 CFR
2013-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2014 CFR
2014-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2012 CFR
2012-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Approach to spatial information security based on digital certificate
NASA Astrophysics Data System (ADS)
Cong, Shengri; Zhang, Kai; Chen, Baowen
2005-11-01
With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang
2017-07-24
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.
Verification of Security Policy Enforcement in Enterprise Systems
NASA Astrophysics Data System (ADS)
Gupta, Puneet; Stoller, Scott D.
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-28
... Landings History, and Referendum Eligibility in the Small- Mesh Multispecies Fishery AGENCY: National... history for a limited access or allocation-based management program and limits on the accumulation of..., landings history from Federal waters. DATES: November 28, 2012, shall be known as the ``control date'' for...
Mauro, Vincenzo; Biggeri, Mario; Deepak, Sunil; Trani, Jean-Francois
2014-11-01
Community-based rehabilitation (CBR) programmes have been described as highly effective means of promoting the rights and opportunities of persons with disabilities (PwD). Although CBR is often the main way in which PwD in low-income and middle-income countries access rehabilitation services, there is little literature providing rigorous evaluation of their impact on people's well-being. Data were collected in the Mandya and Ramanagar districts (Karnataka state, India), between December 2009 and May 2010. In total 2540 PwD were interviewed using stratified random sampling: 1919 CBR beneficiaries (who joined the programme between 1997 and 2009) and 621 persons who were living in villages not covered by the programme. We controlled for the systematic differences between people joining and not joining the programme using the propensity score matching method controlling for covariates at individual and village level. We evaluated the impact of the programme on the subgroups of PwD who are disadvantaged on the dimensions of interest: access to pensions, use of aid appliances, access to paid jobs and improvement in personal-practical autonomy after 4 and 7 years of joining the CBR. We observed a positive and significant impact of the programme on access to services, rights and opportunities of PwD. The results indicate that compared with the control group access to pensions and allowances, aid appliances, access to paid jobs and personal-practical autonomy increased by 29.7%, 9.4%, 12.3% and 36.2%, respectively, after 7 years. The CBR programme analysed has a positive impact on access to services and the well-being of PwD who are particularly deprived on outcomes of interest. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications
Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan
2016-01-01
In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666
InkTag: Secure Applications on an Untrusted Operating System
Hofmann, Owen S.; Kim, Sangman; Dunn, Alan M.; Lee, Michael Z.; Witchel, Emmett
2014-01-01
InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification, a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes. PMID:24429939
InkTag: Secure Applications on an Untrusted Operating System.
Hofmann, Owen S; Kim, Sangman; Dunn, Alan M; Lee, Michael Z; Witchel, Emmett
2013-01-01
InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification , a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes.
Vandelanotte, C; Short, C; Plotnikoff, R C; Hooker, C; Canoy, D; Rebar, A; Alley, S; Schoeppe, S; Mummery, W K; Duncan, M J
2015-10-05
Physical inactivity levels are unacceptably high and effective interventions that can increase physical activity in large populations at low cost are urgently needed. Web-based interventions that use computer-tailoring have shown to be effective, though people tend to 'skim' and 'scan' text on the Internet rather than thoroughly read it. The use of online videos is, however, popular and engaging. Therefore, the aim of this 3-group randomised controlled trial is to examine whether a web-based physical activity intervention that provides personally-tailored videos is more effective when compared with traditional personally-tailored text-based intervention and a control group. In total 510 Australians will be recruited through social media advertisements, e-mail and third party databases. Participants will be randomised to one of three groups: text-tailored, video-tailored, or control. All groups will gain access to the same web-based platform and a library containing brief physical activity articles. The text-tailored group will additionally have access to 8 sessions of personalised physical activity advice that is instantaneously generated based on responses to brief online surveys. The theory-based advice will be provided over a period of 3 months and address constructs such as self-efficacy, motivation, goal setting, intentions, social support, attitudes, barriers, outcome expectancies, relapse prevention and feedback on performance. Text-tailored participants will also be able to complete 7 action plans to help them plan what, when, where, who with, and how they will become more active. Participants in the video-tailored group will gain access to the same intervention content as those in the text-tailored group, however all sessions will be provided as personalised videos rather than text on a webpage. The control group will only gain access to the library with generic physical activity articles. The primary outcome is objectively measured physical activity. Secondary outcomes include website engagement and retention, quality of life, depression, anxiety, stress, sitting time, sleep and psychosocial correlates of physical activity. Outcomes will be measured at baseline, 3, and 9 months. This study presents an ideal opportunity to study the effectiveness of an isolated feature within a web-based physical activity intervention and the knowledge generated from this study will help to increase intervention effectiveness. Australian New-Zealand Clinical Trial Registry: ACTRN12615000057583 . Registered 22 January 2015. CQUniversity Ethics Project Number: H14/07-163.
1985-08-01
from the mainframe to the terminals is approximately 56k bits per second (21:3). Score: 8. Expandability. The number of terminals available to the 0...the systems controllers may access any files. For modem link up, a callback system is to be implemented to prevent unauthorized off post access (10:2
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
2015-01-01
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
2015-09-03
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.
Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach
Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng
2015-01-01
Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges. PMID:26997936
Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.
Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng
2015-11-01
Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.
Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio
2011-11-01
We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.
Group Membership Based Authorization to CADC Resources
NASA Astrophysics Data System (ADS)
Damian, A.; Dowler, P.; Gaudet, S.; Hill, N.
2012-09-01
The Group Membership Service (GMS), implemented at the Canadian Astronomy Data Centre (CADC), is a prototype of what could eventually be an IVOA standard for a distributed and interoperable group membership protocol. Group membership is the core authorization concept that enables teamwork and collaboration amongst astronomers accessing distributed resources and services. The service integrates and complements other access control related IVOA standards such as single-sign-on (SSO) using X.509 proxy certificates and the Credential Delegation Protocol (CDP). The GMS has been used at CADC for several years now, initially as a subsystem and then as a stand-alone Web service. It is part of the authorization mechanism for controlling the access to restricted Web resources as well as the VOSpace service hosted by the CADC. We present the role that GMS plays within the access control system at the CADC, including the functionality of the service and how the different CADC services make use of it to assert user authorization to resources. We also describe the main advantages and challenges of using the service as well as future work to increase its robustness and functionality.
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Automated Computer Access Request System
NASA Technical Reports Server (NTRS)
Snook, Bryan E.
2010-01-01
The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).
Green, Shana M.; Lockhart, Elizabeth; Marhefka, Stephanie L.
2015-01-01
Within recent years public health interventions have become technologically based to reflect the digital age we currently live in and appeal to the public in innovative and novel ways. The Internet breaks down boundaries distance imposes and increases our ability to reach and connect with people. Internet-based interventions have the potential to expand access to effective behavioral interventions. The US National HIV/AIDS Strategy states that people living with HIV should have access to effective behavioral interventions like Healthy Relationships (HR) to help them develop safe sex and disclosure skills. However, access to HR is limited across the country, especially for people in remote or rural areas. Internet-based Healthy Relationships Video Groups (HR-VG) delivered at home or community based organizations (CBOs) can possibly expand access. This study assesses the preferences of women living with HIV (WLH) for participation in HR-VG among 21 WLH who participated in a randomized control trial (RCT) testing HR-VG and completed open-ended semi-structured telephone interviews. Transcripts were thematically analyzed to determine advantages, disadvantages and overall preference for home or agency delivery of HR-VG. Themes relating to convenience, technology access, privacy, distractions, HIV serostatus disclosure and social opportunities were identified as advantages or disadvantages to participating in HR-VG at each location. Overall privacy was the most salient concern of accessing HR-VG at home or at a CBO. Considering the concerns expressed by WLH, further studies are needed to assess how an Internet-based intervention delivered at home for WLH can maintain privacy while being cost effective. PMID:26357907
Green, Shana M; Lockhart, Elizabeth; Marhefka, Stephanie L
2015-01-01
Within recent years, public health interventions have become technology based to reflect the digital age we currently live in and appeal to the public in innovative and novel ways. The Internet breaks down boundaries distance imposes and increases our ability to reach and connect with people. Internet-based interventions have the potential to expand access to effective behavioral interventions (EBIs). The US National HIV/AIDS Strategy states that people living with HIV should have access to EBIs such as healthy relationships (HR) to help them develop safe sex and disclosure skills. However, access to HR is limited across the country, especially for people in remote or rural areas. Internet-based healthy relationships video groups (HR-VG) delivered at home or community-based organizations (CBOs) can possibly expand access. This study assesses the preferences of women living with HIV (WLH) for participation in HR-VG among 21 WLH who participated in a randomized control trial (RCT) testing HR-VG and completed open-ended semi-structured telephone interviews. Transcripts were thematically analyzed to determine advantages and disadvantages of home or CBO delivery of HR-VG. Themes relating to convenience, technology access, privacy, distractions, HIV serostatus disclosure, and social opportunities were identified as advantages or disadvantages to participating in HR-VG at each location. Overall, privacy was the most salient concern of accessing HR-VG at home or at a CBO. Considering the concerns expressed by WLH, further studies are needed to assess how an Internet-based intervention delivered at home for WLH can maintain privacy while being cost effective.
Hussain, Zainudin; Man, Azmi; Othman, Ahmad Sofiman
2011-12-01
Weedy rice (WR) is the most significant weed in direct-seeded fields. It has morphological characteristics similar to those of cultivated rice varieties. WR is more difficult to control than other weeds. We collected WR accessions from four sites within the Pulau Pinang rice growing areas. Thirty six different accessions were collected from each site: B, the northern site; P, the central site; A, the southern site; and N, the southwestern site. Wild rice (Oryza rufipogon), which grows in the sampled areas, was also collected together with four varieties (MR84, MR185, MR211 and MR219) that have been widely planted in these areas for a long period of time. The objective of this study was to compare the morphological characteristics of the WR accessions and cultivated rice. Twenty characteristics were observed for the comparison of WR accessions and rice cultivars. Morpho-matrix analyses allowed the specimens to be grouped to two main groups (A and B), based on a 95% dissimilarity matrix. Group A was subdivided into 7 subgroups consisting of a few WR accessions, wild rice and MR211 (control), and group B was subdivided to 10 subgroups consisting of other WR accessions and the 3 other control varieties. Dendrogram analysis indicated that the morphological traits used in this study were able to differentiate among the WR accessions and the cultivars, except for rice cultivar MR211 and WRA8, which grouped together in subgroup A2. STRUCTURE program analysis indicated that all individuals were distinguishable and were divided into 18 clusters. These results suggest that some genes of the WR accessions have been influenced by commercial varieties. The information gained from this study will be useful to develop rice weed management protocols and good agricultural practices to control WR in the future.
AEROSAT Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Aerosat Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Target Acquisition Performance of a Satellite Based Multiple Access Surveillance System
DOT National Transportation Integrated Search
1975-03-01
A quantitative description of the detection performance of a satellite-based surveillance system is presented. This system is one which has been proposed for CONUS coverage in an advanced air traffic control system. In addition, the computer program ...
Making the Net More Intelligent.
ERIC Educational Resources Information Center
Somers, Doug
1998-01-01
Discusses how service providers can address the challenge of costs and the need for attractive services valuable to business customers. Focuses on Internet service control; applying intelligent networking features to the internet working services dilemma; and providing access control over network-based applications for Internet virtual private…
Ardern-Jones, Joanne; Hughes, Donald K; Rowe, Philip H; Mottram, David R; Green, Christopher F
2009-04-01
This study assessed the attitudes of Emergency Department (ED) staff regarding the introduction of an automated stock-control system. The objectives were to determine attitudes to stock control and replenishment, speed of access to the system, ease of use and the potential for future uses of the system. The study was carried out in the Countess of Chester Hospital NHS Foundation Trust (COCH) ED, which is attended by over 65,000 patients each year. All 68 ED staff were sent pre-piloted, semi-structured questionnaires and reminders, before and after automation of medicines stock control. Pre-implementation, 35 staff (66.1% of respondents) reported that problems occurred with access to medicine storage keys 'very frequently' or 'frequently'. Twenty-eight (52.8%) respondents 'agreed' or 'strongly agreed' that medicines were quickly accessed, which rose to 41 (77%) post-automation (P < 0.001). Improvement was reported in stock replenishment and storage of stock injections and oral medicines, but there were mixed opinions regarding storage of bulk fluids and refrigerated items. Twenty-seven (51.9%) staff reported access to the system within 1 min and 17 (32.7%) staff reported access within 1-2 min. The majority of staff found the system 'easy' or 'very easy' to use and there was a non-significant relationship between previous use of information technology and acceptance of the system. From a staff satisfaction perspective, automation improved medicines storage, security and stock control, and addressed the problem of searching for keys to storage areas. Concerns over familiarity with computers, queuing, speed of access and an improved audit trail do not appear to have been issues, when compared with the previous manual storage of medicines.
RBAC Driven Least Privilege Architecture For Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hull, Julie; Markham, Mark
The concept of role based access control (RBAC) within the IT environment has been studied by researchers and was supported by NIST (circa 1992). This earlier work highlighted the benefits of RBAC which include reduced administrative workload and policies which are easier to analyze and apply. The goals of this research were to expand the application of RBAC in the following ways. Apply RBAC to the control systems environment: The typical RBAC model within the IT environment is used to control a user’s access to files. Within the control system environment files are replaced with measurement (e.g., temperature) and controlmore » (e.g. valve) points organized as a hierarchy of control assets (e.g. a boiler, compressor, refinery unit). Control points have parameters (e.g., high alarm limit, set point, etc.) associated with them. The RBAC model is extended to support access to points and their parameters based upon roles while at the same time allowing permissions for the points to be defined at the asset level or point level directly. In addition, centralized policy administration with distributed access enforcement mechanisms was developed to support the distributed architecture of distributed control systems and SCADA; Extend the RBAC model to include access control for software and devices: The established RBAC approach is to assign users to roles. This work extends that notion by first breaking the control system down into three layers 1) users, 2) software and 3) devices. An RBAC model is then created for each of these three layers. The result is that RBAC can be used to define machine-to-machine policy enforced via the IP security (IPsec) protocol. This highlights the potential to use RBAC for machine-to-machine connectivity within the internet of things; and Enable dynamic policy based upon the operating mode of the system: The IT environment is generally static with respect to policy. However, large cyber physical systems such as industrial controls have various operating modes (start-up, normal operation, emergency, shut-down and maintenance are typical). The policy enforcement architecture must be able to support changes in access permissions as the mode of the control system changes. For example an operator’s role may not allow the operator to shut down a pump during “normal operation” but that same operator role may be given permission to shut down the pump if the refinery transitions to “emergency” mode. The effectiveness of the approach was validated by applying it to the Experion Process Knowledge System. This is a large commercial industrial control system often used to control oil refineries and other assets within the oil and gas sector. As a by-product, other industries using Experion (Pharmaceuticals, Specialty Chemicals, etc.) also benefit from increased security. Policies representative of those that would be used within an oil refinery were created and validated against the RBAC model as implemented in the underlying SQL database. The administration of policy is simplified which in turn makes it practical for security administrators to specify policies which enforce least privilege. The result is a qualitative reduction in risk. The benefits of the enhanced RBAC model are clear and as a result. Honeywell is incorporating portions of the RBAC research into the 2014 release of Experion.« less
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
ERIC Educational Resources Information Center
Ya-chun, Lian
An automated minicomputer-based library management system is being developed at the Swedish Royal Institute of Technology Library (RITL). RAMAS (the RITL Automated Management System) currently deals with periodical check-in, claiming, index-handling, and binding control. A RAMAS bibliographic record can be accessed from eight different points…
Framework and prototype for a secure XML-based electronic health records system.
Steele, Robert; Gardner, William; Chandra, Darius; Dillon, Tharam S
2007-01-01
Security of personal medical information has always been a challenge for the advancement of Electronic Health Records (EHRs) initiatives. eXtensible Markup Language (XML), is rapidly becoming the key standard for data representation and transportation. The widespread use of XML and the prospect of its use in the Electronic Health (e-health) domain highlights the need for flexible access control models for XML data and documents. This paper presents a declarative access control model for XML data repositories that utilises an expressive XML role control model. The operational semantics of this model are illustrated by Xplorer, a user interface generation engine which supports search-browse-navigate activities on XML repositories.
Quantified Trust Levels for Authentication
NASA Astrophysics Data System (ADS)
Thomas, Ivonne; Menzel, Michael; Meinel, Christoph
Service-oriented Architectures (SOAs) facilitate applications to integrate seamlessly services from collaborating business partners regardless of organizational borders. In order to secure access to these services, mechanisms for authentication and authorisation must be deployed that control the access based on identity-related information. To enable a business partners’ users to access the provided services, an identity federation is often established that enables the brokering of identity information across organisational borders. The establishment of such a federation requires complex agreements and contracts that define common policies, obligations and procedures. Generally, this includes obligations on the authentication process as well.
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2012 CFR
2012-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2014 CFR
2014-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2013 CFR
2013-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
ERIC Educational Resources Information Center
Wilson, Scott Neal; Engler, Caroline E.; Black, Jessica E.; Yager-Elorriaga, Derik K.; Thompson, William Michael; McConnell, Andrae; Cecena, Javier Elizondo; Ralston, Ryan; Terry, Robert A.
2017-01-01
In the 21st century, students have access to a plethora of information. As such, the skills required to access and effectively sort through this information (information literacy skills) become ever more important for success in both academic and non-academic settings. This study sought to assess the efficacy of two educational games designed to…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, T.
SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, Tony
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
SPI/U3.2. Security Profile Inspector for UNIX Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, A.
1994-08-01
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
Lee, Kilhung
2010-01-01
This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270
Simple, Script-Based Science Processing Archive
NASA Technical Reports Server (NTRS)
Lynnes, Christopher; Hegde, Mahabaleshwara; Barth, C. Wrandle
2007-01-01
The Simple, Scalable, Script-based Science Processing (S4P) Archive (S4PA) is a disk-based archival system for remote sensing data. It is based on the data-driven framework of S4P and is used for data transfer, data preprocessing, metadata generation, data archive, and data distribution. New data are automatically detected by the system. S4P provides services such as data access control, data subscription, metadata publication, data replication, and data recovery. It comprises scripts that control the data flow. The system detects the availability of data on an FTP (file transfer protocol) server, initiates data transfer, preprocesses data if necessary, and archives it on readily available disk drives with FTP and HTTP (Hypertext Transfer Protocol) access, allowing instantaneous data access. There are options for plug-ins for data preprocessing before storage. Publication of metadata to external applications such as the Earth Observing System Clearinghouse (ECHO) is also supported. S4PA includes a graphical user interface for monitoring the system operation and a tool for deploying the system. To ensure reliability, S4P continuously checks stored data for integrity, Further reliability is provided by tape backups of disks made once a disk partition is full and closed. The system is designed for low maintenance, requiring minimal operator oversight.
MED31/437: A Web-based Diabetes Management System: DiabNet
Zhao, N; Roudsari, A; Carson, E
1999-01-01
Introduction A web-based system (DiabNet) was developed to provide instant access to the Electronic Diabetes Records (EDR) for end-users, and real-time information for healthcare professionals to facilitate their decision-making. It integrates portable glucometer, handheld computer, mobile phone and Internet access as a combined telecommunication and mobile computing solution for diabetes management. Methods: Active Server Pages (ASP) embedded with advanced ActiveX controls and VBScript were developed to allow remote data upload, retrieval and interpretation. Some advisory and Internet-based learning features, together with a video teleconferencing component make DiabNet web site an informative platform for Web-consultation. Results The evaluation of the system is being implemented among several UK Internet diabetes discussion groups and the Diabetes Day Centre at the Guy's & St. Thomas' Hospital. Many positive feedback are received from the web site demonstrating DiabNet is an advanced web-based diabetes management system which can help patients to keep closer control of self-monitoring blood glucose remotely, and is an integrated diabetes information resource that offers telemedicine knowledge in diabetes management. Discussion In summary, DiabNet introduces an innovative online diabetes management concept, such as online appointment and consultation, to enable users to access diabetes management information without time and location limitation and security concerns.
Jenkins, Chris; Pierson, Lyndon G.
2016-10-25
Techniques and mechanism to selectively provide resource access to a functional domain of a platform. In an embodiment, the platform includes both a report domain to monitor the functional domain and a policy domain to identify, based on such monitoring, a transition of the functional domain from a first integrity level to a second integrity level. In response to a change in integrity level, the policy domain may configure the enforcement domain to enforce against the functional domain one or more resource accessibility rules corresponding to the second integrity level. In another embodiment, the policy domain automatically initiates operations in aid of transitioning the platform from the second integrity level to a higher integrity level.
Comprehensive security framework for the communication and storage of medical images
NASA Astrophysics Data System (ADS)
Slik, David; Montour, Mike; Altman, Tym
2003-05-01
Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.
Adjacency Matrix-Based Transmit Power Allocation Strategies in Wireless Sensor Networks
Consolini, Luca; Medagliani, Paolo; Ferrari, Gianluigi
2009-01-01
In this paper, we present an innovative transmit power control scheme, based on optimization theory, for wireless sensor networks (WSNs) which use carrier sense multiple access (CSMA) with collision avoidance (CA) as medium access control (MAC) protocol. In particular, we focus on schemes where several remote nodes send data directly to a common access point (AP). Under the assumption of finite overall network transmit power and low traffic load, we derive the optimal transmit power allocation strategy that minimizes the packet error rate (PER) at the AP. This approach is based on modeling the CSMA/CA MAC protocol through a finite state machine and takes into account the network adjacency matrix, depending on the transmit power distribution and determining the network connectivity. It will be then shown that the transmit power allocation problem reduces to a convex constrained minimization problem. Our results show that, under the assumption of low traffic load, the power allocation strategy, which guarantees minimal delay, requires the maximization of network connectivity, which can be equivalently interpreted as the maximization of the number of non-zero entries of the adjacency matrix. The obtained theoretical results are confirmed by simulations for unslotted Zigbee WSNs. PMID:22346705
User Access Management Based on Network Pricing for Social Network Applications
Ma, Xingmin; Gu, Qing
2018-01-01
Social applications play a very important role in people’s lives, as users communicate with each other through social networks on a daily basis. This presents a challenge: How does one receive high-quality service from social networks at a low cost? Users can access different kinds of wireless networks from various locations. This paper proposes a user access management strategy based on network pricing such that networks can increase its income and improve service quality. Firstly, network price is treated as an optimizing access parameter, and an unascertained membership algorithm is used to make pricing decisions. Secondly, network price is adjusted dynamically in real time according to network load. Finally, selecting a network is managed and controlled in terms of the market economy. Simulation results show that the proposed scheme can effectively balance network load, reduce network congestion, improve the user's quality of service (QoS) requirements, and increase the network’s income. PMID:29495252
NASA Astrophysics Data System (ADS)
Zaharov, A. A.; Nissenbaum, O. V.; Ponomaryov, K. Y.; Nesgovorov, E. S.
2018-01-01
In this paper we study application of Internet of Thing concept and devices to secure automated process control systems. We review different approaches in IoT (Internet of Things) architecture and design and propose them for several applications in security of automated process control systems. We consider an Attribute-based encryption in context of access control mechanism implementation and promote a secret key distribution scheme between attribute authorities and end devices.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dykstra, D.; Blomer, J.
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFSmore » and Frontier.« less
NASA Technical Reports Server (NTRS)
1993-01-01
C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.
Code of Federal Regulations, 2013 CFR
2013-10-01
... and/or synthetic nucleic acids, and organisms containing recombinant and/or synthetic nucleic acids... that all records and data bases created under this part are accurate, have controlled access, and that...
Code of Federal Regulations, 2014 CFR
2014-10-01
... and/or synthetic nucleic acids, and organisms containing recombinant and/or synthetic nucleic acids... that all records and data bases created under this part are accurate, have controlled access, and that...
