Science.gov

Sample records for access control requirements

  1. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  2. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access... Prescriptions § 1311.125 Requirements for establishing logical access control—Individual practitioner. (a) At... his two-factor authentication credential to satisfy the logical access controls. The second...

  3. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  4. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  5. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  6. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  7. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  8. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  9. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  10. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  11. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  12. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  13. Authority of the Food and Drug Administration to require data access and control use rights in the Sentinel data network.

    PubMed

    Evans, Barbara J

    2010-01-01

    The Food and Drug Administration Amendments Act of 2007 (FDAAA) authorized the U.S. Food and Drug Administration (FDA) to develop a 100-million-person health data network known as the Sentinel system. When fully operational, the Sentinel network will offer a very rich, very large health data resource that has the potential to become one of history's most powerful engines of biomedical innovation and clinical translation of discoveries. Who controls this asset will be a matter of great scientific and commercial importance. This article explores two key questions--data access and use rights--that are under debate as various parties jostle for control of the network: First, does FDA have legal authority to require private healthcare data environments--such as insurers, healthcare providers, pharmacists and other entities that hold data in administrative and clinical databases--to make data available for inclusion in the network? Second, who will decide how the network is used, once it is built? The article explains why a neutral analysis of these questions is essential as FDA designs the governance framework for protecting the diverse stakeholders who will be touched by the Sentinel network. The conclusion describes threats to network operations, including federal and state constitutional claims and state legislative interventions, which could arise if FDA fails to devote timely attention to these issues.

  14. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  15. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  16. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  17. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  18. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  19. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  20. 40 CFR 258.25 - Access requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Access requirements. 258.25 Section 258.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Operating Criteria § 258.25 Access requirements. Owners or operators of...

  1. Deaf mobile application accessibility requirements

    NASA Astrophysics Data System (ADS)

    Nathan, Shelena Soosay; Hussain, Azham; Hashim, Nor Laily

    2016-08-01

    Requirement for deaf mobile applications need to be analysed to ensure the disabilities need are instilled into the mobile applications developed for them. Universal design is understandable to comply every user needs, however specific disability is argued by the authors to have different need and requirements. These differences are among the reasons for these applications being developed to target for a specific group of people, however they are less usable and later abandoned. This study focuses on deriving requirements that are needed by the deaf in their mobile applications that are meant specifically for them. Studies on previous literature was conducted it can be concluded that graphic, text, multimedia and sign language interpreter are among mostly required features to be included in their mobile application to ensure the applications are usable for this community.

  2. 18 CFR 3a.41 - Access requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Access requirements. 3a.41 Section 3a.41 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Access to Classified Materials §...

  3. 18 CFR 3a.41 - Access requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Access requirements. 3a.41 Section 3a.41 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Access to Classified Materials §...

  4. 18 CFR 3a.41 - Access requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Access requirements. 3a.41 Section 3a.41 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Access to Classified Materials §...

  5. 18 CFR 3a.41 - Access requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Access requirements. 3a.41 Section 3a.41 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Access to Classified Materials §...

  6. 18 CFR 3a.41 - Access requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 1 2011-04-01 2011-04-01 false Access requirements. 3a.41 Section 3a.41 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Access to Classified Materials §...

  7. 40 CFR 258.25 - Access requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... MSWLF units must control public access and prevent unauthorized vehicular traffic and illegal dumping of wastes by using artificial barriers, natural barriers, or both, as appropriate to protect human...

  8. 40 CFR 258.25 - Access requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... MSWLF units must control public access and prevent unauthorized vehicular traffic and illegal dumping of wastes by using artificial barriers, natural barriers, or both, as appropriate to protect human...

  9. 40 CFR 258.25 - Access requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... MSWLF units must control public access and prevent unauthorized vehicular traffic and illegal dumping of wastes by using artificial barriers, natural barriers, or both, as appropriate to protect human...

  10. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  11. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  12. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  13. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  14. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  15. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... required by 10 CFR 20.1902. Radiation postings for panoramic irradiators must comply with the...

  16. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  17. 40 CFR 258.25 - Access requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 258.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Operating Criteria § 258.25 Access requirements. Owners or operators of all... wastes by using artificial barriers, natural barriers, or both, as appropriate to protect human...

  18. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  19. Access control mechanisms for distributed healthcare environments.

    PubMed

    Sergl-Pommerening, Marita

    2004-01-01

    Today's IT-infrastructure provides more and more possibilities to share electronic patient data across several healthcare organizations and hospital departments. A strong requirement is sufficient data protection and security measures complying with the medical confidentiality and the data protection laws of each state or country like the European directive on data protection or the U.S. HIPAA privacy rule. In essence, the access control mechanisms and authorization structures of information systems must be able to realize the Need-To-Access principle. This principle can be understood as a set of context-sensitive access rules, regarding the patient's path across the organizations. The access control mechanisms of today's health information systems do not sufficiently satisfy this requirement, because information about participation of persons or organizations is not available within each system in a distributed environment. This problem could be solved by appropriate security services. The CORBA healthcare domain standard contains such a service for obtaining authorization decisions and administrating access decision policies (RAD). At the university hospital of Mainz we have developed an access control system (MACS), which includes the main functionality of the RAD specification and the access control logic that is needed for such a service. The basic design principles of our approach are role-based authorization, user rights with static and dynamic authorization data, context rules and the separation of three cooperating servers that provide up-to-date knowledge about users, roles and responsibilities. This paper introduces the design principles and the system design and critically evaluates the concepts based on practical experience.

  20. Controlling Access to Suicide Means

    PubMed Central

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  1. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  2. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  3. ACCESS: Detector Control and Performance

    NASA Astrophysics Data System (ADS)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  4. Emergency access for online personally controlled health records system.

    PubMed

    Zhang, Yuan; Dhileepan, Sunethra; Schmidt, Matthew; Zhong, Sheng

    2012-09-01

    A personally controlled health records (PCHR) system allows a patient user to share his/her health records with trusted physicians by manually granting them the access privilege to his/her online records. However, it presents the problem of emergency access in situations where the user is physically unable to grant the access and the access is required by an Emergency Room (ER) physician who does not have the privilege at that moment. To deal with such a problem, we introduce an online polling system to provide the emergency access control to PCHR systems. For each emergency access request, the access privilege is controlled according to the combined opinions of the patient's preset emergency contacts and other online registered physicians. Because our system is based on the demographic number of the physician community nationwide, it provides a stable emergency access control at all times.

  5. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  6. Cryptographic Enforcement of Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Crampton, Jason

    Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, using role-based access control policies rather than information flow policies. In this paper, we provide an alternative formulation of role-based access control that enables us to apply existing cryptographic schemes to core and hierarchical role-based access control policies. We then show that special cases of our cryptographic enforcement schemes for role-based access control are equivalent to cryptographic enforcement schemes for temporal access control and to ciphertext-policy and key-policy attribute-based encryption schemes. Finally, we describe how these special cases can be extended to support richer forms of temporal access control and attribute-based encryption.