McLean, Carmen P; Rauch, Sheila A M; Foa, Edna B; Sripada, Rebecca K; Tannahill, Hallie S; Mintz, Jim; Yarvis, Jeffrey; Young-McCaughan, Stacey; Dondanville, Katherine A; Hall-Clark, Brittany N; Fina, Brooke A; Keane, Terence M; Peterson, Alan L
2018-01-01
Improved accessibility of effective and efficient evidence-based treatments (EBTs) for military personnel suffering with posttraumatic stress disorder (PTSD) is an urgent need to meet the growing demand for timely care. In addition, a better understanding of the mechanism of action of behavioral therapy can inform the delivery of care to meet accessibility demands. Effective EBTs for PTSD are available, but logistical and stigma-related barriers to accessing behavioral healthcare can deter military personnel from receiving these treatments. Web-based treatments represent an innovative way to overcome these barriers. The efficacy of previously developed web-based treatments for PTSD appears promising; however, they were not developed based on treatment protocols with strong empirical support for their efficacy. No study to date has examined web-based treatment of PTSD using a well-established evidence-based treatment, nor delineated the biological mechanisms through which a web-based treatment exerts its effects. This paper describes the rationale and methods of a randomized controlled trial comparing the efficacy and potential biological mediators of 10 sessions of a web-version of Prolonged Exposure (PE), "Web-PE," delivered over 8weeks compared to 10 sessions of in-person Present-Centered Therapy (PCT) delivered over 8weeks by a therapist in 120 active duty military personnel and veterans with PTSD. Copyright © 2017 Elsevier Inc. All rights reserved.
Gill, Dawn P; Blunt, Wendy; Bartol, Cassandra; Pulford, Roseanne W; De Cruz, Ashleigh; Simmavong, P Karen; Gavarkovs, Adam; Newhouse, Ian; Pearson, Erin; Ostenfeldt, Bayley; Law, Barbi; Karvinen, Kristina; Moffit, Pertice; Jones, Gareth; Watson, Cori; Zou, Guangyong; Petrella, Robert J
2017-02-07
Physical inactivity is one of the leading causes of chronic disease in Canadian adults. With less than 50% of Canadian adults reaching the recommended amount of daily physical activity, there is an urgent need for effective programs targeting this risk factor. HealtheSteps™ is a healthy lifestyle prescription program, developed from an extensive research base to address risk factors for chronic disease such as physical inactivity, sedentary behaviour and poor eating habits. HealtheSteps™ participants are provided with in-person lifestyle coaching and access to eHealth technologies delivered in community-based primary care clinics and health care organizations. To determine the effectiveness of Healthesteps™, we will conduct a 6-month pragmatic randomized controlled trial with integrated process and economic evaluations of HealtheSteps™ in 5 clinic settings in Southwestern Ontario. 110 participants will be individually randomized (1:1; stratified by site) to either the intervention (HealtheSteps™ program) or comparator (Wait-list control). There are 3 phases of the HealtheSteps™ program, lasting 6 months each. The active phase consists of bi-monthly in-person coaching with access to a full suite of eHealth technology supports. During the maintenance phase I, the in-person coaching will be removed, but participants will still have access to the full suite of eHealth technology supports. In the final stage, maintenance phase II, access to the full suite of eHealth technology supports is removed and participants only have access to publicly available resources and tools. This trial aims to determine the effectiveness of the program in increasing physical activity levels and improving other health behaviours and indicators, the acceptability of the HealtheSteps™ program, and the direct cost for each person participating in the program as well as the costs associated with delivering the program at the different community sites. These results will inform future optimization and scaling up of the program into additional community-based primary care sites. NCT02413385 (Clinicaltrials.gov). Date Registered: April 6, 2015.
Allam, Ahmed; Kostova, Zlatina; Nakamoto, Kent; Schulz, Peter Johannes
2015-01-09
Rheumatoid arthritis (RA) is chronic systematic disease that affects people during the most productive period of their lives. Web-based health interventions have been effective in many studies; however, there is little evidence and few studies showing the effectiveness of online social support and especially gamification on patients' behavioral and health outcomes. The aim of this study was to look into the effects of a Web-based intervention that included online social support features and gamification on physical activity, health care utilization, medication overuse, empowerment, and RA knowledge of RA patients. The effect of gamification on website use was also investigated. We conducted a 5-arm parallel randomized controlled trial for RA patients in Ticino (Italian-speaking part of Switzerland). A total of 157 patients were recruited through brochures left with physicians and were randomly allocated to 1 of 4 experimental conditions with different types of access to online social support and gamification features and a control group that had no access to the website. Data were collected at 3 time points through questionnaires at baseline, posttest 2 months later, and at follow-up after another 2 months. Primary outcomes were physical activity, health care utilization, and medication overuse; secondary outcomes included empowerment and RA knowledge. All outcomes were self-reported. Intention-to-treat analysis was followed and multilevel linear mixed models were used to study the change of outcomes over time. The best-fit multilevel models (growth curve models) that described the change in the primary outcomes over the course of the intervention included time and empowerment as time-variant predictors. The growth curve analyses of experimental conditions were compared to the control group. Physical activity increased over time for patients having access to social support sections plus gaming (unstandardized beta coefficient [B]=3.39, P=.02). Health care utilization showed a significant decrease for patients accessing social support features (B=-0.41, P=.01) and patients accessing both social support features and gaming (B=-0.33, P=.03). Patients who had access to either social support sections or the gaming experience of the website gained more empowerment (B=2.59, P=.03; B=2.29, P=.05; respectively). Patients who were offered a gamified experience used the website more often than the ones without gaming (t91=-2.41, P=.02; U=812, P=.02). The Web-based intervention had a positive impact (more desirable outcomes) on intervention groups compared to the control group. Social support sections on the website decreased health care utilization and medication overuse and increased empowerment. Gamification alone or with social support increased physical activity and empowerment and decreased health care utilization. This study provides evidence demonstrating the potential positive effect of gamification and online social support on health and behavioral outcomes. International Standard Randomized Controlled Trial Number (ISRCTN): 57366516; http://www.controlled-trials. com/ISRCTN57366516 (Archived by webcite at http://www.webcitation.org/6PBvvAvvV).
Kostova, Zlatina; Nakamoto, Kent; Schulz, Peter Johannes
2015-01-01
Background Rheumatoid arthritis (RA) is chronic systematic disease that affects people during the most productive period of their lives. Web-based health interventions have been effective in many studies; however, there is little evidence and few studies showing the effectiveness of online social support and especially gamification on patients’ behavioral and health outcomes. Objective The aim of this study was to look into the effects of a Web-based intervention that included online social support features and gamification on physical activity, health care utilization, medication overuse, empowerment, and RA knowledge of RA patients. The effect of gamification on website use was also investigated. Methods We conducted a 5-arm parallel randomized controlled trial for RA patients in Ticino (Italian-speaking part of Switzerland). A total of 157 patients were recruited through brochures left with physicians and were randomly allocated to 1 of 4 experimental conditions with different types of access to online social support and gamification features and a control group that had no access to the website. Data were collected at 3 time points through questionnaires at baseline, posttest 2 months later, and at follow-up after another 2 months. Primary outcomes were physical activity, health care utilization, and medication overuse; secondary outcomes included empowerment and RA knowledge. All outcomes were self-reported. Intention-to-treat analysis was followed and multilevel linear mixed models were used to study the change of outcomes over time. Results The best-fit multilevel models (growth curve models) that described the change in the primary outcomes over the course of the intervention included time and empowerment as time-variant predictors. The growth curve analyses of experimental conditions were compared to the control group. Physical activity increased over time for patients having access to social support sections plus gaming (unstandardized beta coefficient [B]=3.39, P=.02). Health care utilization showed a significant decrease for patients accessing social support features (B=–0.41, P=.01) and patients accessing both social support features and gaming (B=–0.33, P=.03). Patients who had access to either social support sections or the gaming experience of the website gained more empowerment (B=2.59, P=.03; B=2.29, P=.05; respectively). Patients who were offered a gamified experience used the website more often than the ones without gaming (t 91=–2.41, P=.02; U=812, P=.02). Conclusions The Web-based intervention had a positive impact (more desirable outcomes) on intervention groups compared to the control group. Social support sections on the website decreased health care utilization and medication overuse and increased empowerment. Gamification alone or with social support increased physical activity and empowerment and decreased health care utilization. This study provides evidence demonstrating the potential positive effect of gamification and online social support on health and behavioral outcomes. Trial Registration International Standard Randomized Controlled Trial Number (ISRCTN): 57366516; http://www.controlled-trials. com/ISRCTN57366516 (Archived by webcite at http://www.webcitation.org/6PBvvAvvV). PMID:25574939
NASA Astrophysics Data System (ADS)
Zhang, De-gan; Zhang, Xiao-dan
2012-11-01
With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.
NASA Astrophysics Data System (ADS)
Kwon, Sung-il; Lynch, M.; Prokop, M.
2005-02-01
This paper addresses the system identification and the decoupling PI controller design for a normal conducting RF cavity. Based on the open-loop measurement data of an SNS DTL cavity, the open-loop system's bandwidths and loop time delays are estimated by using batched least square. With the identified system, a PI controller is designed in such a way that it suppresses the time varying klystron droop and decouples the In-phase and Quadrature of the cavity field. The Levenberg-Marquardt algorithm is applied for nonlinear least squares to obtain the optimal PI controller parameters. The tuned PI controller gains are downloaded to the low-level RF system by using channel access. The experiment of the closed-loop system is performed and the performance is investigated. The proposed tuning method is running automatically in real time interface between a host computer with controller hardware through ActiveX Channel Access.
75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... relationship with the ultimate customer, can more effectively implement them. In addition, a broker or dealer... specific risk management controls and supervisory procedures to a customer that is a registered broker... such customer, based on its position in the transaction and relationship with the ultimate customer...
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
TREATABILITY DATABASE FOR DRINKING WATER CHEMICALS (CCL)
The Treatability Data Base will assemble referenced data on the control of contaminants in drinking water. It will be an interactive data base, housed in an EPA, web-accessible site. It may be used for many purposes, including: identifying an effective treatment process or a se...
DOT National Transportation Integrated Search
2011-06-21
In this report, vehicle-based and infrastructure-based data acquisition technologies are assessed. Vehicle-based technologies include methods for accessing the Controller Area Network (CAN) Bus on heavy vehicles, the On-Board Diagnostic (OBD II) on s...
Evaluation of the resistance of a geopolymer-based drug delivery system to tampering.
Cai, Bing; Engqvist, Håkan; Bredenberg, Susanne
2014-04-25
Tamper-resistance is an important property of controlled-release formulations of opioid drugs. Tamper-resistant formulations aim to increase the degree of effort required to override the controlled release of the drug molecules from extended-release formulations for the purpose of non-medical use. In this study, the resistance of a geopolymer-based formulation to tampering was evaluated by comparing it with a commercial controlled-release tablet using several methods commonly used by drug abusers. Because of its high compressive strength and resistance to heat, much more effort and time was required to extract the drug from the geopolymer-based formulation. Moreover, in the drug-release test, the geopolymer-based formulation maintained its controlled-release characteristics after milling, while the drug was released immediately from the milled commercial tablets, potentially resulting in dose dumping. Although the tampering methods used in this study does not cover all methods that abuser could access, the results obtained by the described methods showed that the geopolymer matrix increased the degree of effort required to override the controlled release of the drug, suggesting that the formulation has improved resistance to some common drug-abuse tampering methods. The geopolymer matrix has the potential to make the opioid product less accessible and attractive to non-medical users. Copyright © 2014 Elsevier B.V. All rights reserved.
Acka, Cinthia A.; Raso, Giovanna; N'Goran, Eliézer K.; Tschannen, Andres B.; Bogoch, Isaac I.; Séraphin, Essane; Tanner, Marcel; Obrist, Brigit; Utzinger, Jürg
2010-01-01
Background In the developing world where parasitic worm infections are pervasive, preventive chemotherapy is the key strategy for morbidity control. However, local knowledge, attitudes, and practices (KAP) of parasitic worms are poorly understood, although such information is required for prevention and sustainable control. Methods We carried out KAP surveys in two rural communities of Côte d'Ivoire that were subjected to school-based and community-based research and control activities. We used qualitative and quantitative methods. The former included observations, in-depth interviews with key informants, and focus group discussions with school children and adults. Quantitative methods consisted of a structured questionnaire administered to household heads. Principal Findings Access to clean water was lacking in both communities and only a quarter of the households had functioning latrines. There was a better understanding of soil-transmitted helminthiasis than intestinal schistosomiasis, but community-based rather than school-based interventions appeared to improve knowledge of schistosomiasis. In the villages with community-based interventions, three-quarters of household interviewees knew about intestinal schistosomiasis compared to 14% in the village where school-based interventions were implemented (P<0.001). Whereas two-thirds of respondents from the community-based intervention village indicated that the research and control project was the main source of information, only a quarter of the respondents cited the project as the main source. Conclusions/Significance Preventive chemotherapy targeting school-aged children has limitations, as older population segments are neglected, and hence lack knowledge about how to prevent and control parasitic worm infections. Improved access to clean water and sanitation is necessary, along with health education to make a durable impact against helminth infections. PMID:21200423
An All-Optical Access Metro Interface for Hybrid WDM/TDM PON Based on OBS
NASA Astrophysics Data System (ADS)
Segarra, Josep; Sales, Vicent; Prat, Josep
2007-04-01
A new all-optical access metro network interface based on optical burst switching (OBS) is proposed. A hybrid wavelength-division multiplexing/time-division multiplexing (WDM/TDM) access architecture with reflective optical network units (ONUs), an arrayed-waveguide-grating outside plant, and a tunable laser stack at the optical line terminal (OLT) is presented as a solution for the passive optical network. By means of OBS and a dynamic bandwidth allocation (DBA) protocol, which polls the ONUs, the available access bandwidth is managed. All the network intelligence and costly equipment is located at the OLT, where the DBA module is centrally implemented, providing quality of service (QoS). To scale this access network, an optical cross connect (OXC) is then used to attain a large number of ONUs by the same OLT. The hybrid WDM/TDM structure is also extended toward the metropolitan area network (MAN) by introducing the concept of OBS multiplexer (OBS-M). The network element OBS-M bridges the MAN and access networks by offering all-optical cross connection, wavelength conversion, and data signaling. The proposed innovative OBS-M node yields a full optical data network, interfacing access and metro with a geographically distributed access control. The resulting novel access metro architectures are nonblocking and, with an improved signaling, provide QoS, scalability, and very low latency. Finally, numerical analysis and simulations demonstrate the traffic performance of the proposed access scheme and all-optical access metro interface and architectures.
Optical burst switching based satellite backbone network
NASA Astrophysics Data System (ADS)
Li, Tingting; Guo, Hongxiang; Wang, Cen; Wu, Jian
2018-02-01
We propose a novel time slot based optical burst switching (OBS) architecture for GEO/LEO based satellite backbone network. This architecture can provide high speed data transmission rate and high switching capacity . Furthermore, we design the control plane of this optical satellite backbone network. The software defined network (SDN) and network slice (NS) technologies are introduced. Under the properly designed control mechanism, this backbone network is flexible to support various services with diverse transmission requirements. Additionally, the LEO access and handoff management in this network is also discussed.
Odeen, Magnus; Ihlebæk, Camilla; Indahl, Aage; Wormgoor, Marjon E A; Lie, Stein A; Eriksen, Hege R
2013-06-01
To evaluate whether information and reassurance about low back pain (LBP) given to employees at the workplace could reduce sick leave. A Cluster randomized controlled trial with 135 work units of about 3,500 public sector employees in two Norwegian municipalities, randomized into two intervention groups; Education and peer support (EPS) (n = 45 units), education and "peer support and access to an outpatient clinic" (EPSOC) (n = 48 units), and a control group (n = 42 units). Both interventions consisted of educational meetings based on a "non-injury model" and a "peer adviser" appointed by colleagues. Employees in the EPSOC group had access to an outpatient clinic for medical examination and further education. The control group received no intervention. The main outcome was sick leave based on municipal records. Secondary outcomes were self-reported pain, pain related fear of movement, coping, and beliefs about LBP from survey data of 1,746 employees (response rate about 50 %). EPS reduced sick leave by 7 % and EPSOC reduced sick leave by 4 % during the intervention year, while sick leave in the control group was increased by 7 % during the same period. Overall, Rate Ratios (RR) were statistically significant for EPSOC (RR = .84 (C.I = 0.71-.99) but not EPS (RR = .92 (C.I = 0.78-1.09)) in a mixed Poisson regression analysis. Faulty beliefs about LBP were reduced in both intervention groups. Educational meetings, combined with peer support and access to an outpatient clinic, were effective in reducing sick leave in public sector employees.
Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment
Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel
2008-01-01
Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979
NASA Astrophysics Data System (ADS)
Kawai, Hiroyuki; Morimoto, Akihito; Higuchi, Kenichi; Sawahashi, Mamoru
This paper investigates the gain of inter-Node B macro diversity for a scheduled-based shared channel using single-carrier FDMA radio access in the Evolved UTRA (UMTS Terrestrial Radio Access) uplink based on system-level simulations. More specifically, we clarify the gain of inter-Node B soft handover (SHO) with selection combining at the radio frame length level (=10msec) compared to that for hard handover (HHO) for a scheduled-based shared data channel, considering the gains of key packet-specific techniques including channel-dependent scheduling, adaptive modulation and coding (AMC), hybrid automatic repeat request (ARQ) with packet combining, and slow transmission power control (TPC). Simulation results show that the inter-Node B SHO increases the user throughput at the cell edge by approximately 10% for a short cell radius such as 100-300m due to the diversity gain from a sudden change in other-cell interference, which is a feature specific to full scheduled-based packet access. However, it is also shown that the gain of inter-Node B SHO compared to that for HHO is small in a macrocell environment when the cell radius is longer than approximately 500m due to the gains from hybrid ARQ with packet combining, slow TPC, and proportional fairness based channel-dependent scheduling.
Grünzig, Sasha-Denise; Baumeister, Harald; Bengel, Jürgen; Ebert, David; Krämer, Lena
2018-05-22
Due to limited resources, waiting periods for psychotherapy are often long and burdening for those in need of treatment and the health care system. In order to bridge the gap between initial contact and the beginning of psychotherapy, web-based interventions can be applied. The implementation of a web-based depression intervention during waiting periods has the potential to reduce depressive symptoms and enhance well-being in depressive individuals waiting for psychotherapy. In a two-arm randomized controlled trial, effectiveness and acceptance of a guided web-based intervention for depressive individuals on a waitlist for psychotherapy are evaluated. Participants are recruited in several German outpatient clinics. All those contacting the outpatient clinics with the wish to enter psychotherapy receive study information and a depression screening. Those adults (age ≥ 18) with depressive symptoms above cut-off (CES-D scale > 22) and internet access are randomized to either intervention condition (treatment as usual and immediate access to the web-based intervention) or waiting control condition (treatment as usual and delayed access to the web-based intervention). At three points of assessment (baseline, post-treatment, 3-months-follow-up) depressive symptoms and secondary outcomes, such as quality of life, attitudes towards psychotherapy and web-based interventions and adverse events are assessed. Additionally, participants' acceptance of the web-based intervention is evaluated, using measures of intervention adherence and satisfaction. This study investigates a relevant setting for the implementation of web-based interventions, potentially improving the provision of psychological health care. The results of this study contribute to the evaluation of innovative and resource-preserving health care models for outpatient psychological treatment. This trial has been registered on 13 February 2017 in the German clinical trials register (DRKS); registration number DRKS00010282 .
Western Balkans as Base for Radical Islamists
2011-06-10
18_12_06fulleureport.pdf (accessed March 25, 2011). 11Tufyal Choudhury, Mohammed Aziz , Duaa Izzidien, Intissar Khreeji, and Dilwar Hussain, ―Perceptions of...Macedonia, the Chief Mufti of the Islamic community Suleyman Rexhepi claimed in March 2011 that Wahhabis controlled four mosques in the capital Skopje...shared/bsp/hi/pdfs/18_12_06fulleureport.pdf (accessed March 25, 2011) 27Tufyal Choudhury, Mohammed Aziz , Duaa Izzidien, Intissar Khreeji, Dilwar Hussain
Fleischer, Nancy L; Thrasher, James F; Reynales-Shigematsu, Luz Myriam; Cummings, K Michael; Meza, Rafael; Zhang, Yian; Levy, David T
2017-07-01
We examined the effect of tobacco control policies in Mexico on smoking prevalence and smoking-related deaths using the Mexico SimSmoke model. The model is based on the previously developed SimSmoke simulation model of tobacco control policy, and uses population size, smoking rates and tobacco control policy data for Mexico. It assesses, individually, and in combination, the effect of six tobacco control policies on smoking prevalence and smoking-related deaths. Policies included: cigarette excise taxes, smoke-free laws, anti-smoking public education campaigns, marketing restrictions, access to tobacco cessation treatments and enforcement against tobacco sales youth. The model estimates that, if Mexico were to adopt strong tobacco control policies compared to current policy levels, smoking prevalence could be reduced by 30% in the next decade and by 50% by 2053; an additional 470,000 smoking-related premature deaths could be averted over the next 40 years. The greatest impact on smoking and smoking-related deaths would be achieved by raising excise taxes on cigarettes from 55% to at least 70% of the retail price, followed by strong youth access enforcement and access to cessation treatments. Implementing tobacco control policies in Mexico could reduce smoking prevalence by 50%, and prevent 470,000 smoking-related deaths by 2053.
Health information security: a case study of three selected medical centers in iran.
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-03-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
Reflective Database Access Control
ERIC Educational Resources Information Center
Olson, Lars E.
2009-01-01
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...
Kader Maideen, Siti Fatimah; Mohd-Sidik, Sherina; Rampal, Lekhraj; Mukhtar, Firdaus; Ibrahim, Normala; Phang, Cheng-Kar; Tan, Kit-Aun; Ahmad, Rozali
2016-06-21
Mental disorders are a major public health problem and are debilitating in many nations throughout the world. Many individuals either do not or are not able to access treatment. The Internet can be a medium to convey to the community accessible evidenced-based interventions to reduce these burdens. The objective of this study is to investigate the effectiveness of 4 weeks of a Web-based psychoeducational intervention program for depressive and anxiety symptoms in the community of Selangor, Malaysia. A two-arm randomized controlled trial of a single-blind study will be conducted to meet the objective of this study. We aim to recruit 84 participants each for the intervention and control groups. The recruitment will be from participants who participated in the first phase of this research. The primary outcomes of this study are depressive and anxiety scores, which will be assessed using the Patient Health Questionnaire 9 and Generalized Anxiety Disorder 7, respectively. The secondary outcome includes mental health literacy of the participants, which will be assessed using the self-developed and adapted Mental Health Literacy Questionnaire. The psychoeducational intervention program consists of four sessions, which will be accessed each week. The depressive and anxiety symptoms will be compared between participants who participated in the psychoeducational program compared with the control group. Depressive and anxiety scores and mental health literacy will be assessed at week 1 and at follow-ups at week 5 and week 12, respectively. The psychoeducational intervention program consists of four sessions, which will be accessed at each week. The depressive and anxiety symptoms will be compared between the intervention and control groups using a series of mixed ANOVAs. Depressive and anxiety scores and mental health literacy will be assessed at week 1 and at two follow-ups at week 5 and week 12, respectively. To our knowledge, this study will be the first randomized controlled trial of a Web-based psychoeducational intervention program for depression and anxiety in an adult community in Malaysia. The results from this study will determine the effectiveness of a psychoeducational intervention program in the management of depression and anxiety among adults in the community. If proven to be effective, the intervention can serve as a new modality to manage and reduce the burden of these disorders in the community. International Standard Randomized Controlled Trial Number (ISRCTN): 39656144; http://www.isrctn.com/ISRCTN39656144 (Archived by WebCite at http://www.webcitation.org/6hSVhV71K).
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
2018-04-28
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang
2017-01-01
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733
Oliveira, Frederico I C DE; Fiege, Leonardo B C; Celin, Elaine F; Innecco, Renato; Nunes, Glauber H S; Aragão, Fernando A S DE
2017-01-01
Melon is one of the most important vegetable crops in the world. With short cycle in a system of phased planting, phytosanitary control is compromised, and a great volume of agricultural chemicals is used to control vegetable leafminer. Genetic control is an ideal alternative to avoid the damage caused by this insect. Thus, the aim of this study was to evaluate Cucumis accessions in regard to resistance to leafminer and correlate the variables analyzed. Fifty-four accessions and four commercial hybrids of melon were tested. The study was divided into two experiments: with and with no choice. The following characteristics were evaluated: with choice, in field - subjective score based on the infestation and the number of mines per leaf; and with no choice, in cage - number of mines per leaf, chlorophyll content, and leaf colorimetry. The results showed variability among the accessions and some genotypes showed favorable results for resistance in both experiments. There was correlation between the two variables in the experiment in the field. The accessions CNPH 11-282, CNPH 06-1047, and CNPH 11-1077 are the most recommended for future breeding programs with aim on introgression of resistance to vegetable leafminer in melon.
Access Control Model for Sharing Composite Electronic Health Records
NASA Astrophysics Data System (ADS)
Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.
ERIC Educational Resources Information Center
Mattord, Herbert J.
2012-01-01
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
NASA Technical Reports Server (NTRS)
Degaudenzi, R.; Elia, C.; Viola, R.
1990-01-01
Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.
Kisker, E E; Brown, R S
1996-05-01
The purpose of this investigation was to assess the School-Based Adolescent Health Care Program, which provided comprehensive health-related services in 24 school-based health centers. The outcomes evaluation compared a cohort of students attending 19 participating schools and a national sample of urban youths, using logit models to control for observed differences between the two groups of youths. Outcome measures included self-reports concerning health center utilization, use of other health care providers, knowledge of key health facts, substance use, sexual activity, contraceptive use, pregnancies and births, and health status. The health centers increased students' access to health care and improved their health knowledge. However, the estimated impacts on health status and risky behaviors were inconsistent, and most were small and not statistically significant. School-based health centers can increase students' health knowledge and access to health-related services, but more intensive or different services are needed if they are to significantly reduce risk-taking behaviors.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
A Flexible Component based Access Control Architecture for OPeNDAP Services
NASA Astrophysics Data System (ADS)
Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank
2010-05-01
Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC. These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.
Multiple access techniques and spectrum utilization of the GLOBALSTAR mobile satellite system
NASA Astrophysics Data System (ADS)
Louie, Ming; Cohen, Michel; Rouffet, Denis; Gilhousen, Klein S.
The GLOBALSTAR System is a Low Earth Orbit (LEO) satellite-based mobile communications system that is interoperable with the current and future Public Land Mobile Network (PLMN). The GLOBALSTAR System concept is based upon technological advancement in two key areas: (1) the advancement in LEO satellite technology; (2) the advancement in cellular telephone technology, including the commercial applications of Code Division Multiple Access (CDMA) technologies, and of the most recent progress in Time Division Multiple Access technologies. The GLOBALSTAR System uses elements of CDMA, Frequency Division Multiple Access (FDMA), and Time Division Multiple Access (TDMA) technology, combining with satellite Multiple Beam Antenna (MBA) technology, to arrive at one of the most efficient modulation and multiple access system ever proposed for a satellite communications system. The technology used in GLOBALSTAR exploits the following techniques in obtaining high spectral efficiency and affordable cost per channel, with minimum coordination among different systems: power control, in open and closed loops, voice activation, spot beam satellite antenna for frequency reuse, weighted satellite antenna gain, multiple satellite coverage, and handoff between satellites. The GLOBALSTAR system design will use the following frequency bands: 1610-1626.5 MHz for up-link and 2483.5-2500 MHz for down-link.
NASA Astrophysics Data System (ADS)
Natsui, Masanori; Hanyu, Takahiro
2018-04-01
In realizing a nonvolatile microcontroller unit (MCU) for sensor nodes in Internet-of-Things (IoT) applications, it is important to solve the data-transfer bottleneck between the central processing unit (CPU) and the nonvolatile memory constituting the MCU. As one circuit-oriented approach to solving this problem, we propose a memory access minimization technique for magnetoresistive-random-access-memory (MRAM)-embedded nonvolatile MCUs. In addition to multiplexing and prefetching of memory access, the proposed technique realizes efficient instruction fetch by eliminating redundant memory access while considering the code length of the instruction to be fetched and the transition of the memory address to be accessed. As a result, the performance of the MCU can be improved while relaxing the performance requirement for the embedded MRAM, and compact and low-power implementation can be performed as compared with the conventional cache-based one. Through the evaluation using a system consisting of a general purpose 32-bit CPU and embedded MRAM, it is demonstrated that the proposed technique increases the peak efficiency of the system up to 3.71 times, while a 2.29-fold area reduction is achieved compared with the cache-based one.
Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems
NASA Astrophysics Data System (ADS)
Kollár, Martin
2012-05-01
In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (
2016-01-01
Background Mindfulness meditation interventions improve a variety of health conditions and quality of life, are inexpensive, easy to implement, have minimal if any side effects, and engage patients to take an active role in their treatment. However, the group format can be an obstacle for many to take structured meditation programs. Internet Mindfulness Meditation Intervention (IMMI) is a program that could make mindfulness meditation accessible to all people who want and need to receive it. However, the feasibility, acceptability, and ability of IMMI to increase meditation practice have yet to be evaluated. Objectives The primary objectives of this pilot randomized controlled study were to (1) evaluate the feasibility and acceptability of IMMIs in the general population and (2) to evaluate IMMI’s ability to change meditation practice behavior. The secondary objective was to collect preliminary data on health outcomes. Methods Potential participants were recruited from online and offline sources. In a randomized controlled trial, participants were allocated to IMMI or Access to Guided Meditation arm. IMMI included a 1-hour Web-based training session weekly for 6 weeks along with daily home practice guided meditations between sessions. The Access to Guided Meditation arm included a handout on mindfulness meditation and access to the same guided meditation practices that the IMMI participants received, but not the 1-hour Web-based training sessions. The study activities occurred through the participants’ own computer and Internet connection and with research-assistant telephone and email contact. Feasibility and acceptability were measured with enrollment and completion rates and participant satisfaction. The ability of IMMI to modify behavior and increase meditation practice was measured by objective adherence of daily meditation practice via Web-based forms. Self-report questionnaires of quality of life, self-efficacy, depression symptoms, sleep disturbance, perceived stress, and mindfulness were completed before and after the intervention period via Web-based surveys. Results We enrolled 44 adults were enrolled and 31 adults completed all study activities. There were no group differences on demographics or important variables at baseline. Participants rated the IMMI arm higher than the Access to Guided Meditation arm on Client Satisfaction Questionnaire. IMMI was able to increase home practice behavior significantly compared to the Access to Guided Meditation arm: days practiced (P=.05), total minutes (P=.01), and average minutes (P=.05). As expected, there were no significant differences on health outcomes. Conclusions In conclusion, IMMI was found to be feasible and acceptable. The IMMI arm had increased daily meditation practice compared with the Access to Guided Meditation control group. More interaction through staff and/or through built-in email or text reminders may increase daily practice even more. Future studies will examine IMMI’s efficacy at improving health outcomes in the general population and also compare it directly to the well-studied mindfulness-based group interventions to evaluate relative efficacy. Trial Registration Clinicaltrials.gov NCT02655835; http://clinicaltrials.gov/ct2/show/NCT02655835 (Archived by WebCite at http://www.webcitation/ 6jUDuQsG2) PMID:27502759
The Timing and Magnitude of Stroop Interference and Facilitation in Monolinguals and Bilinguals
ERIC Educational Resources Information Center
Coderre, Emily L.; Van Heuven, Walter J. B.; Conklin, Kathy
2013-01-01
Executive control abilities and lexical access speed in Stroop performance were investigated in English monolinguals and two groups of bilinguals (English-Chinese and Chinese-English) in their first (L1) and second (L2) languages. Predictions were based on a bilingual cognitive advantage hypothesis, implicating cognitive control ability as the…
NASA Astrophysics Data System (ADS)
Seo, Junyeong; Sung, Youngchul
2018-06-01
In this paper, an efficient transmit beam design and user scheduling method is proposed for multi-user (MU) multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) downlink, based on Pareto-optimality. The proposed beam design and user scheduling method groups simultaneously-served users into multiple clusters with practical two users in each cluster, and then applies spatical zeroforcing (ZF) across clusters to control inter-cluster interference (ICI) and Pareto-optimal beam design with successive interference cancellation (SIC) to two users in each cluster to remove interference to strong users and leverage signal-to-interference-plus-noise ratios (SINRs) of interference-experiencing weak users. The proposed method has flexibility to control the rates of strong and weak users and numerical results show that the proposed method yields good performance.
A School-Based Program for Overweight and Obese Adolescents: A Randomized Controlled Trial
ERIC Educational Resources Information Center
Pbert, Lori; Druker, Susan; Barton, Bruce; Schneider, Kristin L.; Olendzki, Barbara; Gapinski, Mary A.; Kurtz, Stephen; Osganian, Stavroula
2016-01-01
Background: Given the dramatic increase in adolescent overweight and obesity, models are needed for implementing weight management treatment through readily accessible venues. We evaluated the acceptability and efficacy of a school-based intervention consisting of school nurse-delivered counseling and an afterschool exercise program in improving…
Yang, Dan; Xu, Bin; Rao, Kaiyou; Sheng, Weihua
2018-01-24
Indoor occupants' positions are significant for smart home service systems, which usually consist of robot service(s), appliance control and other intelligent applications. In this paper, an innovative localization method is proposed for tracking humans' position in indoor environments based on passive infrared (PIR) sensors using an accessibility map and an A-star algorithm, aiming at providing intelligent services. First the accessibility map reflecting the visiting habits of the occupants is established through the integral training with indoor environments and other prior knowledge. Then the PIR sensors, which placement depends on the training results in the accessibility map, get the rough location information. For more precise positioning, the A-start algorithm is used to refine the localization, fused with the accessibility map and the PIR sensor data. Experiments were conducted in a mock apartment testbed. The ground truth data was obtained from an Opti-track system. The results demonstrate that the proposed method is able to track persons in a smart home environment and provide a solution for home robot localization.
Yang, Dan; Xu, Bin; Rao, Kaiyou; Sheng, Weihua
2018-01-01
Indoor occupants’ positions are significant for smart home service systems, which usually consist of robot service(s), appliance control and other intelligent applications. In this paper, an innovative localization method is proposed for tracking humans’ position in indoor environments based on passive infrared (PIR) sensors using an accessibility map and an A-star algorithm, aiming at providing intelligent services. First the accessibility map reflecting the visiting habits of the occupants is established through the integral training with indoor environments and other prior knowledge. Then the PIR sensors, which placement depends on the training results in the accessibility map, get the rough location information. For more precise positioning, the A-start algorithm is used to refine the localization, fused with the accessibility map and the PIR sensor data. Experiments were conducted in a mock apartment testbed. The ground truth data was obtained from an Opti-track system. The results demonstrate that the proposed method is able to track persons in a smart home environment and provide a solution for home robot localization. PMID:29364188
Skynet Junior Scholars- Sharing the Universe with Blind/Low Vision Youth
NASA Astrophysics Data System (ADS)
Meredith, Kate K.; Hoette, Vivian; Kron, Richard; Heatherly, Sue Ann; Williamson, Kathryn; Gurton, Suzanne; Haislip, Josh; Reichart, Dan
2015-08-01
Skynet Junior Scholars, a project funded by the National Science Foundation, aims to engage middle school youth including youth with visual and hearing impairments in investigating the universe with the same tools professionals use. Project deliverables include: 1) Online access to optical and radio telescopes, data analysis tools, and professional astronomers, 2) An age-appropriate web-based interface for controlling remote telescopes, 3) Inquiry-based standards-aligned instructional modules. From an accessibility perspective, the goal of the Skynet Junior Scholars project is to facilitate independent access to the project deliverables to the greatest extent possible given existing accessibility technologies. In this poster we describe our experience in field-testing SJS activities with 29 blind/low vision youth attending a Lion’s Club summer camp. From our observations and preliminary results from pre and post surveys and interviews, we learned that rather than creating a new interest in STEM, we were instead nourishing pre-existing interest giving students their first direct experience in observational astronomy. Additional accessibility features have been added to the SJS program since the initial pilot testing. Full testing is scheduled for July 2015.
NASA Astrophysics Data System (ADS)
Deloose, I.; Pace, A.
1994-12-01
The two CERN isotope separators named ISOLDE have been running on the new Personal Computer (PC) based control system since April 1992. The new architecture that makes heavy use of the commercial software and hardware of the PC market has been implemented on the 1700 geographically distributed control channels of the two separators and their experimental area. Eleven MSDOS Intel-based PCs with approximately 80 acquisition and control boards are used to access the equipment and are controlled from three PCs running Microsoft Windows used as consoles through a Novell Local Area Network. This paper describes the interesting solutions found and discusses the reduced programming workload and costs that have been obtained.
NASA Astrophysics Data System (ADS)
Impemba, Ernesto; Inzerilli, Tiziano
2003-07-01
Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.
Security in the CernVM File System and the Frontier Distributed Database Caching System
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.
2014-06-01
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.
Why build limited access highways?.
DOT National Transportation Integrated Search
1991-01-01
This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...
Integrating Software Modules For Robot Control
NASA Technical Reports Server (NTRS)
Volpe, Richard A.; Khosla, Pradeep; Stewart, David B.
1993-01-01
Reconfigurable, sensor-based control system uses state variables in systematic integration of reusable control modules. Designed for open-architecture hardware including many general-purpose microprocessors, each having own local memory plus access to global shared memory. Implemented in software as extension of Chimera II real-time operating system. Provides transparent computing mechanism for intertask communication between control modules and generic process-module architecture for multiprocessor realtime computation. Used to control robot arm. Proves useful in variety of other control and robotic applications.
Day, Victor; McGrath, Patrick J; Wojtowicz, Magdalena
2013-07-01
Anxiety, depression and stress, often co-occurring, are the psychological problems for which university students most often seek help. Moreover there are many distressed students who cannot, or choose not to, access professional help. The present study evaluated the efficacy of an internet-based guided self-help program for moderate anxiety, depression and stress. The program was based on standard cognitive behavior therapy principles and included 5 core modules, some of which involved options for focusing on anxiety and/or depression and/or stress. Trained student coaches provided encouragement and advice about using the program via e-mail or brief weekly phone calls. Sixty-six distressed university students were randomly assigned to either Immediate Access or a 6-week Delayed Access condition. Sixty-one percent of Immediate Access participants completed all 5 core modules, and 80% of all participants completed the second assessment. On the Depression, Anxiety and Stress Scales-21, Immediate Access participants reported significantly greater reductions in depression (ηp(2)=. 07), anxiety (ηp(2)=. 08) and stress (ηp(2)=. 12) in comparison to participants waiting to do the program, and these improvements were maintained at a six month follow-up. The results suggest that the provision of individually-adaptable, internet-based, self-help programs can reduce psychological distress in university students. Copyright © 2013 Elsevier Ltd. All rights reserved.
Memory-Intensive Benchmarks: IRAM vs. Cache-Based Machines
NASA Technical Reports Server (NTRS)
Biswas, Rupak; Gaeke, Brian R.; Husbands, Parry; Li, Xiaoye S.; Oliker, Leonid; Yelick, Katherine A.; Biegel, Bryan (Technical Monitor)
2002-01-01
The increasing gap between processor and memory performance has lead to new architectural models for memory-intensive applications. In this paper, we explore the performance of a set of memory-intensive benchmarks and use them to compare the performance of conventional cache-based microprocessors to a mixed logic and DRAM processor called VIRAM. The benchmarks are based on problem statements, rather than specific implementations, and in each case we explore the fundamental hardware requirements of the problem, as well as alternative algorithms and data structures that can help expose fine-grained parallelism or simplify memory access patterns. The benchmarks are characterized by their memory access patterns, their basic control structures, and the ratio of computation to memory operation.
NASA Technical Reports Server (NTRS)
Collins, Earl R., Jr.
1990-01-01
Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.
Rakovshik, Sarah G; McManus, Freda; Vazquez-Montes, Maria; Muse, Kate; Ougrin, Dennis
2016-03-01
To investigate the effect of Internet-based training (IBT), with and without supervision, on therapists' (N = 61) cognitive-behavioral therapy (CBT) skills in routine clinical practice. Participants were randomized into 3 conditions: (1) Internet-based training with use of a consultation worksheet (IBT-CW); (2) Internet-based training with CBT supervision via Skype (IBT-S); and (3) "delayed-training" controls (DTs), who did not receive the training until all data collection was completed. The IBT participants received access to training over a period of 3 months. CBT skills were evaluated at pre-, mid- and posttraining/wait using assessor competence ratings of recorded therapy sessions. Hierarchical linear analysis revealed that the IBT-S participants had significantly greater CBT competence at posttraining than did IBT-CW and DT participants at both the mid- and posttraining/wait assessment points. There were no significant differences between IBT-CW and the delayed (no)-training DTs. IBT programs that include supervision may be a scalable and effective method of disseminating CBT into routine clinical practice, particularly for populations without ready access to more-traditional "live" methods of training. There was no evidence for a significant effect of IBT without supervision over a nontraining control, suggesting that merely providing access to IBT programs may not be an effective method of disseminating CBT to routine clinical practice. (c) 2016 APA, all rights reserved).
An evidential approach to problem solving when a large number of knowledge systems is available
NASA Technical Reports Server (NTRS)
Dekorvin, Andre
1989-01-01
Some recent problems are no longer formulated in terms of imprecise facts, missing data or inadequate measuring devices. Instead, questions pertaining to knowledge and information itself arise and can be phrased independently of any particular area of knowledge. The problem considered in the present work is how to model a problem solver that is trying to find the answer to some query. The problem solver has access to a large number of knowledge systems that specialize in diverse features. In this context, feature means an indicator of what the possibilities for the answer are. The knowledge systems should not be accessed more than once, in order to have truly independent sources of information. Moreover, these systems are allowed to run in parallel. Since access might be expensive, it is necessary to construct a management policy for accessing these knowledge systems. To help in the access policy, some control knowledge systems are available. Control knowledge systems have knowledge about the performance parameters status of the knowledge systems. In order to carry out the double goal of estimating what units to access and to answer the given query, diverse pieces of evidence must be fused. The Dempster-Shafer Theory of Evidence is used to pool the knowledge bases.
Zou, An-Min; Kumar, Krishna Dev
2012-07-01
This brief considers the attitude coordination control problem for spacecraft formation flying when only a subset of the group members has access to the common reference attitude. A quaternion-based distributed attitude coordination control scheme is proposed with consideration of the input saturation and with the aid of the sliding-mode observer, separation principle theorem, Chebyshev neural networks, smooth projection algorithm, and robust control technique. Using graph theory and a Lyapunov-based approach, it is shown that the distributed controller can guarantee the attitude of all spacecraft to converge to a common time-varying reference attitude when the reference attitude is available only to a portion of the group of spacecraft. Numerical simulations are presented to demonstrate the performance of the proposed distributed controller.
Spatial accessibility to vaccination sites in a campaign against rabies in São Paulo city, Brazil.
Polo, Gina; Acosta, Carlos Mera; Dias, Ricardo Augusto
2013-08-01
It is estimated that the city of São Paulo has over 2.5 million dogs and 560 thousand cats. These populations are irregularly distributed throughout the territory, making it difficult to appropriately allocate health services focused on these species. To reasonably allocate vaccination sites, it is necessary to identify social groups and their access to the referred service. Rabies in dogs and cats has been an important zoonotic health issue in São Paulo and the key component of rabies control is vaccination. The present study aims to introduce an approach to quantify the potential spatial accessibility to the vaccination sites of the 2009 campaign against rabies in the city of São Paulo and solve the overestimation associated with the classic methodology that applies buffer zones around vaccination sites based on Euclidean (straight-line) distance. To achieve this, a Gaussian-based two-step floating catchment area method with a travel-friction coefficient was adapted in a geographic information system environment, using distances along a street network based on Dijkstra's algorithm (short path method). The choice of the distance calculation method affected the results in terms of the population covered. In general, areas with low accessibility for both dogs and cats were observed, especially in densely populated areas. The eastern zone of the city had higher accessibility values compared with peripheral and central zones. The Gaussian-based two-step floating catchment method with a travel-friction coefficient was used to assess the overestimation of the straight-line distance method, which is the most widely used method for coverage analysis. We conclude that this approach has the potential to improve the efficiency of resource use when planning rabies control programs in large urban environments such as São Paulo. The findings emphasize the need for surveillance and intervention in isolated areas. Copyright © 2013 Elsevier B.V. All rights reserved.
Dynamic access control model for privacy preserving personalized healthcare in cloud environment.
Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon
2015-01-01
When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban
2017-01-01
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat. PMID:28758045
An Open-Source Arduino-based Controller for Mechanical Rain Simulators
NASA Astrophysics Data System (ADS)
Cantilina, K. K.
2017-12-01
Many commercial rain simulators currently used in hydrology rely on inflexible and outdated controller designs. These analog controllers typically only allow a handful of discrete parameter options, and do not support internal timing functions or continuously-changing parameters. A desire for finer control of rain simulation events necessitated the design and construction of a microcontroller-based controller, using widely available off-the-shelf components. A menu driven interface allows users to fine-tune simulation parameters without the need for training or experience with microcontrollers, and the accessibility of the Arduino IDE allows users with a minimum of programming and hardware experience to modify the controller program to suit the needs of individual experiments.
Modeling rural landowners' hunter access policies in East Texas, USA
NASA Astrophysics Data System (ADS)
Wright, Brett A.; Fesenmaier, Daniel R.
1988-03-01
Private landowners in East Texas, USA, were aggregated into one of four policy categories according to the degree of access allowed to their lands for hunting. Based on these categories, a logistic regression model of possible determinants of access policy was developed and probabilities of policy adoption were calculated. Overwhelmingly, attitudes toward hunting as a sport, incentives, and control over the actions of hunters were most predictive of landowners' policies. Additionally, the availability of deer was found to be negatively correlated with access, thereby suggesting management efforts to increase deer populations may be counter to increasing access. Further, probabilities derived from the model indicated that there was almost a 7 in 10 chance (0.66) that landowners would adopt policies commensurate with allowing family and personal acquaintances to hunt on their property. However, the probability of increasing access beyond this level, where access was provided for the general public, dropped off drastically to less than 5% (0.04).
Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database
NASA Astrophysics Data System (ADS)
Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin
2014-06-01
The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.
Community-based colorectal cancer intervention in underserved Korean Americans.
Ma, Grace X; Shive, Steve; Tan, Yin; Gao, Wanzhen; Rhee, Joanne; Park, Micah; Kim, Jaesool; Toubbeh, Jamil I
2009-11-01
Despite evidence of a decline in both incidence and prevalence of colorectal cancer nationwide, it remains the second most commonly diagnosed cancer and the third highest cause of mortality among Asian Americans, including Korean Americans. This community-based and theoretically guided study evaluated a culturally appropriate intervention program that included a bilingual cancer educational program among Korean Americans including information on CRC risks, counseling to address psychosocial and access barriers, and patient navigation assistance. A two-group quasi-experimental design with baseline and post-intervention assessment and a 12-month follow-up on screening was used in the study. Korean Americans (N=167) were enrolled from six Korean churches. The intervention group received culturally appropriate intervention program addressing accessibility and psychosocial barriers, and navigation assistance for screening. The control group received general health education that included cancer-related health issues and screening. There was a significant difference (p<0.05) between the post-intervention and control groups in awareness of CRC risk factors. There was also a significant improvement in the pre-post across HBM measures in the intervention group for perceived susceptibility (p<0.05) and benefits and barriers to screening (p<0.001). At baseline, 13% of participants in the intervention group and 10% in control group reported having had a CRC cancer screening test in the previous year. At the 12-month post-intervention follow-up, 77.4% of participants in the intervention group had obtained screening compared to 10.8% in the control group. While health disparities result from numerous factors, a culturally appropriate and church-based intervention can be highly effective in increasing knowledge of and access to, and in reducing barriers to CRC screening among underserved Koreans.
Rahman, M S; Reichelt-Brushet, A J; Clark, M W; Farzana, T; Yee, L H
2017-03-01
Bio-accessibility and bioavailability of arsenic (As) in historically As-contaminated soils (cattle tick pesticide), and pristine soils were assessed using 3 different approaches. These approaches included human bio-accessibility using an extraction test replicating gastric conditions (in vitro physiologically-based extraction test); an operationally defined bioaccessibility extraction test - 1.0M HCl extraction; and a live organism bioaccumulation test using earthworms. A sequential extraction procedure revealed the soil As-pool that controls bio-accessibility and bioaccumulation of As. Findings show that As is strongly bound to historically contaminated soil with a lower degree of As bio-accessibility (<15%) and bioaccumulation (<9%) compared with freshly contaminated soil. Key to these lower degrees of bio-accessibility and bioaccumulation is the greater fraction of As associated with crystalline Fe/Al oxy-hydroxide and residual phases. The high bio-accessibility and bioaccumulation of freshly sorbed As in pristine soils were from the exchangeable and specifically sorbed As fractions. Arsenic bioaccumulation in earthworms correlates strongly with both the human bio-accessible, and the operationally defined bioavailable fractions. Hence, results suggest that indirect As bioavailability measures, such as accumulation by earthworm, can be used as complementary lines of evidence to reinforce site-wide trends in the bio-accessibility using in vitro physiologically-based extractions and/or operationally defined extraction test. Such detailed knowledge is useful for successful reclamation and management of the As contaminated soils. Copyright © 2017 Elsevier B.V. All rights reserved.