  7. Programmable data communications controller requirements

    NASA Technical Reports Server (NTRS)

    1977-01-01

    The design requirements for a Programmable Data Communications Controller (PDCC) that reduces the difficulties in attaching data terminal equipment to a computer are presented. The PDCC is an interface between the computer I/O channel and the bit serial communication lines. Each communication line is supported by a communication port that handles all line control functions and performs most terminal control functions. The port is fabricated on a printed circuit board that plugs into a card chassis, mating with a connector that is joined to all other card stations by a data bus. Ports are individually programmable; each includes a microprocessor, a programmable read-only memory for instruction storage, and a random access memory for data storage.

  8. Formal Description of Trust-based Access Control

    NASA Astrophysics Data System (ADS)

    Xiaoning, Ma

    Different from traditional access control technologies, such as discretionary access control, mandatory access control, role-based access control, trust-based access control can solve the problem of uncertainty, risk and vulnerability coming from authorization. In this paper, strict definition and formal description of trust-based access control is defined.

  9. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  10. Application-Defined Decentralized Access Control.

    PubMed

    Xu, Yuanzhong; Dunn, Alan M; Hofmann, Owen S; Lee, Michael Z; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%-9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications' security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes.

  11. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  12. Requirements management and control

    NASA Technical Reports Server (NTRS)

    Robbins, Red

    1993-01-01

    The systems engineering process for thermal nuclear propulsion requirements and configuration definition is described in outline and graphic form. Functional analysis and mission attributes for a Mars exploration mission are also addressed.

  13. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  14. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  15. The linked medical data access control framework.

    PubMed

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  16. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  17. Implementing context and team based access control in healthcare intranets.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users.

  18. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  19. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  20. Section 508 Electronic Information Accessibility Requirements for Software Development

    NASA Technical Reports Server (NTRS)

    Ellis, Rebecca

    2014-01-01

    Section 508 Subpart B 1194.21 outlines requirements for operating system and software development in order to create a product that is accessible to users with various disabilities. This portion of Section 508 contains a variety of standards to enable those using assistive technology and with visual, hearing, cognitive and motor difficulties to access all information provided in software. The focus on requirements was limited to the Microsoft Windows® operating system as it is the predominant operating system used at this center. Compliance with this portion of the requirements can be obtained by integrating the requirements into the software development cycle early and by remediating issues in legacy software if possible. There are certain circumstances with software that may arise necessitating an exemption from these requirements, such as design or engineering software using dynamically changing graphics or numbers to convey information. These exceptions can be discussed with the Section 508 Coordinator and another method of accommodation used.

  1. Speed control system for an access gate

    SciTech Connect

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  2. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  3. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... other things, the Commission raised the following issues in the ACS FNPRM: (1) Coverage of Internet..., that it provides. Among other things, this means that the functions of an Internet browser--to enable...] Accessibility Requirements for Internet Browsers AGENCY: Federal Communications Commission. ACTION: Final...

  4. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  5. 21 CFR 1403.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Retention and access requirements for records. 1403.42 Section 1403.42 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award...

  6. 21 CFR 1403.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Retention and access requirements for records. 1403.42 Section 1403.42 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award...

  7. 21 CFR 1403.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Retention and access requirements for records. 1403.42 Section 1403.42 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award...

  8. 21 CFR 1403.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Retention and access requirements for records. 1403.42 Section 1403.42 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award...

  9. 21 CFR 1403.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Retention and access requirements for records. 1403.42 Section 1403.42 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award...

  10. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  11. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  12. ANALYSIS OF MPC ACCESS REQUIREMENTS FOR ADDITION OF FILLER MATERIALS

    SciTech Connect

    W. Wallin

    1996-09-03

    This analysis is prepared by the Mined Geologic Disposal System (MGDS) Waste Package Development Department (WPDD) in response to a request received via a QAP-3-12 Design Input Data Request (Ref. 5.1) from WAST Design (formerly MRSMPC Design). The request is to provide: Specific MPC access requirements for the addition of filler materials at the MGDS (i.e., location and size of access required). The objective of this analysis is to provide a response to the foregoing request. The purpose of this analysis is to provide a documented record of the basis for the response. The response is stated in Section 8 herein. The response is based upon requirements from an MGDS perspective.

  13. Ka-band geostationary satellite spacing requirements and access schemes

    NASA Technical Reports Server (NTRS)

    Caron, Mario; Hindson, Daniel J.

    1995-01-01

    Geostationary satellite systems for wideband personal communications applications have been proposed. This paper looks at the geostationary satellite spacing requirement to meet the ITU-R sharing criterion for FDMA and CDMA access schemes. CDMA capacity equation is first developed. Then the basis for the interference analysis between two systems with an overlapping coverage area is developed for the cases of identical and different access schemes and for bandwidth and power limited systems. An example of an interference analysis between two systems is fully carried out. The paper also points out the inherent problems when comparing systems with different access schemes. It is found that under certain scenarios, CDMA can allow a closer spacing between satellites.

  14. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  15. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Control of public access. 420.53 Section....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and unauthorized, unescorted access to explosive hazard facilities or other hazard areas not otherwise...

  16. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  17. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  18. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  19. Situation-Based Access Control: privacy management via modeling of patient data access scenarios.

    PubMed

    Peleg, Mor; Beimel, Dizza; Dori, Dov; Denekamp, Yaron

    2008-12-01

    Access control is a central problem in privacy management. A common practice in controlling access to sensitive data, such as electronic health records (EHRs), is Role-Based Access Control (RBAC). RBAC is limited as it does not account for the circumstances under which access to sensitive data is requested. Following a qualitative study that elicited access scenarios, we used Object-Process Methodology to structure the scenarios and conceive a Situation-Based Access Control (SitBAC) model. SitBAC is a conceptual model, which defines scenarios where patient's data access is permitted or denied. The main concept underlying this model is the Situation Schema, which is a pattern consisting of the entities Data-Requestor, Patient, EHR, Access Task, Legal-Authorization, and Response, along with their properties and relations. The various data access scenarios are expressed via Situation Instances. While we focus on the medical domain, the model is generic and can be adapted to other domains.

  20. Concurrency and Time in Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Chiang, Chia-Chu; Bayrak, Coskun

    Role-based access control (RBAC) has been proposed as an alternative solution for expressing access control policies. The generalized temporal RBAC (GTRBAC) extends RBAC by adding time in order to support timed based access control policies. However, GTRBAC does not address certain issues of concurrency such as, synchronization. We propose an approach to the expressions of time and concurrency in RBAC based on timed Petri nets. A formal verification method for access control policies is also proposed.