Diabetes care and service access among elderly Vietnamese with type 2 diabetes.
Carolan-Olah, Mary C; Cassar, Angie; Quiazon, Regina; Lynch, Sean
2013-10-29
Vietnamese patients are disproportionately represented in type 2 diabetes mellitus statistics and also incur high rates of diabetes complications. This situation is compounded by limited access to health care. The aim of this project was to gain a deeper understanding of the difficulties Vietnamese patients experience when accessing services and managing their type 2 diabetes mellitus, and to identify factors that are important in promoting health service use. Three focus groups with 15 Vietnamese participants with type 2 diabetes mellitus, 60 to >70 years of age, were conducted in Vietnamese. Open-ended questions were used and focussed on experiences of living with diabetes and access to healthcare services in the Inner Northwest Melbourne region. Audio recordings were transcribed and then translated into English. Data were analysed using a thematic analysis framework. Findings indicate four main themes, which together provide some insight into the experiences of living with diabetes and accessing ongoing care and support, for elderly Vietnamese with type 2 diabetes. Themes included: (1) the value of being healthy; (2) controlling diabetes; (3) staying healthy; and (4) improving services and information access. Participants in this study were encouraged to adhere to diabetes self-management principles, based largely on a fear of medical complications. Important aspects of healthcare access were identified as; being treated with respect, having their questions answered and having access to interpreters and information in Vietnamese. Attention to these details is likely to lead to improved access to healthcare services and ultimately to improve glycemic control and overall health status for this community.
A Public-Health-Based Vision for the Management and Regulation of Psychedelics.
Haden, Mark; Emerson, Brian; Tupper, Kenneth W
2016-01-01
The Health Officers Council of British Columbia has proposed post-prohibition regulatory models for currently illegal drugs based on public health principles, and this article continues this work by proposing a model for the regulation and management of psychedelics. This article outlines recent research on psychedelic substances and the key determinants of benefit and harm from their use. It then describes a public-health-based model for the regulation of psychedelics, which includes governance, supervision, set and setting controls, youth access, supply control, demand limitation, and evaluation.
NASA Astrophysics Data System (ADS)
Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko
We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.
Blaya, Joaquín A; Shin, Sonya; Contreras, Carmen; Yale, Gloria; Suarez, Carmen; Asencios, Luis; Kim, Jihoon; Rodriguez, Pablo; Cegielski, Peter; Fraser, Hamish S F
2011-01-01
To evaluate the time to communicate laboratory results to health centers (HCs) between the e-Chasqui web-based information system and the pre-existing paper-based system. Cluster randomized controlled trial in 78 HCs in Peru. In the intervention group, 12 HCs had web access to results via e-Chasqui (point-of-care HCs) and forwarded results to 17 peripheral HCs. In the control group, 22 point-of-care HCs received paper results directly and forwarded them to 27 peripheral HCs. Baseline data were collected for 15 months. Post-randomization data were collected for at least 2 years. Comparisons were made between intervention and control groups, stratified by point-of-care versus peripheral HCs. For point-of-care HCs, the intervention group took less time to receive drug susceptibility tests (DSTs) (median 9 vs 16 days, p<0.001) and culture results (4 vs 8 days, p<0.001) and had a lower proportion of 'late' DSTs taking >60 days to arrive (p<0.001) than the control. For peripheral HCs, the intervention group had similar communication times for DST (median 22 vs 19 days, p=0.30) and culture (10 vs 9 days, p=0.10) results, as well as proportion of 'late' DSTs (p=0.57) compared with the control. Only point-of-care HCs with direct access to the e-Chasqui information system had reduced communication times and fewer results with delays of >2 months. Peripheral HCs had no benefits from the system. This suggests that health establishments should have point-of-care access to reap the benefits of electronic laboratory reporting.
Shin, Sonya; Contreras, Carmen; Yale, Gloria; Suarez, Carmen; Asencios, Luis; Kim, Jihoon; Rodriguez, Pablo; Cegielski, Peter; Fraser, Hamish S F
2010-01-01
Objective To evaluate the time to communicate laboratory results to health centers (HCs) between the e-Chasqui web-based information system and the pre-existing paper-based system. Methods Cluster randomized controlled trial in 78 HCs in Peru. In the intervention group, 12 HCs had web access to results via e-Chasqui (point-of-care HCs) and forwarded results to 17 peripheral HCs. In the control group, 22 point-of-care HCs received paper results directly and forwarded them to 27 peripheral HCs. Baseline data were collected for 15 months. Post-randomization data were collected for at least 2 years. Comparisons were made between intervention and control groups, stratified by point-of-care versus peripheral HCs. Results For point-of-care HCs, the intervention group took less time to receive drug susceptibility tests (DSTs) (median 9 vs 16 days, p<0.001) and culture results (4 vs 8 days, p<0.001) and had a lower proportion of ‘late’ DSTs taking >60 days to arrive (p<0.001) than the control. For peripheral HCs, the intervention group had similar communication times for DST (median 22 vs 19 days, p=0.30) and culture (10 vs 9 days, p=0.10) results, as well as proportion of ‘late’ DSTs (p=0.57) compared with the control. Conclusions Only point-of-care HCs with direct access to the e-Chasqui information system had reduced communication times and fewer results with delays of >2 months. Peripheral HCs had no benefits from the system. This suggests that health establishments should have point-of-care access to reap the benefits of electronic laboratory reporting. PMID:21113076
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same... synchronous dynamic random access memory controllers and products containing same by reason of infringement of... semiconductor chips having synchronous dynamic random access memory controllers and products containing same...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
Spectrum Efficiency Through Dynamic Spectrum Access Techniques (Briefing Charts)
2014-06-01
Telemetry Data Sources IP BASED TELEMETRY STATION Flow control • Volume- based • Credit- based • Rate- based Signaling using custom protocols or standards...Responsible for all T&E infrastructure assessment within the Major Range and Test Facility Base (MRTFB) DoD Directive 3200.11 • Administer three...Memorandum Unleashing of the Wireless Broadband Revolution THE WHY: Based on the view that “we are now beginning the next transformation in
SPACEHAB missions as pathfinders for ISS services development
NASA Astrophysics Data System (ADS)
Hamill, Doris; Jackson, Kenneth; Mirra, Carlo
2003-01-01
SPACEHAB, Inc. has established a commercial business model for providing access to space. The model, based on private initiative and investment, has offered "turn key" access to space including both launch and integration and operations services. Some features of this business model should be applied directly to providing service in the ISS era: offering packaged service at a fixed price; customer focus; private investment as the basis for offering services; and efficient and continually improving customer service. But International Space Station (ISS) will pose challenges that have not been pioneered in the STS era: a new base of customers must be developed; on-orbit hardware will be more difficult to modify; access to ISS is controlled by government space agencies. These problems will tax the ingenuity of those who wish to provide services in space on a commercial business model.
Inattention and Response to the ABRACADABRA Web-Based Literacy Intervention
ERIC Educational Resources Information Center
Deault, Louise; Savage, Robert; Abrami, Philip
2009-01-01
Inattention is often associated with reduced response to reading intervention. This study explored attention as a predictor of individual variation in response to a free-access Web-based literacy intervention, ABRACADABRA (http://abralite.concordia.ca) in typical Grade 1 children. A randomized control design was used to contrast two interventions,…
Wu, Zhen-Yu; Tseng, Yi-Ju; Chung, Yufang; Chen, Yee-Chun; Lai, Feipei
2012-08-01
With the rapid development of the Internet, both digitization and electronic orientation are required on various applications in the daily life. For hospital-acquired infection control, a Web-based Hospital-acquired Infection Surveillance System was implemented. Clinical data from different hospitals and systems were collected and analyzed. The hospital-acquired infection screening rules in this system utilized this information to detect different patterns of defined hospital-acquired infection. Moreover, these data were integrated into the user interface of a signal entry point to assist physicians and healthcare providers in making decisions. Based on Service-Oriented Architecture, web-service techniques which were suitable for integrating heterogeneous platforms, protocols, and applications, were used. In summary, this system simplifies the workflow of hospital infection control and improves the healthcare quality. However, it is probable for attackers to intercept the process of data transmission or access to the user interface. To tackle the illegal access and to prevent the information from being stolen during transmission over the insecure Internet, a password-based user authentication scheme is proposed for information integrity.
Dynamic Network Security Control Using Software Defined Networking
2016-03-24
Most importantly I thank my family for understanding, loving , and thriving in the hectic world of military spouse and children. Michael C. Todd v...RBAC poses access to objects as a user to member-of group relationship . This construct results in a set of rules to govern access to objects based...API. Agent Agent.py Event.py Message.py ModSysStatus.py Event Message ModSysStatus Event - Message - ModSysStatus Relationship Figure 12. Agent Design
Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade
NASA Astrophysics Data System (ADS)
Graça, S.; Santos, J.; Manso, M. E.
2004-10-01
The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.
Hutten, Helmut; Stiegmaier, Wolfgang; Rauchegger, Günter
2005-09-01
Modern life style requires new methods for individual lifelong learning, based on access at every time and from every place. This fundamental requirement is provided by the Internet. The Internet technology promises an increasing potential in the future for e-learning or tele-learning. Some special requirements are password-controlled access, applicability of most commercially available PCs and laptops equipped with standard software (Microsoft Internet Explorer 6.0), central evaluation of the students' performance, inclusion of an examination part, provision of a picture gallery and a comprehensive glossary accessible in the learning mode. The KISS-shell has been developed based on the Oracle 10g application server in combination with a relational data base (Oracle 8i) on the server side and a web browser based interface using JavaScript for user control of data input on the client side (Kontrolliertes Intelligentes Selbstgesteuertes Studium, KISS). The first tutorial application has been realized with a chapter about cardiac pacemakers. The weight of that chapter (or module) is about 2 ECTS (i.e. the equivalent of 30 working hours; European Credit Transfer System, ECTS). The internal structure of the chapter is organized in sequential mode. It consists of five main sections. Each of those five sections is subdivided into five subsections of comparable length. Progression from one subsection to the next is possible only after successfully passing through the respective examination. The whole learning programme with the pacemaker chapter has been evaluated by 10 students. The system will be presented together with first experiences including the evaluation results. Until now the program has not been used for training purposes.
Application of a microcomputer-based system to control and monitor bacterial growth.
Titus, J A; Luli, G W; Dekleva, M L; Strohl, W R
1984-02-01
A modular microcomputer-based system was developed to control and monitor various modes of bacterial growth. The control system was composed of an Apple II Plus microcomputer with 64-kilobyte random-access memory; a Cyborg ISAAC model 91A multichannel analog-to-digital and digital-to-analog converter; paired MRR-1 pH, pO(2), and foam control units; and in-house-designed relay, servo control, and turbidimetry systems. To demonstrate the flexibility of the system, we grew bacteria under various computer-controlled and monitored modes of growth, including batch, turbidostat, and chemostat systems. The Apple-ISAAC system was programmed in Labsoft BASIC (extended Applesoft) with an average control program using ca. 6 to 8 kilobytes of memory and up to 30 kilobytes for datum arrays. This modular microcomputer-based control system was easily coupled to laboratory scale fermentors for a variety of fermentations.
Application of a Microcomputer-Based System to Control and Monitor Bacterial Growth
Titus, Jeffrey A.; Luli, Gregory W.; Dekleva, Michael L.; Strohl, William R.
1984-01-01
A modular microcomputer-based system was developed to control and monitor various modes of bacterial growth. The control system was composed of an Apple II Plus microcomputer with 64-kilobyte random-access memory; a Cyborg ISAAC model 91A multichannel analog-to-digital and digital-to-analog converter; paired MRR-1 pH, pO2, and foam control units; and in-house-designed relay, servo control, and turbidimetry systems. To demonstrate the flexibility of the system, we grew bacteria under various computer-controlled and monitored modes of growth, including batch, turbidostat, and chemostat systems. The Apple-ISAAC system was programmed in Labsoft BASIC (extended Applesoft) with an average control program using ca. 6 to 8 kilobytes of memory and up to 30 kilobytes for datum arrays. This modular microcomputer-based control system was easily coupled to laboratory scale fermentors for a variety of fermentations. PMID:16346462
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This manual is a guide to use of the file protection mechanisms available on the Martin Marietta Energy Systems, Inc. KSV VAXes. User identification codes (UICs) and general identifiers are discussed as a basis for understanding UIC-based and access control list (ACL) protection.
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
Pang, Liaojun; Yang, Jie; Jiang, Zhengtao
2014-01-01
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time. In this paper, we survey the basic ABE scheme and its two variants: the key-policy ABE (KP-ABE) scheme and the ciphertext-policy ABE (CP-ABE) scheme. We also pay attention to other researches relating to the ABE schemes, including multiauthority, user/attribute revocation, accountability, and proxy reencryption, with an extensive comparison of their functionality and performance. Finally, possible future works and some conclusions are pointed out. PMID:25101313
Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun
2015-08-10
With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent.
Logical Access Control Mechanisms in Computer Systems.
ERIC Educational Resources Information Center
Hsiao, David K.
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Energy-efficient boarder node medium access control protocol for wireless sensor networks.
Razaque, Abdul; Elleithy, Khaled M
2014-03-12
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks
Razaque, Abdul; Elleithy, Khaled M.
2014-01-01
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737
Healthcare teams over the Internet: programming a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2003-07-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Healthcare teams over the Internet: towards a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2002-01-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
PCASSO: a design for secure communication of personal health information via the internet.
Baker, D B; Masys, D R
1999-05-01
The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.
Web Intervention for Adolescents Affected by Disaster: Population-Based Randomized Controlled Trial.
Ruggiero, Kenneth J; Price, Matthew; Adams, Zachary; Stauffacher, Kirstin; McCauley, Jenna; Danielson, Carla Kmett; Knapp, Rebecca; Hanson, Rochelle F; Davidson, Tatiana M; Amstadter, Ananda B; Carpenter, Matthew J; Saunders, Benjamin E; Kilpatrick, Dean G; Resnick, Heidi S
2015-09-01
To assess the efficacy of Bounce Back Now (BBN), a modular, Web-based intervention for disaster-affected adolescents and their parents. A population-based randomized controlled trial used address-based sampling to enroll 2,000 adolescents and parents from communities affected by tornadoes in Joplin, MO, and several areas in Alabama. Data collection via baseline and follow-up semi-structured telephone interviews was completed between September 2011 and August 2013. All families were invited to access the BBN study Web portal irrespective of mental health status at baseline. Families who accessed the Web portal were assigned randomly to 1 of 3 groups: BBN, which featured modules for adolescents and parents targeting adolescents' mental health symptoms; BBN plus additional modules targeting parents' mental health symptoms; or assessment only. The primary outcomes were adolescent symptoms of posttraumatic stress disorder (PTSD) and depression. Nearly 50% of families accessed the Web portal. Intent-to-treat analyses revealed time × condition interactions for PTSD symptoms (B = -0.24, SE = 0.08, p < .01) and depressive symptoms (B = -0.23, SE = 0.09, p < .01). Post hoc comparisons revealed fewer PTSD and depressive symptoms for adolescents in the experimental versus control conditions at 12-month follow-up (PTSD: B = -0.36, SE = 0.19, p = .06; depressive symptoms: B = -0.42, SE = 0.19, p = 0.03). A time × condition interaction also was found that favored the BBN versus BBN + parent self-help condition for PTSD symptoms (B = 0.30, SE = 0.12, p = .02) but not depressive symptoms (B = 0.12, SE = 0.12, p = .33). Results supported the feasibility and initial efficacy of BBN as a scalable disaster mental health intervention for adolescents. Technology-based solutions have tremendous potential value if found to reduce the mental health burden of disasters. Web-based Intervention for Disaster-Affected Youth and Families; http://clinicaltrials.gov; NCT01606514. Copyright © 2015 American Academy of Child and Adolescent Psychiatry. All rights reserved.
Delgado, Dolores; Alonso-Blanco, Carlos; Fenoll, Carmen; Mena, Montaña
2011-01-01
Background and Aims Current understanding of stomatal development in Arabidopsis thaliana is based on mutations producing aberrant, often lethal phenotypes. The aim was to discover if naturally occurring viable phenotypes would be useful for studying stomatal development in a species that enables further molecular analysis. Methods Natural variation in stomatal abundance of A. thaliana was explored in two collections comprising 62 wild accessions by surveying adaxial epidermal cell-type proportion (stomatal index) and density (stomatal and pavement cell density) traits in cotyledons and first leaves. Organ size variation was studied in a subset of accessions. For all traits, maternal effects derived from different laboratory environments were evaluated. In four selected accessions, distinct stomatal initiation processes were quantitatively analysed. Key Results and Conclusions Substantial genetic variation was found for all six stomatal abundance-related traits, which were weakly or not affected by laboratory maternal environments. Correlation analyses revealed overall relationships among all traits. Within each organ, stomatal density highly correlated with the other traits, suggesting common genetic bases. Each trait correlated between organs, supporting supra-organ control of stomatal abundance. Clustering analyses identified accessions with uncommon phenotypic patterns, suggesting differences among genetic programmes controlling the various traits. Variation was also found in organ size, which negatively correlated with cell densities in both organs and with stomatal index in the cotyledon. Relative proportions of primary and satellite lineages varied among the accessions analysed, indicating that distinct developmental components contribute to natural diversity in stomatal abundance. Accessions with similar stomatal indices showed different lineage class ratios, revealing hidden developmental phenotypes and showing that genetic determinants of primary and satellite lineage initiation combine in several ways. This first systematic, comprehensive natural variation survey for stomatal abundance in A. thaliana reveals cryptic developmental genetic variation, and provides relevant relationships amongst stomatal traits and extreme or uncommon accessions as resources for the genetic dissection of stomatal development. PMID:21447490
Ecologists can enable communities to implement malaria vector control in Africa
Mukabana, W Richard; Kannady, Khadija; Kiama, G Michael; Ijumba, Jasper N; Mathenge, Evan M; Kiche, Ibrahim; Nkwengulila, Gamba; Mboera, Leonard; Mtasiwa, Deo; Yamagata, Yoichi; van Schayk, Ingeborg; Knols, Bart GJ; Lindsay, Steven W; de Castro, Marcia Caldas; Mshinda, Hassan; Tanner, Marcel; Fillinger, Ulrike; Killeen, Gerry F
2006-01-01
Background Integrated vector management (IVM) for malaria control requires ecological skills that are very scarce and rarely applied in Africa today. Partnerships between communities and academic ecologists can address this capacity deficit, modernize the evidence base for such approaches and enable future scale up. Methods Community-based IVM programmes were initiated in two contrasting settings. On Rusinga Island, Western Kenya, community outreach to a marginalized rural community was achieved by University of Nairobi through a community-based organization. In Dar es Salaam, Tanzania, Ilala Municipality established an IVM programme at grassroots level, which was subsequently upgraded and expanded into a pilot scale Urban Malaria Control Programme with support from national academic institutes. Results Both programmes now access relevant expertise, funding and policy makers while the academic partners benefit from direct experience of community-based implementation and operational research opportunities. The communities now access up-to-date malaria-related knowledge and skills for translation into local action. Similarly, the academic partners have acquired better understanding of community needs and how to address them. Conclusion Until sufficient evidence is provided, community-based IVM remains an operational research activity. Researchers can never directly support every community in Africa so community-based IVM strategies and tactics will need to be incorporated into undergraduate teaching programmes to generate sufficient numbers of practitioners for national scale programmes. Academic ecologists at African institutions are uniquely positioned to enable the application of practical environmental and entomological skills for malaria control by communities at grassroots level and should be supported to fulfil this neglected role. PMID:16457724
Panwar, Nishtha; Huang, Philemon; Lee, Jiaying; Keane, Pearse A; Chuan, Tjin Swee; Richhariya, Ashutosh; Teoh, Stephen; Lim, Tock Han; Agrawal, Rupesh
2016-03-01
The introduction of fundus photography has impacted retinal imaging and retinal screening programs significantly. Fundus cameras play a vital role in addressing the cause of preventive blindness. More attention is being turned to developing countries, where infrastructure and access to healthcare are limited. One of the major limitations for tele-ophthalmology is restricted access to the office-based fundus camera. Recent advances in access to telecommunications coupled with introduction of portable cameras and smartphone-based fundus imaging systems have resulted in an exponential surge in available technologies for portable fundus photography. Retinal cameras in the near future would have to cater to these needs by featuring a low-cost, portable design with automated controls and digitalized images with Web-based transfer. In this review, we aim to highlight the advances of fundus photography for retinal screening as well as discuss the advantages, disadvantages, and implications of the various technologies that are currently available.
LAMMR world data base documentation support and demonstrations
NASA Technical Reports Server (NTRS)
Chin, R.; Beaudet, P.
1980-01-01
The primary purpose of the World Surface Map is to provide the LAMMR subsystem with world surface type classifications that are used to set up LAMMR LEVEL II process control. This data base will be accessed solely by the LAMMR subsystem. The SCATT and ALT subsystems will access the data base indirectly through the T sub b (Brightness Temperature) Data Bank, where the surface types were updated from a priori to current classification, and where the surface types were organized on an orbital subtrack basis. The single most important factor in the design of the World Surface Maps is the ease of access to the information while the complexity of generating these maps is of lesser importance because their generation is a one-time, off-line process. The World Surface Map provides storage of information with a resolution of 7 km necessary to set flags concerning the earth's features with a different set of maps for each month of the year.
Panwar, Nishtha; Huang, Philemon; Lee, Jiaying; Keane, Pearse A.; Chuan, Tjin Swee; Richhariya, Ashutosh; Teoh, Stephen; Lim, Tock Han
2016-01-01
Abstract Background: The introduction of fundus photography has impacted retinal imaging and retinal screening programs significantly. Literature Review: Fundus cameras play a vital role in addressing the cause of preventive blindness. More attention is being turned to developing countries, where infrastructure and access to healthcare are limited. One of the major limitations for tele-ophthalmology is restricted access to the office-based fundus camera. Results: Recent advances in access to telecommunications coupled with introduction of portable cameras and smartphone-based fundus imaging systems have resulted in an exponential surge in available technologies for portable fundus photography. Retinal cameras in the near future would have to cater to these needs by featuring a low-cost, portable design with automated controls and digitalized images with Web-based transfer. Conclusions: In this review, we aim to highlight the advances of fundus photography for retinal screening as well as discuss the advantages, disadvantages, and implications of the various technologies that are currently available. PMID:26308281
Goldenberg, Shira M; Shoveller, Jean A; Ostry, Aleck C; Koehoorn, Mieke
2008-01-01
Northeastern British Columbia is undergoing rapid in-migration of young, primarily male workers in response to the "boom" in the oil/gas industries. Accompanying the boom is a rise in Chlamydia rates among youth, which exceed the provincial average by 22%. STI testing reduces the disease burden, contributing to STI prevention. 1) To document youths' perceptions regarding the socio-cultural and structural forces that affect young oil/gas workers' access to STI testing; 2) to gather service providers' perspectives on sexual health service delivery for workers; and 3) to develop recommendations to improve the accessibility of STI testing. We conducted ethnographic fieldwork (8 weeks) in a remote oil/gas community, including in-depth interviews with 25 young people (ages 15-25) and 14 health and social service providers. Participants identified limited opportunities to access testing, geographic isolation, and 'rigger' culture as three key categories inhibiting STI testing among oil/gas Workers. These results suggest the need for place-based approaches to STI control. Innovative outreach strategies are suggested to address oil/gas workers' needs, including a locally tailored STI awareness campaign, condom distribution, expanded clinic hours, and onsite STI testing.
Development and Use of a Virtual NMR Facility
NASA Astrophysics Data System (ADS)
Keating, Kelly A.; Myers, James D.; Pelton, Jeffrey G.; Bair, Raymond A.; Wemmer, David E.; Ellis, Paul D.
2000-03-01
We have developed a "virtual NMR facility" (VNMRF) to enhance access to the NMR spectrometers in Pacific Northwest National Laboratory's Environmental Molecular Sciences Laboratory (EMSL). We use the term virtual facility to describe a real NMR facility made accessible via the Internet. The VNMRF combines secure remote operation of the EMSL's NMR spectrometers over the Internet with real-time videoconferencing, remotely controlled laboratory cameras, real-time computer display sharing, a Web-based electronic laboratory notebook, and other capabilities. Remote VNMRF users can see and converse with EMSL researchers, directly and securely control the EMSL spectrometers, and collaboratively analyze results. A customized Electronic Laboratory Notebook allows interactive Web-based access to group notes, experimental parameters, proposed molecular structures, and other aspects of a research project. This paper describes our experience developing a VNMRF and details the specific capabilities available through the EMSL VNMRF. We show how the VNMRF has evolved during a test project and present an evaluation of its impact in the EMSL and its potential as a model for other scientific facilities. All Collaboratory software used in the VNMRF is freely available from http://www.emsl.pnl.gov:2080/docs/collab.
Microprocessor-controlled, wide-range streak camera
DOE Office of Scientific and Technical Information (OSTI.GOV)
Amy E. Lewis, Craig Hollabaugh
Bechtel Nevada/NSTec recently announced deployment of their fifth generation streak camera. This camera incorporates many advanced features beyond those currently available for streak cameras. The arc-resistant driver includes a trigger lockout mechanism, actively monitors input trigger levels, and incorporates a high-voltage fault interrupter for user safety and tube protection. The camera is completely modular and may deflect over a variable full-sweep time of 15 nanoseconds to 500 microseconds. The camera design is compatible with both large- and small-format commercial tubes from several vendors. The embedded microprocessor offers Ethernet connectivity, and XML [extensible markup language]-based configuration management with non-volatile parameter storagemore » using flash-based storage media. The camera’s user interface is platform-independent (Microsoft Windows, Unix, Linux, Macintosh OSX) and is accessible using an AJAX [asynchronous Javascript and XML]-equipped modem browser, such as Internet Explorer 6, Firefox, or Safari. User interface operation requires no installation of client software or browser plug-in technology. Automation software can also access the camera configuration and control using HTTP [hypertext transfer protocol]. The software architecture supports multiple-simultaneous clients, multiple cameras, and multiple module access with a standard browser. The entire user interface can be customized.« less
Microprocessor-controlled wide-range streak camera
NASA Astrophysics Data System (ADS)
Lewis, Amy E.; Hollabaugh, Craig
2006-08-01
Bechtel Nevada/NSTec recently announced deployment of their fifth generation streak camera. This camera incorporates many advanced features beyond those currently available for streak cameras. The arc-resistant driver includes a trigger lockout mechanism, actively monitors input trigger levels, and incorporates a high-voltage fault interrupter for user safety and tube protection. The camera is completely modular and may deflect over a variable full-sweep time of 15 nanoseconds to 500 microseconds. The camera design is compatible with both large- and small-format commercial tubes from several vendors. The embedded microprocessor offers Ethernet connectivity, and XML [extensible markup language]-based configuration management with non-volatile parameter storage using flash-based storage media. The camera's user interface is platform-independent (Microsoft Windows, Unix, Linux, Macintosh OSX) and is accessible using an AJAX [asynchronous Javascript and XML]-equipped modem browser, such as Internet Explorer 6, Firefox, or Safari. User interface operation requires no installation of client software or browser plug-in technology. Automation software can also access the camera configuration and control using HTTP [hypertext transfer protocol]. The software architecture supports multiple-simultaneous clients, multiple cameras, and multiple module access with a standard browser. The entire user interface can be customized.
SigmaCLIPSE = presentation management + NASA CLI PS + SQL
NASA Technical Reports Server (NTRS)
Weiss, Bernard P., Jr.
1990-01-01
SigmaCLIPSE provides an expert systems and 'intelligent' data base development program for diverse systems integration environments that require support for automated reasoning and expert systems technology, presentation management, and access to 'intelligent' SQL data bases. The SigmaCLIPSE technology and and its integrated ability to access 4th generation application development and decision support tools through a portable SQL interface, comprises a sophisticated software development environment for solving knowledge engineering and expert systems development problems in information intensive commercial environments -- financial services, health care, and distributed process control -- where the expert system must be extendable -- a major architectural advantage of NASA CLIPS. SigmaCLIPSE is a research effort intended to test the viability of merging SQL data bases with expert systems technology.
Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha, Fatemeh; Mu, Yi
2016-05-01
Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Autonomous Information Unit: Why Making Data Smart Can also Make Data Secured?
NASA Technical Reports Server (NTRS)
Chow, Edward T.
2006-01-01
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and self-manage. In our approach, we decompose data into smaller pieces and provide individualized protection. We also provide a policy control mechanism to allow 'smart' access control and context based re-assembly of the decomposed data. By combining smart policy with individually protected data, we are able to provide better protection of sensitive information and achieve more flexible access during emergency conditions. As a result, this new fine-grain protection mechanism can enable us to achieve better solutions for problems such as distributed information protection and identity theft.
Shared Medical Imaging Repositories.
Lebre, Rui; Bastião, Luís; Costa, Carlos
2018-01-01
This article describes the implementation of a solution for the integration of ownership concept and access control over medical imaging resources, making possible the centralization of multiple instances of repositories. The proposed architecture allows the association of permissions to repository resources and delegation of rights to third entities. It includes a programmatic interface for management of proposed services, made available through web services, with the ability to create, read, update and remove all components resulting from the architecture. The resulting work is a role-based access control mechanism that was integrated with Dicoogle Open-Source Project. The solution has several application scenarios like, for instance, collaborative platforms for research and tele-radiology services deployed at Cloud.
James, S A; Wagner, E H; Strogatz, D S; Beresford, S A; Kleinbaum, D G; Williams, C A; Cutchin, L M; Ibrahim, M A
1984-01-01
As the initial step in a five-year project to improve control of high blood pressure in Edgecombe County, North Carolina, a survey was conducted in 1980 to determine the prevalence of hypertension and to identify factors which might constitute barriers to the use of medical care by hypertensives. This report summarizes the findings for the 539 hypertensives identified through the baseline survey. In general, Black hypertensives reported more access problems than Whites. Within race, however, males and females differed very little on selected measures of potential access to medical care. Among women, lower scores on potential access were strongly associated with being untreated, whereas for men, concerns about the safety of anti-hypertensive drug therapy were associated with being unaware. On a summary measure of the actual use of medical care in response to symptoms, both male and female treated hypertensives scored higher than their untreated counterparts. The implications of these and other findings for community-based blood pressure control activities are discussed. PMID:6711721
Printable, scannable biometric templates for secure documents and materials
NASA Astrophysics Data System (ADS)
Cambier, James L.; Musgrave, Clyde
2000-04-01
Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.
Park, Chang-Seop
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797
Verma, Ashutosh Kumar; Dhawan, Sunita Singh; Singh, Seema; Bharati, Kumar Avinash; Jyotsana
2016-01-01
Background: Gymnema sylvestre, a vulnerable plant species, is mentioned in Indian Pharmacopeia as an antidiabetic drug Objective: Study of genetic and chemical diversity and its implications in accessions of G. sylvestre Materials and Methods: Fourteen accessions of G. sylvestre collected from Central India and assessment of their genetic and chemical diversity were carried out using ISSR (inter simple sequence repeat) and HPLC (high performance liquid chromatography) fingerprinting methods Results: Among the screened 40 ISSR primers, 15 were found polymorphic and collectively produced nine unique accession-specific bands. The maximum and minimum numbers of amplicones were noted for ISSR-15 and ISSR-11, respectively. The ISSR -11 and ISSR-13 revealed 100% polymorphism. HPLC chromatograms showed that accessions possess the secondary metabolites of mid-polarity with considerable variability. Unknown peaks with retention time 2.63, 3.41, 23.83, 24.50, and 44.67 were found universal type. Comparative hierarchical clustering analysis based on foresaid fingerprints indicates that both techniques have equal potential to discriminate accessions according to percentage gymnemic acid in their leaf tissue. Second approach was noted more efficiently for separation of accessions according to their agro-climatic/collection site Conclusion: Highly polymorphic ISSRs could be utilized as molecular probes for further selection of high gymnemic acid yielding accessions. Observed accession specific bands may be used as a descriptor for plant accessions protection and converted into sequence tagged sites markers. Identified five universal type peaks could be helpful in identification of G. sylvestre-based various herbal preparations. SUMMARY Nine accession specific unique bandsFive marker peaks for G. sylvestre.Suitability of genetic and chemical fingerprinting Abbreviations used: HPLC: High Performance Liquid Chromatography, ISSR: Inter Simple Sequence Repeats, CTAB: Cetyl Trimethylammonium Bromide, DNTP: Deoxynucleotide Triphosphates PMID:27761067
Verma, Ashutosh Kumar; Dhawan, Sunita Singh; Singh, Seema; Bharati, Kumar Avinash; Jyotsana
2016-07-01
Gymnema sylvestre , a vulnerable plant species, is mentioned in Indian Pharmacopeia as an antidiabetic drug. Study of genetic and chemical diversity and its implications in accessions of G. sylvestre . Fourteen accessions of G. sylvestre collected from Central India and assessment of their genetic and chemical diversity were carried out using ISSR (inter simple sequence repeat) and HPLC (high performance liquid chromatography) fingerprinting methods. Among the screened 40 ISSR primers, 15 were found polymorphic and collectively produced nine unique accession-specific bands. The maximum and minimum numbers of amplicones were noted for ISSR-15 and ISSR-11, respectively. The ISSR -11 and ISSR-13 revealed 100% polymorphism. HPLC chromatograms showed that accessions possess the secondary metabolites of mid-polarity with considerable variability. Unknown peaks with retention time 2.63, 3.41, 23.83, 24.50, and 44.67 were found universal type. Comparative hierarchical clustering analysis based on foresaid fingerprints indicates that both techniques have equal potential to discriminate accessions according to percentage gymnemic acid in their leaf tissue. Second approach was noted more efficiently for separation of accessions according to their agro-climatic/collection site. Highly polymorphic ISSRs could be utilized as molecular probes for further selection of high gymnemic acid yielding accessions. Observed accession specific bands may be used as a descriptor for plant accessions protection and converted into sequence tagged sites markers. Identified five universal type peaks could be helpful in identification of G. sylvestre -based various herbal preparations. Nine accession specific unique bandsFive marker peaks for G. sylvestre .Suitability of genetic and chemical fingerprinting Abbreviations used: HPLC: High Performance Liquid Chromatography, ISSR: Inter Simple Sequence Repeats, CTAB: Cetyl Trimethylammonium Bromide, DNTP: Deoxynucleotide Triphosphates.
Implementation of EPICS based vacuum control system for variable energy cyclotron centre, Kolkata
NASA Astrophysics Data System (ADS)
Roy, Anindya; Bhole, R. B.; Nandy, Partha P.; Yadav, R. C.; Pal, Sarbajit; Roy, Amitava
2015-03-01
The vacuum system of the Room Temperature (K = 130) Cyclotron of Variable Energy Cyclotron Centre is comprised of vacuum systems of main machine and Beam Transport System. The vacuum control system is upgraded to a PLC based Automated system from the initial relay based Manual system. The supervisory control of the vacuum system is implemented in Experimental Physics and Industrial Control System (EPICS). An EPICS embedded ARM based vacuum gauge controller is developed to mitigate the requirement of vendor specific gauge controller for gauges and also for seamless integration of the gauge controllers with the control system. A set of MS-Windows ActiveX components with embedded EPICS Channel Access interface are developed to build operator interfaces with less complex programming and to incorporate typical Windows feature, e.g., user authentication, file handling, better fonts, colors, mouse actions etc. into the operator interfaces. The control parameters, monitoring parameters, and system interlocks of the system are archived in MySQL based EPICS MySQL Archiver developed indigenously. In this paper, we describe the architecture, the implementation details, and the performance of the system.
Implementation of EPICS based vacuum control system for variable energy cyclotron centre, Kolkata.
Roy, Anindya; Bhole, R B; Nandy, Partha P; Yadav, R C; Pal, Sarbajit; Roy, Amitava
2015-03-01
The vacuum system of the Room Temperature (K = 130) Cyclotron of Variable Energy Cyclotron Centre is comprised of vacuum systems of main machine and Beam Transport System. The vacuum control system is upgraded to a PLC based Automated system from the initial relay based Manual system. The supervisory control of the vacuum system is implemented in Experimental Physics and Industrial Control System (EPICS). An EPICS embedded ARM based vacuum gauge controller is developed to mitigate the requirement of vendor specific gauge controller for gauges and also for seamless integration of the gauge controllers with the control system. A set of MS-Windows ActiveX components with embedded EPICS Channel Access interface are developed to build operator interfaces with less complex programming and to incorporate typical Windows feature, e.g., user authentication, file handling, better fonts, colors, mouse actions etc. into the operator interfaces. The control parameters, monitoring parameters, and system interlocks of the system are archived in MySQL based EPICS MySQL Archiver developed indigenously. In this paper, we describe the architecture, the implementation details, and the performance of the system.
Yaya, Sanni; Okonofua, Friday; Ntoimo, Lorretta; Kadio, Bernard; Deuboue, Rodrigue; Imongan, Wilson; Balami, Wapada
2018-01-01
Nigeria presently has the second highest absolute number of maternal deaths and perinatal deaths (stillbirth and neonatal deaths) in the world. The country accounts for up to 14% of global maternal deaths and is second only to India in the number of women who die during childbirth. Although all parts of the country are worsened by these staggering statistics, several lines of evidence show that most maternal, and perinatal deaths occur in the north-east and north-west geo-political zones where women have limited access to evidence-based maternal and neonatal health services. The proposed project intends to identify the demand and supply factors that prevent women from using PHCs for maternal and early new-born care in Nigeria, and to test innovative and community relevant interventions for improving women's access to PHC services, and thus, ultimately, to prevent maternal and perinatal deaths. An open-labelled, randomized controlled trial will is carried out in two local government areas selected based on three criteria (i) maternal mortality rates (ii) PHC utilization rates and (iii) and geographic localization. The study will be conducted over 54-months in six communities, with PHCs in six communities of similar status serving as control sites. Surveys about quality of care and maternal health services utilization will be carried out at baseline, at midterm and at end of the project to test the effectiveness of the intervention, alongside conventional epidemiological measures of maternal and perinatal mortality. Ethical approval for the study has been granted (reference no. NHREC/01/01/2007). The findings will be published in compliance with reporting guidelines for randomized controlled trials. The current Federal Government in Nigeria has identified PHC as its main strategy for increasing access to health in Nigeria. However, despite numerous efforts, there are persisting concerns that there is currently no scientific evidence on which to base the improvement of PHCs. The results of this study will identify barriers in the use of PHCs and will provide scientific evidence for effective and innovative interventions for improving PHCs that can be rolled out throughout the country. Clinical Trials.gov NCT02643953.
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
Quantum-classical interface based on single flux quantum digital logic
NASA Astrophysics Data System (ADS)
McDermott, R.; Vavilov, M. G.; Plourde, B. L. T.; Wilhelm, F. K.; Liebermann, P. J.; Mukhanov, O. A.; Ohki, T. A.
2018-04-01
We describe an approach to the integrated control and measurement of a large-scale superconducting multiqubit array comprising up to 108 physical qubits using a proximal coprocessor based on the Single Flux Quantum (SFQ) digital logic family. Coherent control is realized by irradiating the qubits directly with classical bitstreams derived from optimal control theory. Qubit measurement is performed by a Josephson photon counter, which provides access to the classical result of projective quantum measurement at the millikelvin stage. We analyze the power budget and physical footprint of the SFQ coprocessor and discuss challenges and opportunities associated with this approach.
The EPICS-based remote control system for muon beam line devices at J-PARC MUSE
NASA Astrophysics Data System (ADS)
Ito, T. U.; Nakahara, K.; Kawase, M.; Fujimori, H.; Kobayashi, Y.; Higemoto, W.; Miyake, Y.
2010-04-01
The remote control system for muon beam line devices of J-PARC MUSE has been developed with the Experimental Physics and Industrial Control System (EPICS). The EPICS input/output controller was installed in standard Linux PCs for slow control of the devices. Power supplies for 21 magnetic elements and four slit controllers for the decay-surface muon beam line in the Materials and Life Science Experimental Facility are now accessible via Ethernet from a graphical user interface which has been composed using the Motif Editor and Display Manger.
Authomatization of Digital Collection Access Using Mobile and Wireless Data Terminals
NASA Astrophysics Data System (ADS)
Leontiev, I. V.
Information technologies become vital due to information processing needs, database access, data analysis and decision support. Currently, a lot of scientific projects are oriented on database integration of heterogeneous systems. The problem of on-line and rapid access to large integrated systems of digital collections is also very important. Usually users move between different locations, either at work or at home. In most cases users need an efficient and remote access to information, stored in integrated data collections. Desktop computers are unable to fulfill the needs, so mobile and wireless devices become helpful. Handhelds and data terminals are nessessary in medical assistance (they store detailed information about each patient, and helpful for nurses), immediate access to data collections is used in a Highway patrol services (databanks of cars, owners, driver licences). Using mobile access, warehouse operations can be validated. Library and museum items cyclecounting will speed up using online barcode-scanning and central database access. That's why mobile devices - cell phones, PDA, handheld computers with wireless access, WindowsCE and PalmOS terminals become popular. Generally, mobile devices have a relatively slow processor, and limited display capabilities, but they are effective for storing and displaying textual data, recognize user hand-writing with stylus, support GUI. Users can perform operations on handheld terminal, and exchange data with the main system (using immediate radio access, or offline access during syncronization process) for update. In our report, we give an approach for mobile access to data collections, which raises an efficiency of data processing in a book library, helps to control available books, books in stock, validate service charges, eliminate staff mistakes, generate requests for book delivery. Our system uses mobile devices Symbol RF (with radio-channel access), and data terminals Symbol Palm Terminal for batch-processing and synchronization with remote library databases. We discuss the use of PalmOS-compatible devices, and WindowsCE terminals. Our software system is based on modular, scalable three-tier architecture. Additional functionality can be easily customized. Scalability is also supplied by Internet / Intranet technologies, and radio-access points. The base module of the system supports generic warehouse operations: cyclecounting with handheld barcode-scanners, efficient items delivery and issue, item movement, reserving, report generating on finished and in-process operations. Movements are optimized using worker's current location, operations are sorted in a priority order and transmitted to mobile and wireless worker's terminals. Mobile terminals improve of tasks processing control, eliminate staff mistakes, display actual information about main processes, provide data for online-reports, and significantly raise the efficiency of data exchange.
NASA Astrophysics Data System (ADS)
Schaller, S. C.; Bjorklund, E. A.; Carr, G. P.; Faucett, J. A.; Oothoudt, M. A.
1997-05-01
The Los Alamos Neutron Scattering Center (LANSCE) Proton Storage Ring (PSR) control system upgrade was completed in 1996. In previous work, much of a PDP-11-based control system was replaced with Experimental Physics and Industrial Control System (EPICS) controls. Several parts of the old control system which used a VAX for operator displays and direct access to a CAMAC serial highway still remained. The old system was preserved as a "fallback" if the new EPICS-based system had problems. The control system upgrade completion included conversion of several application programs to EPICS-based operator interfaces, moving some data acquisition hardware to EPICS Input-Output Controllers (IOCs), and the implementation of new gateway software to complete the overall control system interoperability. Many operator interface (OPI) screens, written by LANSCE operators, have been incorporated in the new system. The old PSR control system hardware was removed. The robustness and reliability of the new controls obviated the need for a fallback capability.
Method and apparatus for automatic control of a humanoid robot
NASA Technical Reports Server (NTRS)
Abdallah, Muhammad E (Inventor); Platt, Robert (Inventor); Wampler, II, Charles W. (Inventor); Sanders, Adam M (Inventor); Reiland, Matthew J (Inventor)
2013-01-01
A robotic system includes a humanoid robot having a plurality of joints adapted for force control with respect to an object acted upon by the robot, a graphical user interface (GUI) for receiving an input signal from a user, and a controller. The GUI provides the user with intuitive programming access to the controller. The controller controls the joints using an impedance-based control framework, which provides object level, end-effector level, and/or joint space-level control of the robot in response to the input signal. A method for controlling the robotic system includes receiving the input signal via the GUI, e.g., a desired force, and then processing the input signal using a host machine to control the joints via an impedance-based control framework. The framework provides object level, end-effector level, and/or joint space-level control of the robot, and allows for functional-based GUI to simplify implementation of a myriad of operating modes.
Inter-Domain Roaming Mechanism Transparent to Mobile Nodes among PMIPv6 Networks
NASA Astrophysics Data System (ADS)
Park, Soochang; Lee, Euisin; Jin, Min-Sook; Kim, Sang-Ha
In Proxy Mobile IPv6 (PMIPv6), when a Mobile Node (MN) enters a PMIPv6 domain and attaches to an access link, the router on the access link detects attachment of the MN by the link-layer access. All elements of PMIPv6 including the router then provide network-based mobility management service for the MN. If the MN moves to another router in this PMIPv6 domain, the new router emulates attachment to the previous router by providing same network prefix to the MN. In other words, PMIPv6 provides rapid mobility management based on layer-2 attachment and transparent mobility support to the MN by emulating layer-3 attachment with respect to intra-domain roaming. However, when the MN moves to other PMIPv6 domains, although the domains also provide the network-based mobility management service, the MN should exploit the host-based mobility management protocol, i.e. Mobile IPv6 (MIPv6), for the inter-domain roaming. Hence, this letter proposes the rapid and transparent inter-domain roaming mechanism controlled by the networks adopting PMIPv6.
Privacy-preserving photo sharing based on a public key infrastructure
NASA Astrophysics Data System (ADS)
Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj
2015-09-01
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.
76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...
Server-Controlled Identity-Based Authenticated Key Exchange
NASA Astrophysics Data System (ADS)
Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun
We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.
Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L
2018-03-01
While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.
2011-06-01
event simulation is used to model three alternatives to the ECP system. The baseline system which contains two manned kiosks, a fully automated system...experience is traffic delays in the morning for government employees accessing the bases. If one or two lanes were dedicated to 3 completely or even semi...purpose of clarity, the figure below displays only the two lowest levels of functions. This final functional decomposition identifies the sub functions
Augusto, Lia Giraldo da Silva; Gurgel, Idê Gomes Dantas; Câmara Neto, Henrique Fernandes; de Melo, Carlos Henrique; Costa, André Monteiro
2012-06-01
The scope of this article is to analyze the challenges involved in ensuring access to water for human consumption taking the international and national context into consideration. Based on the UN declaration that access to safe and clean drinking water is a fundamental human right, vulnerabilities are identified that can consist in restrictions to access to adequate supplies. The distribution of water and the population across the planet, pollution, inadequate policies and management lead to environmental injustice. The iniquity of access to water constitutes the contemporary water crisis. From the 1980s onwards, the transnational water market emerged for private control that occurs at three main levels: surface and underground water sources; bottled water; and public water supply services. The conflicts of the multiple uses of water resources, the market and environmental problems have contributed to rendering the health of the population and ecosystems vulnerable. Adequate public policies are essential to ensure the basic human right to access to safe and clean drinking water.
31 CFR 561.203 - NDAA-based sanctions on certain foreign financial institutions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... List (the “SDN List”) on the Office of Foreign Assets Control's Web site with the tag “[NDAA]” at the... which their property and interests in property are blocked. The SDN List is accessible through the following page on the Office of Foreign Assets Control's Web site: www.treasury.gov/sdn. Note 2 to paragraph...
31 CFR 561.203 - NDAA-based sanctions on certain foreign financial institutions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... List (the “SDN List”) on the Office of Foreign Assets Control's Web site with the tag “[NDAA]” at the... which their property and interests in property are blocked. The SDN List is accessible through the following page on the Office of Foreign Assets Control's Web site: www.treasury.gov/sdn. Note 2 to paragraph...