  1. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  2. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  3. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  4. Context-Based E-Health System Access Control Mechanism

    NASA Astrophysics Data System (ADS)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  5. Employee and government access to personnel files: rights and requirements.

    PubMed

    Fox, J C; Ostling, P J

    1979-01-01

    A maze of record-keeping, disclosure, and privacy statutes and regulations, with accompanying case law, have created a boom in privacy law. Employers find themselves caught in this rising tide, torn between the often conflicting requirements. The issue of access to employee files--by employees, government, and unions--is one of the most difficult issues in this complicated situation. This article discusses recent developments in the field and aims to help readers thread their way through the maze of contradictions and pitfalls confronting employers.

  6. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  7. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION....53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site,...

  8. Access from Space: A New Perspective on NASA's Space Transportation Technology Requirements and Opportunities

    NASA Technical Reports Server (NTRS)

    Rasky, Daniel J.

    2004-01-01

    The need for robust and reliable access from space is clearly demonstrated by the recent loss of the Space Shuttle Columbia; as well as the NASA s goals to get the Shuttle re-flying and extend its life, build new vehicles for space access, produce successful robotic landers and s a q k retrr? llisrions, and maximize the science content of ambitious outer planets missions that contain nuclear reactors which must be safe for re-entry after possible launch aborts. The technology lynch pin of access from space is hypersonic entry systems such the thermal protection system, along with navigation, guidance and control (NG&C). But it also extends to descent and landing systems such as parachutes, airbags and their control systems. Current space access technology maturation programs such as NASA s Next Generation Launch Technology (NGLT) program or the In-Space Propulsion (ISP) program focus on maturing laboratory demonstrated technologies for potential adoption by specific mission applications. A key requirement for these programs success is a suitable queue of innovative technologies and advanced concepts to mature, including mission concepts enabled by innovative, cross cutting technology advancements. When considering space access, propulsion often dominates the capability requirements, as well as the attention and resources. From the perspective of access from space some new cross cutting technology drivers come into view, along with some new capability opportunities. These include new miniature vehicles (micro, nano, and picosats), advanced automated systems (providing autonomous on-orbit inspection or landing site selection), and transformable aeroshells (to maximize capabilities and minimize weight). This paper provides an assessment of the technology drivers needed to meet future access from space mission requirements, along with the mission capabilities that can be envisioned from innovative, cross cutting access from space technology developments.

  9. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  10. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  11. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  12. 29 CFR 95.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Retention and access requirements for records. 95.53 Section...-Award Requirements Reports and Records § 95.53 Retention and access requirements for records. (a) This section sets forth requirements for record retention and access to records for awards to recipients....

  13. Access Requirement Analysis of E-Governance Systems

    NASA Astrophysics Data System (ADS)

    Kim, Tai-Hoon

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  14. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  15. Health information system access control redesign - rationale and method.

    PubMed

    Moselle, Kenneth A

    2011-01-01

    This paper addresses the question of why a health service system might find it necessary to re-engineer the access control model that mediates the interaction of clinicians with health information systems. Factors that lead to increasingly complexity of the access control models are delineated, and consequences of that complexity are identified. Strategies are presented to address these factors, and a stepwise procedure is suggested to structure the access control model re-engineering process.

  16. Access of protective antiviral antibody to neuronal tissues requires CD4 T-cell help.

    PubMed

    Iijima, Norifumi; Iwasaki, Akiko

    2016-05-26

    Circulating antibodies can access most tissues to mediate surveillance and elimination of invading pathogens. Immunoprivileged tissues such as the brain and the peripheral nervous system are shielded from plasma proteins by the blood-brain barrier and blood-nerve barrier, respectively. Yet, circulating antibodies must somehow gain access to these tissues to mediate their antimicrobial functions. Here we examine the mechanism by which antibodies gain access to neuronal tissues to control infection. Using a mouse model of genital herpes infection, we demonstrate that both antibodies and CD4 T cells are required to protect the host after immunization at a distal site. We show that memory CD4 T cells migrate to the dorsal root ganglia and spinal cord in response to infection with herpes simplex virus type 2. Once inside these neuronal tissues, CD4 T cells secrete interferon-γ and mediate local increase in vascular permeability, enabling antibody access for viral control. A similar requirement for CD4 T cells for antibody access to the brain is observed after intranasal challenge with vesicular stomatitis virus. Our results reveal a previously unappreciated role of CD4 T cells in mobilizing antibodies to the peripheral sites of infection where they help to limit viral spread. PMID:27225131

  17. Access of protective antiviral antibody to neuronal tissues requires CD4 T-cell help.

    PubMed

    Iijima, Norifumi; Iwasaki, Akiko

    2016-05-26

    Circulating antibodies can access most tissues to mediate surveillance and elimination of invading pathogens. Immunoprivileged tissues such as the brain and the peripheral nervous system are shielded from plasma proteins by the blood-brain barrier and blood-nerve barrier, respectively. Yet, circulating antibodies must somehow gain access to these tissues to mediate their antimicrobial functions. Here we examine the mechanism by which antibodies gain access to neuronal tissues to control infection. Using a mouse model of genital herpes infection, we demonstrate that both antibodies and CD4 T cells are required to protect the host after immunization at a distal site. We show that memory CD4 T cells migrate to the dorsal root ganglia and spinal cord in response to infection with herpes simplex virus type 2. Once inside these neuronal tissues, CD4 T cells secrete interferon-γ and mediate local increase in vascular permeability, enabling antibody access for viral control. A similar requirement for CD4 T cells for antibody access to the brain is observed after intranasal challenge with vesicular stomatitis virus. Our results reveal a previously unappreciated role of CD4 T cells in mobilizing antibodies to the peripheral sites of infection where they help to limit viral spread.

  18. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  19. Accessible Gaming through Mainstreaming Kinetic Controller

    NASA Astrophysics Data System (ADS)

    Garrido, Yolanda; Marco, Álvaro; Segura, Joaquín; Blanco, Teresa; Casas, Roberto

    Leisure is a very important aspect in our everyday life; and gaming is one of the main ways to it. Depending on the particular situation of each person, the way of playing could be very different. Motivation, preferences, skills, knowledge are some of the factors that influences this experience. When the person has a disability, additional agents come to scene such as cognitive level and mobility. Besides the design of the game, these factors clearly affect how the person interacts with the game; its user interface. In this paper we present a tool that allows people with disabilities to play games with a normalized user interface. This tool a) manages several wireless kinetic remote controllers, e.g. the Wiimotes; b) can be configured to capture any voluntary movements users could do and c) convert them into the specific inputs required by existing adapted games. As a result, users with disabilities can experience and enjoy games that were previously inaccessible to them.

  20. 22 CFR 226.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Retention and access requirements for records... Retention and access requirements for records. (a) This section sets forth requirements for record retention and access to records for awards to recipients. USAID shall not impose any other record retention...