USDA-ARS?s Scientific Manuscript database
A growing interest in the biological control of locusts and grasshoppers (Acrididae) has led to the development of biopesticides based on naturally occurring pathogens which offers an environmentally safe alternative to chemical pesticides. However, the fungal strains which are being sought for biop...
Wireless Augmented Reality Prototype (WARP)
NASA Technical Reports Server (NTRS)
Devereaux, A. S.
1999-01-01
Initiated in January, 1997, under NASA's Office of Life and Microgravity Sciences and Applications, the Wireless Augmented Reality Prototype (WARP) is a means to leverage recent advances in communications, displays, imaging sensors, biosensors, voice recognition and microelectronics to develop a hands-free, tetherless system capable of real-time personal display and control of computer system resources. Using WARP, an astronaut may efficiently operate and monitor any computer-controllable activity inside or outside the vehicle or station. The WARP concept is a lightweight, unobtrusive heads-up display with a wireless wearable control unit. Connectivity to the external system is achieved through a high-rate radio link from the WARP personal unit to a base station unit installed into any system PC. The radio link has been specially engineered to operate within the high- interference, high-multipath environment of a space shuttle or space station module. Through this virtual terminal, the astronaut will be able to view and manipulate imagery, text or video, using voice commands to control the terminal operations. WARP's hands-free access to computer-based instruction texts, diagrams and checklists replaces juggling manuals and clipboards, and tetherless computer system access allows free motion throughout a cabin while monitoring and operating equipment.
Problems in Bibliographic Access to Non-Print Materials. Project Media Base: Final Report.
ERIC Educational Resources Information Center
Brong, Gerald; And Others
Project Media Base reports its conclusions and recommendations for the establishment of bibliographic control of audiovisual resources as a part of an overall objective to plan, develop, and implement a nationwide network of library and information services. The purpose of this project was to test the hypothesis that the essential elements of a…
Comparison of two MAC protocols based on LEO satellite networks
NASA Astrophysics Data System (ADS)
Guan, Mingxiang; Wang, Ruichun
2009-12-01
With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Dischinger, Portia
2005-01-01
This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.
de Ruijter, D; Smit, E S; de Vries, H; Hoving, C
2016-05-01
Dutch practice nurses sub-optimally adhere to evidence-based smoking cessation guidelines. Web-based computer-tailoring could be effective in improving their guideline adherence. Therefore, this paper aims to describe the development of a web-based computer-tailored program and the design of a randomized controlled trial testing its (cost-)effectiveness. Theoretically grounded in the I-Change Model and Self-Determination Theory, and based on the results of a qualitative needs assessment among practice nurses, a web-based computer-tailored program was developed including three modules with tailored advice, an online forum, modules with up-to-date information about smoking cessation, Frequently Asked Questions (FAQs) and project information, and a counseling checklist. The program's effects are assessed by comparing an intervention group (access to all modules) with a control group (access to FAQs, project information and counseling checklist only). Smoking cessation guideline adherence and behavioral predictors (i.e. intention, knowledge, attitude, self-efficacy, social influence, action and coping planning) are measured at baseline and at 6- and 12-month follow-up. Additionally, the program's indirect effects on smokers' quit rates and the number of quit attempts are assessed after 6 and 12months. This paper describes the development of a web-based computer-tailored adherence support program for practice nurses and the study design of a randomized controlled trial testing its (cost-)effectiveness. This program potentially contributes to improving the quality of smoking cessation care in Dutch general practices. If proven effective, the program could be adapted for use by other healthcare professionals, increasing the public health benefits of improved smoking cessation counseling for smokers. Copyright © 2016 Elsevier Inc. All rights reserved.
Zheng, Mengyi; McClay, Carrie-Anne; Wilson, Sarah; Williams, Christopher
2015-01-01
Low mood is a common mental health problem affecting up to 121 million people worldwide and is common in students, particularly international students. Cognitive behavioural therapy (CBT) is known to be effective as a treatment for low mood and anxiety when delivered one to one by an expert practitioner, however this can be expensive and many services have waiting lists and delayed access. A range of additional ways of increasing access to services includes the offer of online courses such as computerised CBT as a possible additional pathway for care. This project aims to test the feasibility of a pilot randomised controlled trial of an online CBT-based life skills course with Chinese-speaking international students experiencing low mood and anxiety. Chinese-speaking international students with symptoms of low mood and/or anxiety will be recruited from the University of Glasgow, Scotland. Participants will be remotely randomised to receive either immediate access (IA) or delayed access (DA) to a guided/supported online CBT-based life skills package, the "Living Life" package (Chinese version). Participants will be randomly assigned to IA or DA to the intervention. The primary end point will be at 3 months when the delayed group will be offered the intervention. Levels of depression, anxiety, social functioning and satisfaction will be assessed. This pilot study will test the trial design, ability to recruit, gather completed questionnaires, test drop-out rates and investigate completion and acceptability of the package. The study aims to reduce uncertainties about the delivery of a future substantive study and will also inform a sample size calculation for that subsequent substantive randomised controlled trial (RCT) which will be carried out to determine the effectiveness of the online package in improving low mood and anxiety in the Chinese-speaking student population. Current Controlled Trials ISRCTN30816908.
NASA Astrophysics Data System (ADS)
Stevens, T.; Olsen, L. M.; Ritz, S.; Morahan, M.; Aleman, A.; Cepero, L.; Gokey, C.; Holland, M.; Cordova, R.; Areu, S.; Cherry, T.; Tran-Ho, H.
2012-12-01
Discovering Earth science data can be complex if the catalog holding the data lacks structure. Controlled keyword vocabularies within metadata catalogues can improve data discovery. NASA's Global Change Master Directory's (GCMD) Keyword Management System (KMS) is a recently released a RESTful web service for managing and providing access to controlled keywords (science keywords, service keywords, platforms, instruments, providers, locations, projects, data resolution, etc.). The KMS introduces a completely new paradigm for the use and management of the keywords and allows access to these keywords as SKOS Concepts (RDF), OWL, standard XML, and CSV. A universally unique identifier (UUID) is automatically assigned to each keyword, which uniquely identifies each concept and its associated information. A component of the KMS is the keyword manager, an internal tool that allows GCMD science coordinators to manage concepts. This includes adding, modifying, and deleting broader, narrower, or related concepts and associated definitions. The controlled keyword vocabulary represents over 20 years of effort and collaboration with the Earth science community. The maintenance, stability, and ongoing vigilance in maintaining mutually exclusive and parallel keyword lists is important for a "normalized" search and discovery, and provides a unique advantage for the science community. Modifications and additions are made based on community suggestions and internal review. To help maintain keyword integrity, science keyword rules and procedures for modification of keywords were developed. This poster will highlight the use of the KMS as a beneficial service for the stewardship and access of the GCMD keywords. Users will learn how to access the KMS and utilize the keywords. Best practices for managing an extensive keyword hierarchy will also be discussed. Participants will learn the process for making keyword suggestions, which subsequently help in building a controlled keyword vocabulary to improve earth science data discovery and access.
Juraimi, Abdul Shukor; Rafii, M. Y.; Abdul Hamid, Azizah
2015-01-01
13 selected purslane accessions were subjected to five salinity levels 0, 8, 16, 24, and 32 dS m−1. Salinity effect was evaluated on the basis of biomass yield reduction, physiological attributes, and stem-root anatomical changes. Aggravated salinity stress caused significant (P < 0.05) reduction in all measured parameters and the highest salinity showed more detrimental effect compared to control as well as lower salinity levels. The fresh and dry matter production was found to increase in Ac1, Ac9, and Ac13 from lower to higher salinity levels but others were badly affected. Considering salinity effect on purslane physiology, increase in chlorophyll content was seen in Ac2, Ac4, Ac6, and Ac8 at 16 dS m−1 salinity, whereas Ac4, Ac9, and Ac12 showed increased photosynthesis at the same salinity levels compared to control. Anatomically, stem cortical tissues of Ac5, Ac9, and Ac12 were unaffected at control and 8 dS m−1 salinity but root cortical tissues did not show any significant damage except a bit enlargement in Ac12 and Ac13. A dendrogram was constructed by UPGMA based on biomass yield and physiological traits where all 13 accessions were grouped into 5 clusters proving greater diversity among them. The 3-dimensional principal component analysis (PCA) has also confirmed the output of grouping from cluster analysis. Overall, salinity stressed among all 13 purslane accessions considering biomass production, physiological growth, and anatomical development Ac9 was the best salt-tolerant purslane accession and Ac13 was the most affected accession. PMID:25802833
External access to ALICE controls conditions data
NASA Astrophysics Data System (ADS)
Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.
2014-06-01
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
Evaluation of modified work zone traffic control devices at business accesses
DOT National Transportation Integrated Search
2001-01-01
Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...
NASA Astrophysics Data System (ADS)
Chen, Ruey-Shun; Tsai, Yung-Shun; Tu, Arthur
In this study we propose a manufacturing control framework based on radio-frequency identification (RFID) technology and a distributed information system to construct a mass-customization production process in a loosely coupled shop-floor control environment. On the basis of this framework, we developed RFID middleware and an integrated information system for tracking and controlling the manufacturing process flow. A bicycle manufacturer was used to demonstrate the prototype system. The findings of this study were that the proposed framework can improve the visibility and traceability of the manufacturing process as well as enhance process quality control and real-time production pedigree access. Using this framework, an enterprise can easily integrate an RFID-based system into its manufacturing environment to facilitate mass customization and a just-in-time production model.
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2013 CFR
2013-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2014 CFR
2014-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2012 CFR
2012-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2011 CFR
2011-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel
2016-12-01
Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.
HTTP-based remote operational options for the Vacuum Tower Telescope, Tenerife
NASA Astrophysics Data System (ADS)
Staiger, J.
2012-09-01
We are currently developing network based tools for the Vacuum Tower Telescope (VTT), Tenerife which will allow to operate the telescope together with the newly developed 2D-spectrometer HELLRIDE under remote control conditions. The computational configuration can be viewed as a distributed system linking hardware components of various functionality from different locations. We have developed a communication protocol which is basically an extension of the HTTP standard. It will serve as a carrier for command- and data-transfers. The server-client software is based on Berkley-Unix sockets in a C++ programming environment. A customized CMS will allow to create browser accessible information on-the-fly. Java-based applet pages have been tested as optional user access GUI's. An access tool has been implemented to download near-realtime, web-based target information from NASA/SDO. Latency tests have been carried out at the VTT and the Swedish STT at La Palma for concept verification. Short response times indicate that under favorable network conditions remote interactive telescope handling may be possible. The scientific focus of possible future remote operations will be set on the helioseismology of the solar atmosphere, the monitoring of flares and the footpoint analysis of coronal loops and chromospheric events.
A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks
Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad
2017-01-01
Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495
Failure detection and identification for a reconfigurable flight control system
NASA Technical Reports Server (NTRS)
Dallery, Francois
1987-01-01
Failure detection and identification logic for a fault-tolerant longitudinal control system were investigated. Aircraft dynamics were based upon the cruise condition for a hypothetical transonic business jet transport configuration. The fault-tolerant control system consists of conventional control and estimation plus a new outer loop containing failure detection, identification, and reconfiguration (FDIR) logic. It is assumed that the additional logic has access to all measurements, as well as to the outputs of the control and estimation logic. The pilot may also command the FDIR logic to perform special tests.
Infection control in cystic fibrosis: barriers to implementation and ideas for improvement.
Saiman, Lisa; Garber, Elizabeth
2009-11-01
This review will focus on recent research documenting baseline adherence to infection control recommendations and barriers to their implementation as experienced by multidisciplinary cystic fibrosis (CF) care providers. In addition, controversies regarding optimal infection control will be discussed. Finally, suggestions to improve infection control in CF will be proposed. Compliance with recent guidelines was assessed for clinical microbiology laboratories and for infection control policies at CF care centers in the United States. Unlike earlier reports, the vast majority of laboratories used selective media for Burkholderia cepacia complex and identified all species of nonlactose fermenting Gram-negative bacilli. Fewer used selective media for Staphylococcus aureus or used agar-based susceptibility testing assays for Pseudomonas aeruginosa. Only 103 (65%) of 158 CF care centers provided written infection control policies for review and these were more likely to address inpatient than outpatient settings. Surveys of healthcare professionals showed that access to a copy of the CF infection control guidelines reduced barriers to adherence to selected infection control practices. These data suggest that access to national infection control guidelines and written local policies are critically important to improving infection control for CF.
Managing EEE part standardisation and procurement
NASA Astrophysics Data System (ADS)
Serieys, C.; Bensoussan, A.; Petitmangin, A.; Rigaud, M.; Barbaresco, P.; Lyan, C.
2002-12-01
This paper presents the development activities in space components selection and procurement dealing with a new data base tool implemented at Alcatel Space using TransForm softwaa re configurator developed by Techform S.A. Based on TransForm, Access Ingenierie has devv eloped a software product named OLG@DOS which facilitate the part nomenclatures analyses for new equipment design and manufacturing in term of ACCESS data base implementation. Hi-Rel EEE part type technical, production and quality information are collected and compiled usingproduction data base issued from production tools implemented for equipment definition, description and production based on Manufacturing Resource Planning (MRP II Control Open) and Parametric Design Manager (PDM Work Manager). The analysis of any new equipment nomenclature may be conducted through this means for standardisation purpose, cost containment program and management procurement activities as well as preparation of Component reviews as Part Approval Document and Declared Part List validation.
Web Intervention for Adolescents Affected by Disaster: Population-Based Randomized Controlled Trial
Ruggiero, Kenneth J.; Price, Matthew; Adams, Zachary; Stauffacher, Kirstin; McCauley, Jenna; Danielson, Carla Kmett; Knapp, Rebecca; Hanson, Rochelle F.; Davidson, Tatiana M.; Amstadter, Ananda B.; Carpenter, Matthew J.; Saunders, Benjamin E.; Kilpatrick, Dean G.; Resnick, Heidi S.
2015-01-01
Objective To assess the efficacy of Bounce Back Now (BBN), a modular, web-based intervention for disaster-affected adolescents and their parents. Method A population-based randomized controlled trial used address-based sampling to enroll 2,000 adolescents and parents from communities affected by tornadoes in Joplin, MO, and Alabama. Data collection via baseline and follow-up semi-structured telephone interviews was completed between September 2011 and August 2013. All families were invited to access the BBN study web portal irrespective of mental health status at baseline. Families who accessed the web portal were assigned randomly to 3 groups: (1) BBN, which featured modules for adolescents and parents targeting adolescents’ mental health symptoms; (2) BBN plus additional modules targeting parents’ mental health symptoms; or (3) assessment only. The primary outcomes were adolescent symptoms of posttraumatic stress disorder (PTSD) and depression. Results Nearly 50% of families accessed the web portal. Intent-to-treat analyses revealed time × condition interactions for PTSD symptoms (B=−0.24, SE=0.08, p<.01) and depressive symptoms (B=−0.23, SE=0.09, p<.01). Post-hoc comparisons revealed fewer PTSD and depressive symptoms for adolescents in the experimental vs. control conditions at 12-month follow-up (PTSD: B=−0.36, SE=0.19, p=.06; depressive symptoms: B=−0.42, SE=0.19, p=0.03). A time × condition interaction also was found favoring the BBN vs. BBN + parent self-help condition for PTSD symptoms (B=0.30, SE=0.12, p=.02), but not depressive symptoms (B=0.12, SE=0.12, p=.33). Conclusion Results supported the feasibility and initial efficacy of BBN as a scalable disaster mental health intervention for adolescents. Technology-based solutions have tremendous potential value if found to reduce the mental health burden of disasters. PMID:26299292
Doing Your Science While You're in Orbit
NASA Astrophysics Data System (ADS)
Green, Mark L.; Miller, Stephen D.; Vazhkudai, Sudharshan S.; Trater, James R.
2010-11-01
Large-scale neutron facilities such as the Spallation Neutron Source (SNS) located at Oak Ridge National Laboratory need easy-to-use access to Department of Energy Leadership Computing Facilities and experiment repository data. The Orbiter thick- and thin-client and its supporting Service Oriented Architecture (SOA) based services (available at https://orbiter.sns.gov) consist of standards-based components that are reusable and extensible for accessing high performance computing, data and computational grid infrastructure, and cluster-based resources easily from a user configurable interface. The primary Orbiter system goals consist of (1) developing infrastructure for the creation and automation of virtual instrumentation experiment optimization, (2) developing user interfaces for thin- and thick-client access, (3) provide a prototype incorporating major instrument simulation packages, and (4) facilitate neutron science community access and collaboration. The secure Orbiter SOA authentication and authorization is achieved through the developed Virtual File System (VFS) services, which use Role-Based Access Control (RBAC) for data repository file access, thin-and thick-client functionality and application access, and computational job workflow management. The VFS Relational Database Management System (RDMS) consists of approximately 45 database tables describing 498 user accounts with 495 groups over 432,000 directories with 904,077 repository files. Over 59 million NeXus file metadata records are associated to the 12,800 unique NeXus file field/class names generated from the 52,824 repository NeXus files. Services that enable (a) summary dashboards of data repository status with Quality of Service (QoS) metrics, (b) data repository NeXus file field/class name full text search capabilities within a Google like interface, (c) fully functional RBAC browser for the read-only data repository and shared areas, (d) user/group defined and shared metadata for data repository files, (e) user, group, repository, and web 2.0 based global positioning with additional service capabilities are currently available. The SNS based Orbiter SOA integration progress with the Distributed Data Analysis for Neutron Scattering Experiments (DANSE) software development project is summarized with an emphasis on DANSE Central Services and the Virtual Neutron Facility (VNF). Additionally, the DANSE utilization of the Orbiter SOA authentication, authorization, and data transfer services best practice implementations are presented.
What students learn when studying physics practice exam problems
NASA Astrophysics Data System (ADS)
Fakcharoenphol, Witat; Potter, Eric; Stelzer, Timothy
2011-06-01
We developed a web-based tool to provide students with access to old exam problems and solutions. By controlling the order in which students saw the problems, as well as their access to solutions, we obtained data about student learning by studying old exam problems. Our data suggest that in general students learn from doing old exam problems, and that having access to the problem solutions increases their learning. However, the data also suggest the depth of learning may be relatively shallow. In addition, the data show that doing old exam problems provides important formative assessment about the student’s overall preparedness for the exam and their particular areas of strength and weakness.
Skynet Junior Scholars- Sharing the Universe with Blind/Low Vision Youth
NASA Astrophysics Data System (ADS)
Hoette, Vivian L.; Kron, R. G.; Meredith, K.; Heatherly, S.; Williamson, K.; Gurton, S.; Reichart, D.; Haislip, J.
2014-01-01
Skynet Junior Scholars, a new project funded by the National Science Foundation, aims to engage middle school youth including youth with visual and hearing impairments, in investigating the universe with the same tools professionals use. Project deliverables include: 1) Online access to optical and radio telescopes, data analysis tools, and professional astronomers, 2) An age-appropriate web-based interface for controlling remote telescopes, 3) Inquiry-based standards-aligned instructional modules. From an accessibility perspective, the goal of the Skynet Junior Scholars project is to facilitate independent access to the project deliverables to the greatest extent possible given existing accessibility technologies. In this paper we describe our experience in field-testing SJS activities with 29 blind/low vision youth attending a Lion’s Club summer camp. From our observations and preliminary results from pre/post surveys and interviews, we learned that rather than creating a new interest in STEM for these youth, we were instead helping the students satisfy an interest that they already had in these subjects, with our techniques allowing a first direct experience in observational astronomy.
Just-In-Time Altimetry: International Collaboration in Provision of Altimetry Datasets
NASA Astrophysics Data System (ADS)
Snaith, H. M.; Scharroo, R.; Naeije, M.
2006-07-01
Environmen tal resear ch requir es access to quality controlled, calibrated data. Satellite altimeter data ar e used in a range of environmental research , including oceanography, ice and land surface studies. Users who are not altimeter specialists may not be aw are of, or have access to, the latest updates and most appropriate corrections to use for their application . We propose a G RID based methodology to give all users access to the b est possib le altimeter data product at the time of the r equest, tailor mad e for th eir sp ecific application . A data por tal system wou ld be based on a "Network of Trust" consisting of the data providers and a certificating authority. D ata could be served through a fully interactive web 'front- end' or directly from with in analysis programmes. This system would build on the experiences gain ed in combin ing two existing Altimeter Data serv ices (GA PS and RAD S) to produce a coh erent data service with alternativ e w eb interfaces and conf igurable user s access.
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
Barbarich-Marsteller, Nicole C; Fornal, Casimir A; Takase, Luiz F; Bocarsly, Miriam E; Arner, Candice; Walsh, B Timothy; Hoebel, Bartley G; Jacobs, Barry L
2013-01-01
Activity-based anorexia (ABA) is an animal model of anorexia nervosa that mimics core features of the clinical psychiatric disorder, including severe food restriction, weight loss, and hyperactivity. The ABA model is currently being used to study starvation-induced changes in the brain. Here, we examined hippocampal cell proliferation in animals with ABA (or the appropriate control conditions). Adolescent female Sprague-Dawley rats were assigned to 4 groups: control (24h/day food access), food-restricted (1h/day food access), exercise (24h/day food and wheel access), and ABA (1h/day food access, 24h/day wheel access). After 3 days of ABA, 5-bromo-2'-deoxyuridine (BrdU; 200mg/kg, i.p.) was injected and the rats were perfused 2h later. Brains were removed and subsequently processed for BrdU and Ki67 immunohistochemistry. The acute induction of ABA reduced cell proliferation in the dentate gyrus. This effect was significant in the hilus region of the dentate gyrus, but not in the subgranular zone, where adult neurogenesis occurs. Marked decreases in cell proliferation were also observed in the surrounding dorsal hippocampus and in the corpus callosum. These results indicate a primary effect on gliogenesis rather than neurogenesis following 3 days of ABA. For each brain region studied (except SGZ), there was a strong positive correlation between the level of cell proliferation and body weight/food intake. Future studies should examine whether these changes are maintained following long-term weight restoration and whether alterations in neurogenesis occur following longer exposures to ABA. Copyright © 2012 Elsevier B.V. All rights reserved.
Web-based Traffic Noise Control Support System for Sustainable Transportation
NASA Astrophysics Data System (ADS)
Fan, Lisa; Dai, Liming; Li, Anson
Traffic noise is considered as one of the major pollutions that will affect our communities in the future. This paper presents a framework of web-based traffic noise control support system (WTNCSS) for a sustainable transportation. WTNCSS is to provide the decision makers, engineers and publics a platform to efficiently access the information, and effectively making decisions related to traffic control. The system is based on a Service Oriented Architecture (SOA) which takes the advantages of the convenience of World Wide Web system with the data format of XML. The whole system is divided into different modules such as the prediction module, ontology-based expert module and dynamic online survey module. Each module of the system provides a distinct information service to the decision support center through the HTTP protocol.
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
NASA Astrophysics Data System (ADS)
Loveless, R.; Erhard, P.; Ficenec, J.; Gather, K.; Heath, G.; Iacovacci, M.; Kehres, J.; Mobayyen, M.; Notz, D.; Orr, R.; Orr, R.; Sephton, A.; Stroili, R.; Tokushuku, K.; Vogel, W.; Whitmore, J.; Wiggers, L.
1989-12-01
The ZEUS collaboration is building a system to monitor, control and document the hardware of the ZEUS detector. This system is based on a network of VAX computers and microprocessors connected via ethernet. The database for the hardware values will be ADAMO tables; the ethernet connection will be DECNET, TCP/IP, or RPC. Most of the documentation will also be kept in ADAMO tables for easy access by users.
Review and Evaluation of Internal Control in the Department of the Navy.