  1. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  2. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  3. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  4. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  5. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  6. The Comparative Analysis of Main Access Control Technologies

    NASA Astrophysics Data System (ADS)

    Zhang, Su; Niu, Li; Chen, Jing

    Effective access control security design is an important precondition for the stable running of an information system. So it's necessary to establish a well-designed security mechanism to ensure the security of the system. This paper analysis and compares the main access control theories.

  7. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  8. A Quality of Context-Aware Approach to Access Control in Pervasive Environments

    NASA Astrophysics Data System (ADS)

    Toninelli, Alessandra; Corradi, Antonio; Montanari, Rebecca

    The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users to share resources anywhere and anytime, but makes access control a crucial issue. User/device mobility and heterogeneity, together with network topology and conditions variability, complicate access control and call for novel solutions to dynamically adapt access decisions to the different operating conditions. Several research efforts have emerged in recent years that propose to exploit context-awareness to control access to resources based on context visibility and changes. Context-based access control requires, however, to take into account the quality of context information used to drive access decisions (QoC). Quality of context has in fact a profound impact on the correct behavior of any context-aware access control framework. Using context information with insufficient quality might increase the risk of incorrect access control decisions, thus leading to dangerous security breaches in resource sharing. In this paper we propose a QoC-aware approach to access control for anywhere, anytime resource sharing. The paper describes the design, implementation and evaluation of the Proteus policy framework, which combines two design guidelines to enable dynamic adaptation of policies depending on context changes: context-awareness with QoC guarantees and semantic technologies to allow high-level description of context/policy specification and reasoning about context/policies.

  9. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... Exchange Commission 17 CFR Part 240 Risk Management Controls for Brokers or Dealers With Market Access... Regulations#0;#0; ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls.... The required financial risk management controls and supervisory procedures must be reasonably...

  10. Healthcare professionals' experiences with EHR-system access control mechanisms.

    PubMed

    Faxvaag, Arild; Johansen, Trond S; Heimly, Vigdis; Melby, Line; Grimsmo, Anders

    2011-01-01

    Access control mechanisms might influence on the information seeking and documentation behavior of clinicians. In this study, we have surveyed healthcare professionals in nursing homes and hospitals on their attitudes to, and experiences with using access control mechanisms. In some situations, the access control mechanisms of the EHR system made clinicians postpone documentation work. Their practice of reading what others have documented was also influenced. Not all clinicians logged out of the system when they left a workstation, and some clinicians reported to do some of their documentation work in the name of others. The reported practices might have implications for the safety of the patient.

  11. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  12. Role-based access control model for GIS

    NASA Astrophysics Data System (ADS)

    Pan, Yuqing; Sheng, Yehua; Zhou, Jieyu

    2007-06-01

    Access control of Geographical Information System (GIS) has more complex spatial constraints than the general MIS system, it makes the classic role-based access control model(RBAC) can't be used in GIS. To achieve an effective Access Control Model for GIS, an extension model of the RBAC is presented in the paper. Firstly, this paper introduce the three kinds spatial constraints that included layer constraints, region constraints and spatial object constraints; Then the paper expanded the basic RBAC model, added regional class, layers class and so on; Finally, the paper has given the system RABC control model as well as the realization method in view of GIS. An extension model of the RBAC is applicable to mobile computing, wireless access and system about location is concluded by analyzing.

  13. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  14. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  15. Wdr68 requires nuclear access for craniofacial development.

    PubMed

    Wang, Bingyan; Doan, Diana; Roman Petersen, Yanett; Alvarado, Estibaliz; Alvarado, Gregory; Bhandari, Ajay; Mohanty, Aditya; Mohanty, Sudipta; Nissen, Robert M

    2013-01-01

    Wdr68 is a highly conserved scaffolding protein required for craniofacial development and left-right asymmetry. A Ras-Map3k-Wdr68-Dyrk1 signaling relay may mediate these and other diverse signaling events important in development and disease. While the sub-cellular localization of Wdr68 has been shown to be dependent on that of its interaction partners, it is not clear where Wdr68 activity is required during development. Here we show that while a GFP-Wdr68 fusion functionally substituted for craniofacial development in the zebrafish, that a Nuclear Export Signal (NES) fusion protein (GFPNESWdr68) failed to support craniofacial development. As control for NES activity, we show that while GFP-Wdr68 exhibited a pan-cellular distribution in C2C12 cells, the GFPNESWdr68 fusion predominantly localized to the cell cytoplasm, as expected. Interestingly, while GFP-Wdr68 and RFP-Dyrk1a co-localized to the cell nucleus as expected based on the known sub-cellular localization for Dyrk1a, we found that the GFPNESWdr68 fusion redistributed RFP-Dyrk1a to the cell cytoplasm potentially disconnecting the Ras/Dyrk1 signal relay from further downstream targets. Consistent with a nuclear role in gene regulation, we also found that while a transcriptional activation domain fusion, CebpFlagWdr68, functionally substituted for endogenous Wdr68 for craniofacial development, that a transcriptional repression domain fusion, MadFlagWdr68, failed to support craniofacial development. Dyrk1b is required for myogenin (myog) expression in differentiating mouse C2C12 cells and here we report that wdr68 is also important for myog expression in differentiating C2C12 cells. Using a C2C12 cell myog promoter-reporter system, we found that Wdr68 overexpression increased reporter activity while moderate expression levels of MadFlagWdr68 interfered with reporter activity. Taken together, these findings support a nuclear role for Wdr68-containing complexes. PMID:23349862

  16. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility...

  17. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility...

  18. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility...

  19. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility...

  20. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility...

  1. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  2. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  3. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  4. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  5. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Security requirements for access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Within Industry 3004.470 Security requirements for access to unclassified facilities,...

  6. 45 CFR 2543.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Retention and access requirements for records. 2543.53 Section 2543.53 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION... retention or access requirements upon recipients. (b) Financial records, supporting documents,...

  7. 45 CFR 2543.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 4 2014-10-01 2014-10-01 false Retention and access requirements for records. 2543.53 Section 2543.53 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION... retention or access requirements upon recipients. (b) Financial records, supporting documents,...

  8. 45 CFR 2543.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 4 2013-10-01 2013-10-01 false Retention and access requirements for records. 2543.53 Section 2543.53 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION... retention or access requirements upon recipients. (b) Financial records, supporting documents,...

  9. 45 CFR 2543.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 4 2011-10-01 2011-10-01 false Retention and access requirements for records. 2543.53 Section 2543.53 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION... retention or access requirements upon recipients. (b) Financial records, supporting documents,...

  10. 20 CFR 435.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Retention and access requirements for records... ORGANIZATIONS, AND COMMERCIAL ORGANIZATIONS Post-Award Requirements Reports and Records § 435.53 Retention and... retention and access to records for awards to recipients. SSA may not impose any other record retention...

  11. 24 CFR 16.4 - Requests for access; requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... required to present satisfactory proof of identity. The means of proof, in the order of preference and... credit card and professional, craft or union membership card); and (iii) A document bearing neither the... can provide no suitable documentation of identity, the Department will require a signed...

  12. 24 CFR 16.4 - Requests for access; requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... required to present satisfactory proof of identity. The means of proof, in the order of preference and... credit card and professional, craft or union membership card); and (iii) A document bearing neither the... can provide no suitable documentation of identity, the Department will require a signed...

  13. 24 CFR 16.4 - Requests for access; requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... record pertains shall establish his or her personal identity in the same manner prescribed in either... required to present satisfactory proof of identity. The means of proof, in the order of preference and... can provide no suitable documentation of identity, the Department will require a signed...

  14. 24 CFR 16.4 - Requests for access; requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... record pertains shall establish his or her personal identity in the same manner prescribed in either... required to present satisfactory proof of identity. The means of proof, in the order of preference and... can provide no suitable documentation of identity, the Department will require a signed...

  15. 40 CFR 65.42 - Control requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    .... (ii) For owners or operators referenced to this part from 40 CFR part 63, subpart G, and if the owner... 40 Protection of Environment 16 2014-07-01 2014-07-01 false Control requirements. 65.42 Section 65...) CONSOLIDATED FEDERAL AIR RULE Storage Vessels § 65.42 Control requirements. (a) For each storage vessel...

  16. 40 CFR 65.42 - Control requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the following conditions: (i) The liquid level in the storage vessel is not increased; (ii) The... 40 Protection of Environment 16 2013-07-01 2013-07-01 false Control requirements. 65.42 Section 65...) CONSOLIDATED FEDERAL AIR RULE Storage Vessels § 65.42 Control requirements. (a) For each storage vessel...

  17. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  18. Secondary retention of rubber dam: effective moisture control access considerations.

    PubMed

    Liebenberg, W H

    1995-04-01

    Primary rubber dam retention affects attachment of the latex sheet to the anchor teeth bordering the isolated working field. Secondary rubber dam retention is the provision of an effective seal at the dam-tooth junction, which is essential to the maintenance of adequate access and moisture control within the working field. Practical hints are offered to optimize access and moisture control through well-planned and properly executed secondary retention of classic rubber dam applications. In addition, innovative solutions to the limitations of general field isolation, which pertain mostly to secondary retention of the unrestrained buccal and lingual curtains of the slit dam, are introduced.

  19. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  20. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  1. Controlling user access to electronic resources without password

    SciTech Connect

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  2. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  3. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection. PMID:26262204

  4. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  5. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  6. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  7. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  8. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  9. Technical requirements of spirometers in the strategy for guaranteeing the access to quality spirometry.

    PubMed

    Salas, Tomàs; Rubies, Carles; Gallego, Carlos; Muñoz, Pilar; Burgos, Felip; Escarrabill, Joan

    2011-09-01

    Access to quality spirometry is an essential objective in order to be able to minimize the underdiagnosis of respiratory diseases, especially in those that are most frequent, such as COPD and asthma. This objective can be reached in the short term, but it requires the simultaneous integration of different strategies: training of the health-care professionals who perform spirometry, definition of standards for the transmission of the information, technical requirements for acquiring apparatuses and the correct interpretation of the results. This present study shows the use of standards for the electronic exchange of clinical information. In order to normalize the treatment of the data related with spirometry and to enable the exchange of information, we have used the standard CDA R2 (Clinical Document Architecture, Release 2) of HL7 (Health Level Seven), version 3. HL7 is a product by HL7 International, a non-profit organization that deals in the production of standards in the health-care setting in order to facilitate interoperability. Furthermore, defining these standards is essential for ensuring that they are adopted by spirometer manufacturers. Be means of this process, the base is set for facilitating access to spirometry at the health-care level, while at the same time it is a fundamental technical element for designing quality control programs of the explorations.

  10. Technical requirements of spirometers in the strategy for guaranteeing the access to quality spirometry.

    PubMed

    Salas, Tomàs; Rubies, Carles; Gallego, Carlos; Muñoz, Pilar; Burgos, Felip; Escarrabill, Joan

    2011-09-01

    Access to quality spirometry is an essential objective in order to be able to minimize the underdiagnosis of respiratory diseases, especially in those that are most frequent, such as COPD and asthma. This objective can be reached in the short term, but it requires the simultaneous integration of different strategies: training of the health-care professionals who perform spirometry, definition of standards for the transmission of the information, technical requirements for acquiring apparatuses and the correct interpretation of the results. This present study shows the use of standards for the electronic exchange of clinical information. In order to normalize the treatment of the data related with spirometry and to enable the exchange of information, we have used the standard CDA R2 (Clinical Document Architecture, Release 2) of HL7 (Health Level Seven), version 3. HL7 is a product by HL7 International, a non-profit organization that deals in the production of standards in the health-care setting in order to facilitate interoperability. Furthermore, defining these standards is essential for ensuring that they are adopted by spirometer manufacturers. Be means of this process, the base is set for facilitating access to spirometry at the health-care level, while at the same time it is a fundamental technical element for designing quality control programs of the explorations. PMID:21821333

  11. 50 CFR 660.316 - Open access fishery-observer requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 11 2011-10-01 2011-10-01 false Open access fishery-observer requirements. 660.316 Section 660.316 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES West Coast Groundfish-Open Access Fisheries...

  12. 50 CFR 660.316 - Open access fishery-observer requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-observer requirements. 660.316 Section 660.316 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES West Coast Groundfish-Open Access Fisheries §...

  13. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  14. 20 CFR 437.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records, Retention, and Enforcement § 437.42 Retention and access requirements for records. (a... last expenditure report for that period. However, if grant support is continued or renewed...

  15. 49 CFR 18.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records, Retention, and Enforcement § 18.42 Retention and access requirements for records. (a... the grantee or subgrantee submits to the awarding agency its single or last expenditure report...

  16. 34 CFR 80.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records Retention, and Enforcement § 80.42 Retention and access requirements for records. (a... its single or last expenditure report for that period. However, if grant support is continued...

  17. 20 CFR 437.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records, Retention, and Enforcement § 437.42 Retention and access requirements for records. (a... last expenditure report for that period. However, if grant support is continued or renewed...

  18. 20 CFR 437.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records, Retention, and Enforcement § 437.42 Retention and access requirements for records. (a... last expenditure report for that period. However, if grant support is continued or renewed...

  19. 20 CFR 437.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records, Retention, and Enforcement § 437.42 Retention and access requirements for records. (a... last expenditure report for that period. However, if grant support is continued or renewed...

  20. 20 CFR 437.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records, Retention, and Enforcement § 437.42 Retention and access requirements for records. (a... last expenditure report for that period. However, if grant support is continued or renewed...