1984-03-01
marketing Formulating adver- Controlling placement policies tising programs of advertisements Setting research Deciding on policies research projects Choosing...proper command level. with laws, regulations, treatires, and management policy. The command, base, or unit Written defintions of authorized activities...informa- tion to the members of the operating management ... Management also has a responsibility to maintain its access to the capital market and ... to
Orchestrating BMD Control in Extended BPEL
2008-05-21
Orchestration of secure WebMail , Technical Report ISE-TR-06-08, George Mason University, Fairfax, VA, August 2006. [9] E. Christensen, F. Curbera...methods to access and dissemination control, securing circuit switched (SS7) and IP based telecommunication (VoIP) systems, multimedia, security ...decorating the Business Process Execution Language (BPEL) with Quality of Service (QoS), Measures of Performance (MoP), Measures of Effectiveness (MoE
1990-07-01
i k RAYMOND P. URTZ, JR. Technical Director Directorate of Command & Control FOR TH!E C0OKANDER: IGOR G. PLONISCH Directorate of Plans & Programs If...access controls and for thwarting inference and aggregation attacks ae generally considered inadequate for high usurance systems. Consequently, thee is...requirements was to have been based on a state-of-the-art survey involving interviews with TDBMS researchers and developers and security officers and auditors
Care for the chronically ill: Nursing home incentive payment experiment
Weissert, William G.; Scanlon, William J.; Wan, Thomas T. H.; Skinner, Douglas E.
1983-01-01
Nursing home reinbursement systems which do not adjust payment levels to patient care needs lead to access problems for heavy-care patients. Unnecessarily long and costly hospital stays may result. A patient-based nursing home incentive reimbursement system has been designed and is being evaluated in a controlled field experiment in 36 California skilled nursing facilities. Incentives are paid for admitting heavy-care patients, meeting outcome goals on some patients, and discharging and maintaining some patients in the community. This article describes a nursing home reimbursement system which is intended to simultaneously mitigate problems of restricted access, inefficient use of beds, and nonoptimal care. It also discusses the approach to evaluating this broad social intervention by application of a controlled experimental design. PMID:10310528
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This manual is a guide to use the file protection mechanisms available on the Martin Marietta Energy Systems, Inc. Scientific and Technical Computing (STC) System VAXes. User identification codes (UICs) and general identifiers are discussed as a basis for understanding UIC-based and access control list (ACL) protection. 5 figs.
Improving School Access Control
ERIC Educational Resources Information Center
National Clearinghouse for Educational Facilities, 2008
2008-01-01
Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…
77 FR 551 - Privacy Act of 1974; Amended System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-05
... Act system of records entitled ``Treasury/BEP .027--Access Control and Alarm Monitoring Systems (ACAMS... .027--Access Control and Alarm Monitoring Systems (ACAMS).'' BEP proposes to amend that system of... records entitled ``BEP .027--Access Control and Alarm Monitoring Systems (ACAMS),'' as follows: Treasury...
Engineering Social Justice into Traffic Control for Self-Driving Vehicles?
Mladenovic, Milos N; McPherson, Tristram
2016-08-01
The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal access. Our central focus is on efficiency and equal access as desiderata for traffic control design. We explain the limitations of conventional traffic control in meeting these desiderata, and sketch a preliminary vision for a next-generation traffic control tailored to address better the demands of social justice. One component of this vision is cooperative, hierarchically distributed self-organization among vehicles. Another component of this vision is a priority system enabling selection of priority levels by the user for each vehicle trip in the network, based on the supporting structure of non-monetary credits.
Synthetic biology to access and expand nature’s chemical diversity
Smanski, Michael J.; Zhou, Hui; Claesen, Jan; Shen, Ben; Fischbach, Michael; Voigt, Christopher A.
2016-01-01
Bacterial genomes encode the biosynthetic potential to produce hundreds of thousands of complex molecules with diverse applications, from medicine to agriculture and materials. Economically accessing the potential encoded within sequenced genomes promises to reinvigorate waning drug discovery pipelines and provide novel routes to intricate chemicals. This is a tremendous undertaking, as the pathways often comprise dozens of genes spanning as much as 100+ kiliobases of DNA, are controlled by complex regulatory networks, and the most interesting molecules are made by non-model organisms. Advances in synthetic biology address these issues, including DNA construction technologies, genetic parts for precision expression control, synthetic regulatory circuits, computer aided design, and multiplexed genome engineering. Collectively, these technologies are moving towards an era when chemicals can be accessed en mass based on sequence information alone. This will enable the harnessing of metagenomic data and massive strain banks for high-throughput molecular discovery and, ultimately, the ability to forward design pathways to complex chemicals not found in nature. PMID:26876034
Trust-based Access Control in Virtual Learning Community
NASA Astrophysics Data System (ADS)
Wang, Shujuan; Liu, Qingtang
The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.
36 CFR 1256.70 - What controls access to national security-classified information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...
ERIC Educational Resources Information Center
Halupa, Colleen M.; Caldwell, Benjamin W.
2015-01-01
This quasi-experimental research study evaluated two intact undergraduate engineering statics classes at a private university in Texas. Students in the control group received traditional lecture, readings and homework assignments. Those in the experimental group also were given access to a complete set of online video lectures and videos…
Detecting Payload Attacks on Programmable Logic Controllers (PLCs)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan
Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less
OASIS: A Data Fusion System Optimized for Access to Distributed Archives
NASA Astrophysics Data System (ADS)
Berriman, G. B.; Kong, M.; Good, J. C.
2002-05-01
The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.
NASA Astrophysics Data System (ADS)
Ahern, T. K.; Barga, R.; Casey, R.; Kamb, L.; Parastatidis, S.; Stromme, S.; Weertman, B. T.
2008-12-01
While mature methods of accessing seismic data from the IRIS DMC have existed for decades, the demands for improved interdisciplinary data integration call for new approaches. Talented software teams at the IRIS DMC, UNAVCO and the ICDP in Germany, have been developing web services for all EarthScope data including data from USArray, PBO and SAFOD. These web services are based upon SOAP and WSDL. The EarthScope Data Portal was the first external system to access data holdings from the IRIS DMC using Web Services. EarthScope will also draw more heavily upon products to aid in cross-disciplinary data reuse. A Product Management System called SPADE allows archive of and access to heterogeneous data products, presented as XML documents, at the IRIS DMC. Searchable metadata are extracted from the XML and enable powerful searches for products from EarthScope and other data sources. IRIS is teaming with the External Research Group at Microsoft Research to leverage a powerful Scientific Workflow Engine (Trident) and interact with the web services developed at centers such as IRIS to enable access to data services as well as computational services. We believe that this approach will allow web- based control of workflows and the invocation of computational services that transform data. This capability will greatly improve access to data across scientific disciplines. This presentation will review some of the traditional access tools as well as many of the newer approaches that use web services, scientific workflow to improve interdisciplinary data access.
Paver automation for road surfacing
NASA Astrophysics Data System (ADS)
Tihonov, A.; Velichkin, V.
2017-10-01
The paper discusses factors that bear on the quality of motor road pavement as access roads and highways are built and used. A block diagram is proposed to organize elements of the automatic control system to control the asphalt paver’s mechanisms; the system is based on a microprocessor onboard controller to maintain preset elevation of the finishing plate; description of its operation principle is offered. The paper names primary converters to control the finishing plate elevation. A new control method is described to control the machine’s straight-line movement with GLONASS Satellite Positioning System (SPS) during operation.
The evolution of the ISOLDE control system
NASA Astrophysics Data System (ADS)
Jonsson, O. C.; Catherall, R.; Deloose, I.; Drumm, P.; Evensen, A. H. M.; Gase, K.; Focker, G. J.; Fowler, A.; Kugler, E.; Lettry, J.; Olesen, G.; Ravn, H. L.; Isolde Collaboration
The ISOLDE on-line mass separator facility is operating on a Personal Computer based control system since spring 1992. Front End Computers accessing the hardware are controlled from consoles running Microsoft Windows ™ through a Novell NetWare4 ™ local area network. The control system is transparently integrated in the CERN wide office network and makes heavy use of the CERN standard office application programs to control and to document the running of the ISOLDE isotope separators. This paper recalls the architecture of the control system, shows its recent developments and gives some examples of its graphical user interface.
The evolution of the ISOLDE control system
NASA Astrophysics Data System (ADS)
Jonsson, O. C.; Catherall, R.; Deloose, I.; Evensen, A. H. M.; Gase, K.; Focker, G. J.; Fowler, A.; Kugler, E.; Lettry, J.; Olesen, G.; Ravn, H. L.; Drumm, P.
1996-04-01
The ISOLDE on-line mass separator facility is operating on a Personal Computer based control system since spring 1992. Front End Computers accessing the hardware are controlled from consoles running Microsoft Windows® through a Novell NetWare4® local area network. The control system is transparently integrated in the CERN wide office network and makes heavy use of the CERN standard office application programs to control and to document the running of the ISOLDE isotope separators. This paper recalls the architecture of the control system, shows its recent developments and gives some examples of its graphical user interface.
Dryman, M Taylor; McTeague, Lisa M; Olino, Thomas M; Heimberg, Richard G
2017-10-01
Internet-delivered cognitive-behavioral therapy (ICBT) has been established as both efficacious and effective in reducing symptoms of social anxiety. However, most research has been conducted in controlled settings, and little is known regarding the utility of such programs in an open-access format. The present study examined the use, adherence, and effectiveness of Joyable, an open-access, Internet-delivered, coach-supported CBT-based intervention for social anxiety. Participants were 3,384 registered users (Mage [SD] = 29.82 [7.89]; 54% male) that created an account between 2014 and 2016. Characteristics of use, factors related to attrition and adherence, and within-group outcomes were examined. The primary outcome measure was the Social Phobia Inventory. On average, participants remained in the program for 81.02 days (SD = 60.50), during which they completed 12.14 activities (SD = 11.09) and 1.53 exposures (SD = 3.18). About half (57%) had contact with a coach. Full adherence to the program was achieved by 16% of participants, a rate higher than previously published open-access studies of ICBT. Social anxiety symptoms were significantly reduced for participants that engaged in the program, with medium within-group effects from baseline through the cognitive restructuring module (d = 0.63-0.76) and large effects from baseline through the exposure module (d = 1.40-1.83). Response rates were high (72%). Exposures and coach contact were significant predictors of retention and outcome. This open-access online CBT-based program is effective in reducing social anxiety symptoms and has the potential to extend Internet-based mental health services to socially anxious individuals unwilling or unable to seek face-to-face evidence-based therapy. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Trondsen, Marianne V.
2014-01-01
Chronic skin ulcers are a significant challenge for patients and health service resources, and ulcer treatment often requires the competence of a specialist. Although e-health interventions are increasingly valued for ulcer care by giving access to specialists at a distance, there is limited research on patients’ use of e-health services for home-based ulcer treatment. This article reports an exploratory qualitative study of the first Norwegian web-based counselling service for home-based ulcer treatment, established in 2011 by the University Hospital of North Norway (UNN). Community nurses, general practitioners (GPs) and patients are offered access to a web-based record system to optimize ulcer care. The web-based ulcer record enables the exchange and storage of digital photos and clinical information, by the use of which, an ulcer team at UNN, consisting of specialized nurses and dermatologists, is accessible within 24 h. This article explores patients’ experiences of using the web-based record for their home-based ulcer treatment without assistance from community nurses. Semi-structured interviews were conducted with a total of four patients who had used the record. The main outcomes identified were: autonomy and flexibility; safety and trust; involvement and control; and motivation and hope. These aspects improved the patients’ everyday life during long-term ulcer care and can be understood as stimulating patient empowerment. PMID:27429289
Optimizing Cloud Based Image Storage, Dissemination and Processing Through Use of Mrf and Lerc
NASA Astrophysics Data System (ADS)
Becker, Peter; Plesea, Lucian; Maurer, Thomas
2016-06-01
The volume and numbers of geospatial images being collected continue to increase exponentially with the ever increasing number of airborne and satellite imaging platforms, and the increasing rate of data collection. As a result, the cost of fast storage required to provide access to the imagery is a major cost factor in enterprise image management solutions to handle, process and disseminate the imagery and information extracted from the imagery. Cloud based object storage offers to provide significantly lower cost and elastic storage for this imagery, but also adds some disadvantages in terms of greater latency for data access and lack of traditional file access. Although traditional file formats geoTIF, JPEG2000 and NITF can be downloaded from such object storage, their structure and available compression are not optimum and access performance is curtailed. This paper provides details on a solution by utilizing a new open image formats for storage and access to geospatial imagery optimized for cloud storage and processing. MRF (Meta Raster Format) is optimized for large collections of scenes such as those acquired from optical sensors. The format enables optimized data access from cloud storage, along with the use of new compression options which cannot easily be added to existing formats. The paper also provides an overview of LERC a new image compression that can be used with MRF that provides very good lossless and controlled lossy compression.
Threshold-Based Random Charging Scheme for Decentralized PEV Charging Operation in a Smart Grid.
Kwon, Ojin; Kim, Pilkee; Yoon, Yong-Jin
2016-12-26
Smart grids have been introduced to replace conventional power distribution systems without real time monitoring for accommodating the future market penetration of plug-in electric vehicles (PEVs). When a large number of PEVs require simultaneous battery charging, charging coordination techniques have become one of the most critical factors to optimize the PEV charging performance and the conventional distribution system. In this case, considerable computational complexity of a central controller and exchange of real time information among PEVs may occur. To alleviate these problems, a novel threshold-based random charging (TBRC) operation for a decentralized charging system is proposed. Using PEV charging thresholds and random access rates, the PEVs themselves can participate in the charging requests. As PEVs with a high battery state do not transmit the charging requests to the central controller, the complexity of the central controller decreases due to the reduction of the charging requests. In addition, both the charging threshold and the random access rate are statistically calculated based on the average of supply power of the PEV charging system that do not require a real time update. By using the proposed TBRC with a tolerable PEV charging degradation, a 51% reduction of the PEV charging requests is achieved.
Threshold-Based Random Charging Scheme for Decentralized PEV Charging Operation in a Smart Grid
Kwon, Ojin; Kim, Pilkee; Yoon, Yong-Jin
2016-01-01
Smart grids have been introduced to replace conventional power distribution systems without real time monitoring for accommodating the future market penetration of plug-in electric vehicles (PEVs). When a large number of PEVs require simultaneous battery charging, charging coordination techniques have become one of the most critical factors to optimize the PEV charging performance and the conventional distribution system. In this case, considerable computational complexity of a central controller and exchange of real time information among PEVs may occur. To alleviate these problems, a novel threshold-based random charging (TBRC) operation for a decentralized charging system is proposed. Using PEV charging thresholds and random access rates, the PEVs themselves can participate in the charging requests. As PEVs with a high battery state do not transmit the charging requests to the central controller, the complexity of the central controller decreases due to the reduction of the charging requests. In addition, both the charging threshold and the random access rate are statistically calculated based on the average of supply power of the PEV charging system that do not require a real time update. By using the proposed TBRC with a tolerable PEV charging degradation, a 51% reduction of the PEV charging requests is achieved. PMID:28035963
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
Guo, Cheng; Zhuang, Ruhan; Jie, Yingmo; Ren, Yizhi; Wu, Ting; Choo, Kim-Kwang Raymond
2016-11-01
An effectively designed e-healthcare system can significantly enhance the quality of access and experience of healthcare users, including facilitating medical and healthcare providers in ensuring a smooth delivery of services. Ensuring the security of patients' electronic health records (EHRs) in the e-healthcare system is an active research area. EHRs may be outsourced to a third-party, such as a community healthcare cloud service provider for storage due to cost-saving measures. Generally, encrypting the EHRs when they are stored in the system (i.e. data-at-rest) or prior to outsourcing the data is used to ensure data confidentiality. Searchable encryption (SE) scheme is a promising technique that can ensure the protection of private information without compromising on performance. In this paper, we propose a novel framework for controlling access to EHRs stored in semi-trusted cloud servers (e.g. a private cloud or a community cloud). To achieve fine-grained access control for EHRs, we leverage the ciphertext-policy attribute-based encryption (CP-ABE) technique to encrypt tables published by hospitals, including patients' EHRs, and the table is stored in the database with the primary key being the patient's unique identity. Our framework can enable different users with different privileges to search on different database fields. Differ from previous attempts to secure outsourcing of data, we emphasize the control of the searches of the fields within the database. We demonstrate the utility of the scheme by evaluating the scheme using datasets from the University of California, Irvine.
Skruibis, Paulius; Eimontas, Jonas; Dovydaitiene, Migle; Mazulyte, Egle; Zelviene, Paulina; Kazlauskas, Evaldas
2016-07-26
Adjustment disorder is one of the most common mental health diagnoses. Still it receives relatively little attention from researchers trying to establish best interventions to treat it. With high prevalence of stressful life events, which might be leading to adjustment disorder, and limited resources of mental health service providers, online interventions could be a very practical way of helping people who have these disorders or are in the risk to develop them. The proposed study protocol is aimed to describe a randomized controlled trial of an internet-based modular intervention for adjustment disorder as it is defined in a proposal for the ICD-11. This study is a two-armed Randomized Controlled Trial (RCT) to examine the effectiveness of a web-based intervention BADI (Brief Adjustment Disorder Intervention) for adjustment disorder symptoms. BADI has four modules: Relaxation, Time management, Mindfulness and Strengthening relationships. It is based on stress and coping research and integrates evidence-based treatment approaches such as Cognitive Behavioural therapy (CBT), mindfulness and body-mind practices, as well as exercises for enhancing social support. Primary outcome of the study are symptoms of adjustment disorder and well-being. Engagement into the program and motivation for change is a secondary outcome. All participants after completing the baseline assessment are randomly assigned to one of the two groups: either to the one in which participant will instantly gain access to the BADI intervention or a group in which participants will be given access to the BADI program after waiting one month. Participants of BADI can choose exercises of the program flexibly. There is no particular order in which the exercises should be completed. Study will provide new insights of modular internet-based interventions efficacy for adjustment disorders. The study will also provide information about the role of motivation and expectancies on engagement in modular internet-based interventions. In case this RCT supports effectiveness of fully automated version of BADI, it could be used very broadly. It could become a cost-effective and accessible intervention for adjustment disorder. The study was retrospectively registered with the Australian and New Zealand Clinical Trials Registry with the registration number ACTRN12616000883415 . Registered 5 July, 2016.
Disparities in Access to Outpatient Rehabilitation Therapy for African Americans with Arthritis.
Sandstrom, Robert; Bruns, Alexandria
2017-08-01
Approximately, 10 million Americans have an outpatient physical therapy or occupational therapy visit per year. This population is largely Caucasian, insured, educated and middle or high income. The purpose of this study was to determine the existence of racial and/or ethnic disparities in patients with self-reported arthritis accessing office-based therapy services in the USA. A pooled analytic file of 2008-2010 data from the Medical Expenditure Panel Survey-Household Survey was created. We first conducted a descriptive analysis of the utilization of therapy services for persons reporting arthritis. From the descriptive analysis, we formulated experimental hypotheses that we tested to determine if a racial disparity existed to access therapy services between White and Asian persons with arthritis and Black/Hispanic populations. To test our hypotheses, we determined the odd ratios using a logistic regression analysis. We conducted a similar analysis controlling for education, income, and insurance status. Eight percent of the US adult population with self-reported arthritis has an office-based therapy visit each year. Hispanic and Black Americans with arthritis have a reduced odds of a therapy visit (26.5 % [95 % CI 7-42 %] and 44.8 % [95 % CI 31.9-55.3 %], respectively). We did not find a similar effect on odds of a therapy visit for the Asian American population. The effect of race/ethnicity on the odds of a therapy visit was moderated by socioeconomic variables but persists for Black Americans. The results of this study confirm a reduced likelihood of an office-based therapy visit for Black Americans with arthritis when controlled for income, insurance, and education. An effect of race/ethnicity on the likelihood of a therapy visit for Hispanic Americans with arthritis disappears when controlled for income, insurance, and education.
Abdelwahab, Hisham; Shigidi, Mazin; El-Tohami, Alyaa; Ibrahim, Lamees
2013-05-01
Hemodialysis (HD) is a complex procedure with many specifications and requires adherence to a set of particular clinical practice guidelines. These guidelines had already been established by globally acclaimed renal authorities and their implementation was shown to correlate with patients' morbidity and mortality. This study was conducted to evaluate the adherence of healthcare professionals to the evidence-based clinical practice patterns in Khartoum State HD units. A cross-sectional study was conducted in Khartoum State HD units during the period from September 2010 to January of 2011. Data was collected from the healthcare professionals using a specially designed checklist. The checklist included the evidence-based clinical practice guidelines for the HD vascular access, HD adequacy, anemia of chronic kidney disease (CKD), nutrition, cardiovascular risk assessment, and hepatitis B and C virus infection control. Implementation of these guidelines was evaluated, and further graded using a Likert-type scale. Four randomly selected HD units were included in the study. The rate of implementation of the HD vascular access guidelines was 54.8%, adequacy guidelines 57%, anemia of CKD 68.8%, nutrition 58.4%, cardiovascular risk assessment 57%, and hepatitis B and C infection control guidelines was 79.2%. Overall, the four HD units assessed showed moderate deviations from the practice guidelines of anemia of CKD and hepatitis B and C infection control. Extreme deviations from the clinical practice guidelines were seen in HD vascular access practices, adequacy assessments, nutrition and cardiovascular risk assessment. Hemodialysis services in Khartoum State are in need of great improvements regarding adherence to protocols and the standards of care.
Fernaeus, Sven-Erik; Hellström, Åke
2017-09-18
Wechsler Adult Intelligence Scale (WAIS) subscale Similarities have been classified as a test of either verbal comprehension or of inductive reasoning. The reason may be that items divide into two categories. We tested the hypothesis of heterogeneity of items in WAIS-Similarities. Consecutive patients at a memory clinic and healthy controls participated in the study. White-matter hyperintensities (WMHs) and normalized temporal lobe volumes were measured based on Magnetic resonance Imaging (MRI), and tests of verbal memory and attention were used in addition to WAIS-Similarities to collect behavioural data. Factor analysis supported the hypothesis that two factors are involved in the performance of WAIS-similarities: (1) semiautomatic lexical access and (2) conceptual elaboration. These factors were highly correlated but provided discriminative diagnostic information: In logistic regression analyses, scores of the lexical access factor and of the conceptual elaboration factor discriminated patients with mild cognitive impairment from Alzheimer's disease patients and from healthy controls, respectively. High scores of WMH, indicating periventricular white-matter lesions, predicted factor scores of direct lexical access but not those of conceptual elaboration, which were predicted only by medial and lateral temporal lobe volumes.
78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Implementation of EPICS based vacuum control system for variable energy cyclotron centre, Kolkata
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roy, Anindya, E-mail: r-ani@vecc.gov.in; Bhole, R. B.; Nandy, Partha P.
2015-03-15
The vacuum system of the Room Temperature (K = 130) Cyclotron of Variable Energy Cyclotron Centre is comprised of vacuum systems of main machine and Beam Transport System. The vacuum control system is upgraded to a PLC based Automated system from the initial relay based Manual system. The supervisory control of the vacuum system is implemented in Experimental Physics and Industrial Control System (EPICS). An EPICS embedded ARM based vacuum gauge controller is developed to mitigate the requirement of vendor specific gauge controller for gauges and also for seamless integration of the gauge controllers with the control system. A setmore » of MS-Windows ActiveX components with embedded EPICS Channel Access interface are developed to build operator interfaces with less complex programming and to incorporate typical Windows feature, e.g., user authentication, file handling, better fonts, colors, mouse actions etc. into the operator interfaces. The control parameters, monitoring parameters, and system interlocks of the system are archived in MySQL based EPICS MySQL Archiver developed indigenously. In this paper, we describe the architecture, the implementation details, and the performance of the system.« less
Typing for Conflict Detection in Access Control Policies
NASA Astrophysics Data System (ADS)
Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge
In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.
Self-organizing feature maps for dynamic control of radio resources in CDMA microcellular networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
1998-03-01
The application of artificial neural networks to the channel assignment problem for cellular code-division multiple access (CDMA) cellular networks has previously been investigated. CDMA takes advantage of voice activity and spatial isolation because its capacity is only interference limited, unlike time-division multiple access (TDMA) and frequency-division multiple access (FDMA) where capacities are bandwidth-limited. Any reduction in interference in CDMA translates linearly into increased capacity. To satisfy the high demands for new services and improved connectivity for mobile communications, microcellular and picocellular systems are being introduced. For these systems, there is a need to develop robust and efficient management procedures for the allocation of power and spectrum to maximize radio capacity. Topology-conserving mappings play an important role in the biological processing of sensory inputs. The same principles underlying Kohonen's self-organizing feature maps (SOFMs) are applied to the adaptive control of radio resources to minimize interference, hence, maximize capacity in direct-sequence (DS) CDMA networks. The approach based on SOFMs is applied to some published examples of both theoretical and empirical models of DS/CDMA microcellular networks in metropolitan areas. The results of the approach for these examples are informally compared to the performance of algorithms, based on Hopfield- Tank neural networks and on genetic algorithms, for the channel assignment problem.