  1. 22 CFR 135.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records, Retention, and Enforcement § 135.42 Retention and access requirements for records. (a... the grantee or subgrantee submits to the awarding agency its single or last expenditure report...

  2. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  3. TRACER - TRACING AND CONTROL OF ENGINEERING REQUIREMENTS

    NASA Technical Reports Server (NTRS)

    Turner, P. R.

    1994-01-01

    TRACER (Tracing and Control of Engineering Requirements) is a database/word processing system created to document and maintain the order of both requirements and descriptive material associated with an engineering project. A set of hierarchical documents are normally generated for a project whereby the requirements of the higher level documents levy requirements on the same level or lower level documents. Traditionally, the requirements are handled almost entirely by manual paper methods. The problem with a typical paper system, however, is that requirements written and changed continuously in different areas lead to misunderstandings and noncompliance. The purpose of TRACER is to automate the capture, tracing, reviewing, and managing of requirements for an engineering project. The engineering project still requires communications, negotiations, interactions, and iterations among people and organizations, but TRACER promotes succinct and precise identification and treatment of real requirements separate from the descriptive prose in a document. TRACER permits the documentation of an engineering project's requirements and progress in a logical, controllable, traceable manner. TRACER's attributes include the presentation of current requirements and status from any linked computer terminal and the ability to differentiate headers and descriptive material from the requirements. Related requirements can be linked and traced. The program also enables portions of documents to be printed, individual approval and release of requirements, and the tracing of requirements down into the equipment specification. Requirement "links" can be made "pending" and invisible to others until the pending link is made "binding". Individuals affected by linked requirements can be notified of significant changes with acknowledgement of the changes required. An unlimited number of documents can be created for a project and an ASCII import feature permits existing documents to be incorporated

  4. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    PubMed

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care.

  5. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  6. Frequency Control Performance Measurement and Requirements

    SciTech Connect

    Illian, Howard F.

    2010-12-20

    Frequency control is an essential requirement of reliable electric power system operations. Determination of frequency control depends on frequency measurement and the practices based on these measurements that dictate acceptable frequency management. This report chronicles the evolution of these measurements and practices. As technology progresses from analog to digital for calculation, communication, and control, the technical basis for frequency control measurement and practices to determine acceptable performance continues to improve. Before the introduction of digital computing, practices were determined largely by prior experience. In anticipation of mandatory reliability rules, practices evolved from a focus primarily on commercial and equity issues to an increased focus on reliability. This evolution is expected to continue and place increased requirements for more precise measurements and a stronger scientific basis for future frequency management practices in support of reliability.

  7. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  8. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  9. 32 CFR 154.18 - Certain positions not necessarily requiring access to classified information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative Requirements § 154.18 Certain positions not necessarily requiring access to... under the Internal Security Act of 1950 to issue orders and regulations for the protection of...

  10. 2 CFR 215.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Retention and access requirements for records. 215.53 Section 215.53 Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET CIRCULARS AND GUIDANCE Reserved UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, AND OTHER...

  11. 45 CFR 1157.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Retention and access requirements for records. 1157.42 Section 1157.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS...

  12. 45 CFR 1174.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Retention and access requirements for records. 1174.42 Section 1174.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE HUMANITIES UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE...

  13. 28 CFR 70.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Retention and access requirements for records. 70.53 Section 70.53 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS (INCLUDING SUBAWARDS) WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS AND OTHER...

  14. 7 CFR 550.55 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... section sets forth requirements for record retention and access to records for awards to Cooperators. REE... date of the submission of the quarterly or annual financial report, as authorized by the REE Agency... transferred to or maintained by the REE Agency, the 3-year retention requirement is not applicable to...

  15. 29 CFR 1470.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records Retention, and Enforcement § 1470.42 Retention and access... the grantee or subgrantee submits to the awarding agency its single or last expenditure report...

  16. 29 CFR 1470.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS Post-Award Requirements Reports, Records Retention, and Enforcement § 1470.42 Retention and access... the grantee or subgrantee submits to the awarding agency its single or last expenditure report...

  17. 14 CFR 382.57 - What accessibility requirements apply to automated airport kiosks?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... Department of Justice's 2010 ADA Standards for Accessible Design, 28 CFR 35.104 (defining the “2010 Standards” for title II as the requirements set forth in appendices B and D to 36 CFR part 1191 and the requirements contained in 28 CFR 35.151) (hereinafter 2010 ADA Standards) must be provided. (3) Operable...

  18. 14 CFR 1273.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Retention and access requirements for records. 1273.42 Section 1273.42 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION...) Required to be maintained by the terms of this part, program regulations or the grant agreement, or...

  19. 45 CFR 1174.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Retention and access requirements for records. 1174.42 Section 1174.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  20. 45 CFR 1157.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Retention and access requirements for records. 1157.42 Section 1157.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  1. 45 CFR 1157.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Retention and access requirements for records. 1157.42 Section 1157.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  2. 45 CFR 1183.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Retention and access requirements for records. 1183.42 Section 1183.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  3. 45 CFR 1174.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Retention and access requirements for records. 1174.42 Section 1174.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  4. 45 CFR 1183.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Retention and access requirements for records. 1183.42 Section 1183.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  5. 45 CFR 1183.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Retention and access requirements for records. 1183.42 Section 1183.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  6. 45 CFR 1174.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Retention and access requirements for records. 1174.42 Section 1174.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  7. 45 CFR 1157.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Retention and access requirements for records. 1157.42 Section 1157.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL..., statistical records, and other records of grantees or subgrantees which are: (i) Required to be maintained...

  8. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  9. Global Access-controlled Transfer e-frame (GATe)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, asmore » well as provides reporting capabilities.« less

  10. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  11. 40 CFR 65.42 - Control requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... (ii) For owners or operators referenced to this part from 40 CFR part 63, subpart G, and if the owner... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Control requirements. 65.42 Section 65.42 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS...

  12. Control Requirements to Support Manual Piloting Capability

    NASA Technical Reports Server (NTRS)

    Merancy, Nujoud; Chevray, Kay; Gonzalez, Rodolfo; Madsen, Jennifer; Spehar, Pete

    2013-01-01

    The manual piloting requirements specified under the NASA Constellation Program involved Cooper-Harper ratings, which are a qualitative and subjective evaluation from experienced pilots. This type of verification entails a significant investment of resources to assess a completed design and is not one that can easily or meaningfully be applied upfront in the design phase. The evolution of the Multi-Purpose Crew Vehicle Program to include an independently developed propulsion system from an international partner makes application of Cooper-Harper based design requirements inadequate. To mitigate this issue, a novel solution was developed to reformulate the necessary piloting capability into quantifiable requirements. A trio of requirements was designed which specify control authority, precision, and impulse residuals enabling propulsion design within specified guidance and control boundaries. These requirements have been evaluated against both the existing Orion design and the proposed ESA design and have been found to achieve the desired specificity. The requirement set is capable of being applied to the development of other spacecraft in support of manual piloting.

  13. Piezoelectric Power Requirements for Active Vibration Control

    NASA Technical Reports Server (NTRS)

    Brennan, Matthew C.; McGowan, Anna-Maria Rivas

    1997-01-01

    This paper presents a method for predicting the power consumption of piezoelectric actuators utilized for active vibration control. Analytical developments and experimental tests show that the maximum power required to control a structure using surface-bonded piezoelectric actuators is independent of the dynamics between the piezoelectric actuator and the host structure. The results demonstrate that for a perfectly-controlled system, the power consumption is a function of the quantity and type of piezoelectric actuators and the voltage and frequency of the control law output signal. Furthermore, as control effectiveness decreases, the power consumption of the piezoelectric actuators decreases. In addition, experimental results revealed a non-linear behavior in the material properties of piezoelectric actuators. The material non- linearity displayed a significant increase in capacitance with an increase in excitation voltage. Tests show that if the non-linearity of the capacitance was accounted for, a conservative estimate of the power can easily be determined.

  14. A study of multiple access schemes in satellite control network

    NASA Astrophysics Data System (ADS)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  15. Access Control of Cloud Service Based on UCON

    NASA Astrophysics Data System (ADS)

    Danwei, Chen; Xiuli, Huang; Xunyi, Ren

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. This paper introduces cloud computing and cloud service firstly, and then gives cloud services access control model based on UCON and negotiation technologies, and also designs the negotiation module.

  16. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  17. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  18. Extending a Role Graph for Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Asakura, Yoshiharu; Nakamoto, Yukikazu

    Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a hierarchical structure. A role graph is a model that represents role hierarchies and is suitable for the runtime phase of RBAC deployment. Since a role graph cannot take various forms for given roles and cannot handle abstraction of roles well, however, it is not suitable for the design phase of RBAC deployment. Hence, an extended role graph, which can take a more flexible form than that of a role graph, is proposed. The extended role graph improves diversity and clarifies abstraction of roles, making it suitable for the design phase. An equivalent transformation algorithm (ETA), for transforming an extended role graph into an equivalent role graph, is also proposed. Using the ETA, system administrators can deploy efficiently RBAC by using an extended role graph in the design phase and a standard role graph in the runtime phase.

  19. Electric airplane environmental control systems energy requirements

    SciTech Connect

    Buss, L.B.

    1984-05-01

    The electric airplane environmental control system (ECS) design drivers is discussed for an electric airplane from two aspects. The first aspect considered is the type of aircraft. The three examples selected are the 150-passenger commercial airline transport, the military on-station electronic-surveillance patrol aircraft, and the air-defense interceptor fighter. These vehicle examples illustrate the effect of both mission and mission profile on the design requirements of the ECS and the differences that the requirements make on the resulting advantages and disadvantages of electrification. For the commercial transport, the selection of the air source for ventilation will be featured. For the patrol aircraft, the cooling unit will be evaluated. For the fighter, emphasis will be placed on the need for systems integration. The second and more important consideration is the definition of the environmental control system requirements for both energy supply and heat sink thermal management integration from the power plant (engine) that make an electric ECS viable for each type of vehicle.

  20. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  1. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  2. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  3. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  4. 77 FR 75404 - Accessible Emergency Information, and Apparatus Requirements for Emergency Information and Video...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-20

    ... COMMISSION 47 CFR Part 79 Accessible Emergency Information, and Apparatus Requirements for Emergency... November 28, 2012 (77 FR 70970) is extended. Submit reply comments on or before January 7, 2013. ADDRESSES... extends the reply comment filing deadline established in the NPRM published under FCC No. 12-142 at 77...

  5. 78 FR 23684 - Personnel Access Authorization Requirements for Nuclear Power Plants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-22

    ... behalf of the Nuclear Energy Institute (NEI or the petitioner) on January 25, 2013. The petition was...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 73 Personnel Access Authorization Requirements for Nuclear Power Plants AGENCY: Nuclear Regulatory Commission. ACTION: Petition for rulemaking; notice of receipt...

  6. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation....

  7. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation....

  8. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation....

  9. 49 CFR 399.207 - Truck and truck-tractor access requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Vehicles § 399.207 Truck and truck-tractor access requirements. (a) General rule. Any person entering or... equipped on each side of the vehicle where a seat is located, with a sufficient number of steps and... vehicle at unladen weight. (2) Distance between steps. The distance between steps, up to and including...

  10. 49 CFR 399.207 - Truck and truck-tractor access requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Vehicles § 399.207 Truck and truck-tractor access requirements. (a) General rule. Any person entering or... equipped on each side of the vehicle where a seat is located, with a sufficient number of steps and... vehicle at unladen weight. (2) Distance between steps. The distance between steps, up to and including...

  11. 38 CFR 43.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Retention and access requirements for records. 43.42 Section 43.42 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS... support is continued or renewed at annual or other intervals, the retention period for the records of...

  12. 38 CFR 49.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Retention and access requirements for records. 49.53 Section 49.53 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS... that are renewed quarterly or annually, from the date of the submission of the quarterly or...

  13. 14 CFR 1260.153 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Retention and access requirements for records. 1260.153 Section 1260.153 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... Agreements With Institutions of Higher Education, Hospitals, and Other Non-Profit Organizations Reports...

  14. 14 CFR § 1260.153 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Retention and access requirements for records. § 1260.153 Section § 1260.153 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE... Agreements With Institutions of Higher Education, Hospitals, and Other Non-Profit Organizations Reports...

  15. 14 CFR 1260.153 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Retention and access requirements for records. 1260.153 Section 1260.153 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... Agreements With Institutions of Higher Education, Hospitals, and Other Non-Profit Organizations Reports...

  16. 14 CFR 1260.153 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Retention and access requirements for records. 1260.153 Section 1260.153 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... Agreements With Institutions of Higher Education, Hospitals, and Other Non-Profit Organizations Reports...

  17. 14 CFR 1260.153 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Retention and access requirements for records. 1260.153 Section 1260.153 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... Agreements With Institutions of Higher Education, Hospitals, and Other Non-Profit Organizations Reports...

  18. 43 CFR 12.953 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Retention and access requirements for records. 12.953 Section 12.953 Public Lands: Interior Office of the Secretary of the Interior... of costs is chargeable (such as computer usage chargeback rates or composite fringe benefit...

  19. 43 CFR 12.953 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Retention and access requirements for records. 12.953 Section 12.953 Public Lands: Interior Office of the Secretary of the Interior... of costs is chargeable (such as computer usage chargeback rates or composite fringe benefit...