Murphy, C L; McLaws, M
2000-04-01
To adopt an evidence-based approach, professionals must be able to access, identify, interpret, and critically appraise best evidence. Critical appraisal requires essential skills, such as computer literacy and an understanding of research principles. These skills also are required for professionals to contribute to evidence. In 1996, members of the Australian Infection Control Association were surveyed to establish a profile including the extent to which they were reading infection control publications, using specific documents for policy and guideline development, developing and undertaking research, publishing research, and using computers. The relationships between demographics, computer use, and research activity were examined. The response rate was 63. 4% (630/993). The study group comprised mostly women (96.1%), and most (66.4%) were older than 40 years of age. Median infection control experience was 4 years (mean, 5.4 years; range, <12 months to 35 years). When developing guidelines and policies (92.7%; 584/630), infection control professionals reviewed State Health Department Infection Control Guidelines and Regulations. Research relating to infection control was undertaken by 21.5% (135/628) of the sample, and 27.6% (37/134) of this group published their research findings. Of the respondents (51.1%; 318/622) who used a computer to undertake infection control tasks, the majority (89.0%) used a personal computer for word processing. Regardless of infection control experience, Australian infection control professionals must be adequately prepared to contribute to, access, appraise, and where appropriate, apply best evidence to their practice. We suggest that computer literacy, an understanding of research principles, and familiarity with infection control literature are three essential skills that infection control professionals must possess and regularly exercise.
A Magneto-Inductive Sensor Based Wireless Tongue-Computer Interface
Huo, Xueliang; Wang, Jia; Ghovanloo, Maysam
2015-01-01
We have developed a noninvasive, unobtrusive magnetic wireless tongue-computer interface, called “Tongue Drive,” to provide people with severe disabilities with flexible and effective computer access and environment control. A small permanent magnet secured on the tongue by implantation, piercing, or tissue adhesives, is utilized as a tracer to track the tongue movements. The magnetic field variations inside and around the mouth due to the tongue movements are detected by a pair of three-axial linear magneto-inductive sensor modules mounted bilaterally on a headset near the user’s cheeks. After being wirelessly transmitted to a portable computer, the sensor output signals are processed by a differential field cancellation algorithm to eliminate the external magnetic field interference, and translated into user control commands, which could then be used to access a desktop computer, maneuver a powered wheelchair, or control other devices in the user’s environment. The system has been successfully tested on six able-bodied subjects for computer access by defining six individual commands to resemble mouse functions. Results show that the Tongue Drive system response time for 87% correctly completed commands is 0.8 s, which yields to an information transfer rate of ~130 b/min. PMID:18990653
Open versus Controlled-Access Data | Office of Cancer Genomics
OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data
Evaluation of an internet-based animated preparatory video for children undergoing non-sedated MRI.
McGlashan, Hannah L; Dineen, Rob A; Szeszak, Sofia; Whitehouse, William P; Chow, Gabriel; Love, Andrew; Langmack, Gill; Wharrad, Heather
2018-05-10
We evaluate the value of an internet-based educational animated video designed to prepare children for MRI scans, and whether this video reduces scan-related anxiety in children with a neurological disorder, and healthy controls. Participants completed a pre- and post-scan questionnaire evaluating participant online viewing behaviour, understanding of the MRI procedure, anxiety regarding the MRI, impact of animation in preparing the child and whether the child's expectation of the MRI scan matched their experience. 21 children were recruited (12 healthy controls) ranging in age from 6.5 to 11.5 years. The animation was successfully accessed by participants on a range of digital devices and had high levels of approval. Children who viewed the animation had a good understanding of the MRI procedure and low anxiety levels prior to the scan, and reported that their expectations broadly matched the real-life MRI experience. Children reported that the animation positively impacted on their preparation with similar ratings before and after the scan, and the impact on preparation was rated greater by younger children. There were no group differences between healthy children and those with the neurological disorder for ratings of anxiety, impact on preparation and expectation of the experience. This evaluation demonstrates accessibility, acceptability and relevance of internet-based educational animation for typically developing children, and children with a neurodisability aged 6 to 11 years, with positive impact on preparation for MRI. Advances in knowledge: The internet-based educational animation provides a widely accessible tool to support preparation of children for non-sedated MRI.
Review of SDDOT's highway access control process
DOT National Transportation Integrated Search
2000-02-01
This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...
DOT National Transportation Integrated Search
1974-06-01
The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...
A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud
Seenivasagam, V.; Velumani, R.
2013-01-01
Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)—Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks. PMID:23970943
Health-Promoting Nature Access for People with Mobility Impairments: A Systematic Review.
Zhang, Gaochao; Poulsen, Dorthe V; Lygum, Victoria L; Corazon, Sus S; Gramkow, Marie C; Stigsdotter, Ulrika K
2017-06-29
This study systematically evaluated the scientific evidence for health benefits of natural environments for people with mobility impairments. Literature searches based on five categories of terms-target group, nature type, health-related impacts, nature-related activities and accessibility issues-were conducted in four databases (Web of Science, Scopus, CAB ABSTRACT and Medline). Twenty-seven articles from 4196 hits were included in the systematic reviews. We concluded that people with mobility disabilities could gain different health benefits, including physical health benefits, mental health benefits and social health benefits from nature in different kinds of nature contacts ranging from passive contact, active involvement to rehabilitative interventions. Several issues related to the accessibility and use of nature for people with mobility impairments need attention from professionals such as landscape architects, rehabilitative therapists, caregivers and policy makers. The overall quality of methodology of the included studies is not high based on assessment of the Mixed Methods Appraisal Tool (MMAT). Moreover, more randomized controlled trials and longitudinal studies that focus specifically on evidence-based health design of nature for people with mobility impairments in the future are needed.
Seenivasagam, V; Velumani, R
2013-01-01
Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.
Health-Promoting Nature Access for People with Mobility Impairments: A Systematic Review
Zhang, Gaochao; Poulsen, Dorthe V.; Lygum, Victoria L.; Corazon, Sus S.; Gramkow, Marie C.; Stigsdotter, Ulrika K.
2017-01-01
This study systematically evaluated the scientific evidence for health benefits of natural environments for people with mobility impairments. Literature searches based on five categories of terms—target group, nature type, health-related impacts, nature-related activities and accessibility issues—were conducted in four databases (Web of Science, Scopus, CAB ABSTRACT and Medline). Twenty-seven articles from 4196 hits were included in the systematic reviews. We concluded that people with mobility disabilities could gain different health benefits, including physical health benefits, mental health benefits and social health benefits from nature in different kinds of nature contacts ranging from passive contact, active involvement to rehabilitative interventions. Several issues related to the accessibility and use of nature for people with mobility impairments need attention from professionals such as landscape architects, rehabilitative therapists, caregivers and policy makers. The overall quality of methodology of the included studies is not high based on assessment of the Mixed Methods Appraisal Tool (MMAT). Moreover, more randomized controlled trials and longitudinal studies that focus specifically on evidence-based health design of nature for people with mobility impairments in the future are needed. PMID:28661433
Code of Federal Regulations, 2013 CFR
2013-10-01
... trunk ports, Information Surcharge, and signalling transfer point (STP) port) by the base period LS...) Dominant carrier. A carrier found by the Commission to have market power (i.e., power to control prices... billing or collection of access charges from interexchange carriers or wireless carriers. When determining...
Code of Federal Regulations, 2014 CFR
2014-10-01
... trunk ports, Information Surcharge, and signalling transfer point (STP) port) by the base period LS...) Dominant carrier. A carrier found by the Commission to have market power (i.e., power to control prices... billing or collection of access charges from interexchange carriers or wireless carriers. When determining...
NASA Technical Reports Server (NTRS)
Kingsbury, Brent K.
1986-01-01
Described is the implementation of a networked, UNIX based queueing system developed on contract for NASA. The system discussed supports both batch and device requests, and provides the facilities of remote queueing, request routing, remote status, queue access controls, batch request resource quota limits, and remote output return.
A new data collaboration service based on cloud computing security
NASA Astrophysics Data System (ADS)
Ying, Ren; Li, Hua-Wei; Wang, Li na
2017-09-01
With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.
Beyond the online catalog: developing an academic information system in the sciences.
Crawford, S; Halbrook, B; Kelly, E; Stucki, L
1987-01-01
The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed. PMID:3315052
Beyond the online catalog: developing an academic information system in the sciences.
Crawford, S; Halbrook, B; Kelly, E; Stucki, L
1987-07-01
The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed.
A Rewritable, Reprogrammable, Dual Light-Responsive Polymer Actuator.
Gelebart, Anne Helene; Mulder, Dirk J; Vantomme, Ghislaine; Schenning, Albertus P H J; Broer, Dirk J
2017-10-16
We report on the fabrication of a rewritable and reprogrammable dual-photoresponsive liquid crystalline-based actuator containing an azomerocyanine dye that can be locally converted into the hydroxyazopyridinium form by acid treatment. Each dye absorbs at a different wavelength giving access to programmable actuators, the folding of which can be controlled by using different colors of light. The acidic patterning is reversible and allows the erasing and rewriting of patterns in the polymer film, giving access to reusable, adjustable soft actuators. © 2017 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.
Improving the effectiveness of an interruption lag by inducing a memory-based strategy.
Morgan, Phillip L; Patrick, John; Tiley, Leyanne
2013-01-01
The memory for goals model (Altmann & Trafton, 2002) posits the importance of a short delay (the 'interruption lag') before an interrupting task to encode suspended goals for retrieval post-interruption. Two experiments used the theory of soft constraints (Gray, Simms, Fu & Schoelles, 2006) to investigate whether the efficacy of an interruption lag could be improved by increasing goal-state access cost to induce a more memory-based encoding strategy. Both experiments used a copying task with three access cost conditions (Low, Medium, and High) and a 5-s interruption lag with a no lag control condition. Experiment 1 found that the participants in the High access cost condition resumed more interrupted trials and executed more actions correctly from memory when coupled with an interruption lag. Experiment 2 used a prospective memory test post-interruption and an eyetracker recorded gaze activity during the interruption lag. The participants in the High access cost condition with an interruption lag were best at encoding target information during the interruption lag, evidenced by higher scores on the prospective memory measure and more gaze activity on the goal-state during the interruption lag. Theoretical and practical issues regarding the use of goal-state access cost and an interruption lag are discussed. Copyright © 2012. Published by Elsevier B.V.
Rapid rotational/translational maneuvering experiments of a flexible steel beam
NASA Technical Reports Server (NTRS)
Juang, Jer-Nan; Yang, Li-Farn; Huanag, Jen-Kuang; Macauley, Richard
1989-01-01
Future space manipulators may need translational base motion to expand the access region of a manipulator. An experiment was conducted to demonstrate slewing of flexible structures with coupled rotational and translational axes while simultaneously suppressing vibrational motion during the maneuver. In the experiment, a flexible steel beam carried by a translational cart was maneuvered by an active controller to perform position-control tasks. Experimental results are presented to show how the flexibility of the steel beam influences the multi-input multi-output feedback controller.
ERIC Educational Resources Information Center
Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.
One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…
How well are malaria maps used to design and finance malaria control in Africa?
Omumbo, Judy A; Noor, Abdisalan M; Fall, Ibrahima S; Snow, Robert W
2013-01-01
Rational decision making on malaria control depends on an understanding of the epidemiological risks and control measures. National Malaria Control Programmes across Africa have access to a range of state-of-the-art malaria risk mapping products that might serve their decision-making needs. The use of cartography in planning malaria control has never been methodically reviewed. An audit of the risk maps used by NMCPs in 47 malaria endemic countries in Africa was undertaken by examining the most recent national malaria strategies, monitoring and evaluation plans, malaria programme reviews and applications submitted to the Global Fund. The types of maps presented and how they have been used to define priorities for investment and control was investigated. 91% of endemic countries in Africa have defined malaria risk at sub-national levels using at least one risk map. The range of risk maps varies from maps based on suitability of climate for transmission; predicted malaria seasons and temperature/altitude limitations, to representations of clinical data and modelled parasite prevalence. The choice of maps is influenced by the source of the information. Maps developed using national data through in-country research partnerships have greater utility than more readily accessible web-based options developed without inputs from national control programmes. Although almost all countries have stratification maps, only a few use them to guide decisions on the selection of interventions allocation of resources for malaria control. The way information on the epidemiology of malaria is presented and used needs to be addressed to ensure evidence-based added value in planning control. The science on modelled impact of interventions must be integrated into new mapping products to allow a translation of risk into rational decision making for malaria control. As overseas and domestic funding diminishes, strategic planning will be necessary to guide appropriate financing for malaria control.
Chapman, Ann LN; Darton, Thomas C; Foster, Rachel A
2013-01-01
Tuberculosis (TB) remains a global health emergency. Ongoing challenges include the coordination of national and international control programs, high levels of drug resistance in many parts of the world, and availability of accurate and rapid diagnostic tests. The increasing availability and reliability of Internet access throughout both affluent and resource-limited countries brings new opportunities to improve TB management and control through the integration of web-based technologies with traditional approaches. In this review, we explore current and potential future use of web-based tools in the areas of TB diagnosis, treatment, epidemiology, service monitoring, and teaching and training. PMID:24294008
The MSG Central Facility - A Mission Control System for Windows NT
NASA Astrophysics Data System (ADS)
Thompson, R.
The MSG Central Facility, being developed by Science Systems for EUMETSAT1, represents the first of a new generation of satellite mission control systems, based on the Windows NT operating system. The system makes use of a range of new technologies to provide an integrated environment for the planning, scheduling, control and monitoring of the entire Meteosat Second Generation mission. It supports packetised TM/TC and uses Science System's Space UNiT product to provide automated operations support at both Schedule (Timeline) and Procedure levels. Flexible access to historical data is provided through an operations archive based on ORACLE Enterprise Server, hosted on a large RAID array and off-line tape jukebox. Event driven real-time data distribution is based on the CORBA standard. Operations preparation and configuration control tools form a fully integrated element of the system.
IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality
2014-01-01
In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592
Hatchett, Andrew; Hallam, Jeffrey S; Ford, M Allison
2013-04-01
The aim of this study is to evaluate a 12-week social cognitive theory (SCT)-based email intervention designed to influence the physical activity of survivors of breast cancer. Seventy-four volunteers (intervention group, n = 36; control group, n = 38) were recruited by mass email and written letter solicitation. Participants completed a series of online questionnaires measuring demographic characteristics, physical activity readiness, level of physical activity and selected SCT variables at baseline, 6 and 12 weeks. The intervention group received email messages based on SCT designed specifically for breast cancer survivors and targeting physical activity. For the first 6 weeks of the intervention, participants assigned to the intervention group received messages weekly, from weeks 7 to 12, participants received messages every other week and had access to an e-counselor. The control group did not receive email messages, nor did they have access to an e-counselor. Significant differences in levels of self-reported vigorous physical activity were found between groups at 6 and 12 weeks. Significant differences were also found for self-reported moderate physical activity at 12 weeks. Email-based interventions based on SCT can significantly influence levels of self-reported physical activity of breast cancer survivors. Copyright © 2012 John Wiley & Sons, Ltd.
76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...
Partisan Activism and Access to Welfare in Lebanon
2014-01-01
How do welfare regimes function when state institutions are weak and ethnic or sectarian groups control access to basic services? This paper explores how people gain access to basic services in Lebanon, where sectarian political parties from all major religious communities are key providers of social assistance and services. Based on analyses of an original national survey (n= 1,911) as well as in-depth interviews with providers and other elites (n= 175) and beneficiaries of social programs (n= 135), I make two main empirical claims in the paper. First, political activism and a demonstrated commitment to a party are associated with access to social assistance; and second, higher levels of political activism may facilitate access to higher levels or quantities of aid, including food baskets and financial assistance for medical and educational costs. These arguments highlight how politics can mediate access to social assistance in direct ways and add new dimensions to scholarly debates about clientelism by focusing on contexts with politicized religious identities and by problematizing the actual goods and services exchanged. PMID:24904187
Feasibility Study of a Vision-Based Landing System for Unmanned Fixed-Wing Aircraft
2017-06-01
International Journal of Computer Science and Network Security 7 no. 3: 112–117. Accessed April 7, 2017. http://www.sciencedirect.com/science/ article /pii...the feasibility of applying computer vision techniques and visual feedback in the control loop for an autonomous system. This thesis examines the...integration into an autonomous aircraft control system. 14. SUBJECT TERMS autonomous systems, auto-land, computer vision, image processing
BIOPACK: the ground controlled late access biological research facility.
van Loon, Jack J W A
2004-03-01
Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.
Hamlet, Jason R [Albuquerque, NM; Robertson, Perry J [Albuquerque, NM; Pierson, Lyndon G [Albuquerque, NM; Olsberg, Ronald R [Albuquerque, NM
2012-02-28
A deflate decompressor includes at least one decompressor unit, a memory access controller, a feedback path, and an output buffer unit. The memory access controller is coupled to the decompressor unit via a data path and includes a data buffer to receive the data stream and temporarily buffer a first portion the data stream. The memory access controller transfers fixed length data units of the data stream from the data buffer to the decompressor unit with reference to a memory pointer pointing into the memory buffer. The feedback path couples the decompressor unit to the memory access controller to feed back decrement values to the memory access controller for updating the memory pointer. The decrement values each indicate a number of bits unused by the decompressor unit when decoding the fixed length data units. The output buffer unit buffers a second portion of the data stream after decompression.
Patel, Priti R; Yi, Sarah H; Booth, Stephanie; Bren, Virginia; Downham, Gemma; Hess, Sally; Kelley, Karen; Lincoln, Mary; Morrissette, Kathy; Lindberg, Curt; Jernigan, John A; Kallen, Alexander J
2013-08-01
Bloodstream infections (BSIs) cause substantial morbidity in hemodialysis patients. In 2009, the US Centers for Disease Control and Prevention (CDC) sponsored a collaborative project to prevent BSIs in outpatient hemodialysis facilities. We sought to assess the impact of a set of interventions on BSI and access-related BSI rates in participating facilities using data reported to the CDC's National Healthcare Safety Network (NHSN). Quality improvement project. Patients in 17 outpatient hemodialysis facilities that volunteered to participate. Facilities reported monthly event and denominator data to NHSN, received guidance from the CDC, and implemented an evidence-based intervention package that included chlorhexidine use for catheter exit-site care, staff training and competency assessments focused on catheter care and aseptic technique, hand hygiene and vascular access care audits, and feedback of infection and adherence rates to staff. Crude and modeled BSI and access-related BSI rates. Up to 12 months of preintervention (January 2009 through December 2009) and 15 months of intervention period (January 2010 through March 2011) data from participating centers were analyzed. Segmented regression analysis was used to assess changes in BSI and access-related BSI rates during the preintervention and intervention periods. Most (65%) participating facilities were hospital based. Pooled mean BSI and access-related BSI rates were 1.09 and 0.73 events per 100 patient-months during the preintervention period and 0.89 and 0.42 events per 100 patient-months during the intervention period, respectively. Modeled rates decreased 32% (P = 0.01) for BSIs and 54% (P < 0.001) for access-related BSIs at the start of the intervention period. Participating facilities were not representative of all outpatient hemodialysis centers nationally. There was no control arm to this quality improvement project. Facilities participating in a collaborative successfully decreased their BSI and access-related BSI rates. The decreased rates appeared to be maintained in the intervention period. These findings suggest that improved implementation of recommended practices can reduce BSIs in hemodialysis centers. Published by Elsevier Inc. on behalf of the National Kidney Foundation, Inc.
Chow, Chun Bong; Wong, Wilfred Hing-Sang; Leung, Wing Cheong; Tang, Mary Hoi-Yin; Chan, Ko Ling; Or, Calvin KL; Li, Tim MH; Ho, Frederick Ka Wing; Lo, Daniel
2016-01-01
Background Provision of anticipatory guidance for parents is recommended as an effective strategy to prevent injuries among young children. Technology-based anticipatory guidance has been suggested to reinforce the effectiveness of injury prevention and improve parents’ knowledge of child safety. Objective This study aims to examine the effectiveness of a technology-based injury prevention program with parental anticipatory guidance for enhancing mothers’ knowledge of child safety. Methods In this randomized controlled trial, 308 mothers will be recruited from the antenatal clinics and postnatal wards of two major public hospitals in Hong Kong. Participating mothers will be randomly assigned into intervention and control groups. Mothers in the intervention group will be given free access to a technology-based injury prevention program with anticipatory guidance, whereas mothers in the control group will be given a relevant booklet on parenting. The injury prevention program, available as a website or on a mobile app, includes behavioral components based on the Theory of Planned Behavior. The primary outcome measure will be the change in the mother’s knowledge of child safety. The secondary outcome measures will be age-appropriate domestic safety knowledge, attitudes, intentions, perceived behavioral control, and self-reported behavior related to home safety practice. We will also determine dose-response relationships between the outcome measures and the website and mobile app usage. Results Enrolment of participants will begin in October 2016. Results are expected by June 2018. Conclusions Parents will be able to easily access the domestic injury prevention website to find information regarding child injury prevention. It is anticipated that the technology-based intervention will help parents improve their knowledge of child safety and raise their awareness about the consequences of domestic injuries and the importance of prevention. Trial Registration Clinicaltrials.gov Clinicaltrials.gov NCT02835768; http://clinicaltrials.gov/ct2/show/NCT02835768 (Archived by WebCite at http://www.webcitation/6lbXYM6b9) PMID:27799138
Automated knowledge generation
NASA Technical Reports Server (NTRS)
Myler, Harley R.; Gonzalez, Avelino J.
1988-01-01
The general objectives of the NASA/UCF Automated Knowledge Generation Project were the development of an intelligent software system that could access CAD design data bases, interpret them, and generate a diagnostic knowledge base in the form of a system model. The initial area of concentration is in the diagnosis of the process control system using the Knowledge-based Autonomous Test Engineer (KATE) diagnostic system. A secondary objective was the study of general problems of automated knowledge generation. A prototype was developed, based on object-oriented language (Flavors).
Implementing Patient Access to Electronic Health Records Under HIPAA: Lessons Learned
Wang, Tiffany; Pizziferri, Lisa; Volk, Lynn A; Mikels, Debra A; Grant, Karen G; Wald, Jonathan S; Bates, David W
2004-01-01
In 2001, the Institute of Medicine (IOM) and the Health Insurance Portability and Accountability Act (HIPAA) emphasized the need for patients to have greater control over their health information. We describe a Boston healthcare system's approach to providing patients access to their electronic health records (EHRs) via Patient Gateway, a secure, Web-based portal. Implemented in 19 clinic sites to date, Patient Gateway allows patients to access information from their medical charts via the Internet in a secure manner. Since 2002, over 19,000 patients have enrolled in Patient Gateway, more than 125,000 patients have logged into the system, and over 37,000 messages have been sent by patients to their practices. There have been no major security concerns. By providing access to EHR data, secure systems like Patient Gateway allow patients a greater role in their healthcare process, as envisioned by the IOM and HIPAA. PMID:18066391
Estimation and modeling of coal pore accessibility using small angle neutron scattering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Rui; Liu, Shimin; Bahadur, Jitendra
Gas diffusion in coal is controlled by nano-structure of the pores. The interconnectivity of pores not only determines the dynamics of gas transport in the coal matrix but also influences the mechanical strength. In this study, small angle neutron scattering (SANS) was employed to quantify pore accessibility for two coal samples, one of sub-bituminous rank and the other of anthracite rank. Moreover, a theoretical pore accessibility model was proposed based on scattering intensities under both vacuum and zero average contrast (ZAC) conditions. Our results show that scattering intensity decreases with increasing gas pressure using deuterated methane (CD 4) at lowmore » Q values for both coals. Pores smaller than 40 nm in radius are less accessible for anthracite than sub-bituminous coal. On the contrary, when the pore radius is larger than 40 nm, the pore accessibility of anthracite becomes larger than that of sub-bituminous coal. Only 20% of pores are accessible to CD 4 for anthracite and 37% for sub-bituminous coal, where the pore radius is 16 nm. For these two coals, pore accessibility and pore radius follows a power-law relationship.« less