  20. 7 CFR 550.55 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... submission of the final expenditure report or, for awards that are renewed quarterly or annually, from the date of the submission of the quarterly or annual financial report, as authorized by the REE Agency... Management of Agreements Reports and Records § 550.55 Retention and access requirements for records. (a)...

  1. 14 CFR 382.63 - What are the requirements for accessible lavatories?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false What are the requirements for accessible lavatories? 382.63 Section 382.63 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) SPECIAL REGULATIONS NONDISCRIMINATION ON THE BASIS OF DISABILITY IN AIR...

  2. 14 CFR 382.63 - What are the requirements for accessible lavatories?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false What are the requirements for accessible lavatories? 382.63 Section 382.63 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) SPECIAL REGULATIONS NONDISCRIMINATION ON THE BASIS OF DISABILITY IN AIR...

  3. 14 CFR 382.63 - What are the requirements for accessible lavatories?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false What are the requirements for accessible lavatories? 382.63 Section 382.63 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) SPECIAL REGULATIONS NONDISCRIMINATION ON THE BASIS OF DISABILITY IN AIR...

  4. 45 CFR 92.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GOVERNMENTS Post-Award Requirements Reports, Records Retention, and Enforcement § 92.42 Retention and access... the grantee or subgrantee submits to the awarding agency its single or last expenditure report for... year's records starts on the day the grantee submits its expenditure report for the last quarter of...

  5. 45 CFR 92.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... GOVERNMENTS Post-Award Requirements Reports, Records Retention, and Enforcement § 92.42 Retention and access... the grantee or subgrantee submits to the awarding agency its single or last expenditure report for... year's records starts on the day the grantee submits its expenditure report for the last quarter of...

  6. 14 CFR 1273.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Retention and access requirements for records. 1273.42 Section 1273.42 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... annual or other intervals, the retention period for the records of each funding period starts on the...

  7. 14 CFR § 1273.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Retention and access requirements for records. § 1273.42 Section § 1273.42 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... annual or other intervals, the retention period for the records of each funding period starts on the...

  8. 32 CFR 2102.13 - Requirements for access to a record.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requirements for access to a record. 2102.13 Section 2102.13 National Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL... identity will be determined under the same procedures used in requests for learning of the existence of...

  9. 45 CFR 74.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Retention and access requirements for records. 74.53 Section 74.53 Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION... documents, statistical records, and all other records pertinent to an award shall be retained for a...

  10. 45 CFR 74.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Retention and access requirements for records. 74.53 Section 74.53 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION... documents, statistical records, and all other records pertinent to an award shall be retained for a...

  11. 45 CFR 74.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Retention and access requirements for records. 74.53 Section 74.53 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION... documents, statistical records, and all other records pertinent to an award shall be retained for a...

  12. 45 CFR 92.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Retention and access requirements for records. 92.42 Section 92.42 Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION..., supporting documents, statistical records, and other records of grantees or subgrantees which are:...

  13. 45 CFR 74.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Retention and access requirements for records. 74.53 Section 74.53 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION... documents, statistical records, and all other records pertinent to an award shall be retained for a...

  14. 45 CFR 74.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Retention and access requirements for records. 74.53 Section 74.53 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION... documents, statistical records, and all other records pertinent to an award shall be retained for a...

  15. 45 CFR 92.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Retention and access requirements for records. 92.42 Section 92.42 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION..., supporting documents, statistical records, and other records of grantees or subgrantees which are:...

  16. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the requirements specified in paragraph (g) of this section. (1) VMS. Each vessel participating in the Sea Scallop Access Area Program must have installed on board an operational VMS unit that meets the...) Reporting. The owner or operator must submit reports through the VMS, as specified in § 648.10(f)(4)(i)....

  17. 29 CFR 1470.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Retention and access requirements for records. 1470.42 Section 1470.42 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation....

  18. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation....

  19. 45 CFR 602.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Retention and access requirements for records. 602.42 Section 602.42 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE... computer usage chargeback rates or composite fringe benefit rates). (i) If submitted for negotiation....

  20. Distributed joint power and access control algorithm for secondary spectrum sharing

    NASA Astrophysics Data System (ADS)

    Li, Hongyan; Chen, Enqing; Fu, Hongliang

    2010-08-01

    Based on interference temperature model, the problem of efficient secondary spectrum sharing is formulated as a power optimization problem with some constraints at physical layer. These constraints and optimization objective limit a feasible power vector set which leads to the need of access control besides power control. In this paper, we consider the decentralized cognitive radio network scenario where short-term data service is required, and the problem of distributed joint power and access control is studied to maximize the total secondary system throughput, subject to Quality of Service (QoS) constraints from individual secondary users and interference temperature limit (ITL) from primary system. Firstly, a pricing-based game model was used to solve distributed power allocation optimization problem in both high and low signal to interference noise ratio (SINR) scenarios. Secondly, when not all the secondary links can be supported with their QoS requirement and ITL, a distributed joint power and access control algorithm was introduced to find the allowable links which results in maximum network throughput with all the constraints satisfied, and the convergence performance is tested by simulations.

  1. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal...

  2. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  3. Architectures & requirements for advanced weapon controllers.

    SciTech Connect

    McMurtrey, Brian J.; Klarer, Paul Richard; Bryan, Jon R.

    2004-02-01

    This report describes work done in FY2003 under Advanced and Exploratory Studies funding for Advanced Weapons Controllers. The contemporary requirements and envisioned missions for nuclear weapons are changing from the class of missions originally envisioned during development of the current stockpile. Technology available today in electronics, computing, and software provides capabilities not practical or even possible 20 years ago. This exploratory work looks at how Weapon Electrical Systems can be improved to accommodate new missions and new technologies while maintaining or improving existing standards in nuclear safety and reliability.

  4. BIOPACK: the ground controlled late access biological research facility.

    PubMed

    van Loon, Jack J W A

    2004-03-01

    Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.

  5. Controlled Access under Review: Improving the Governance of Genomic Data Access

    PubMed Central

    Shabani, Mahsa; Dyke, Stephanie O. M.; Joly, Yann; Borry, Pascal

    2015-01-01

    In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficient, and responsible access to datasets. We particularly highlight the fact that the access review process could be adversely influenced by the potential conflicts of interest of data producers, particularly when they are directly involved in DACs management. Therefore, in structuring DACs and access procedures, possible data withholding by data producers should receive thorough attention. PMID:26720729

  6. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  7. Safety systems and access control in the National Ignition Facility.

    PubMed

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  8. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  9. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  10. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  11. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a...

  12. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a...

  13. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a...

  14. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a...

  15. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a...

  16. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  17. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  18. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  19. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  20. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  1. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  2. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  3. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  4. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  5. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  6. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  7. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  8. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  9. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  10. [Colonoscopy quality control as a requirement of colorectal cancer screening].

    PubMed

    Quintero, Enrique; Alarcón-Fernández, Onofre; Jover, Rodrigo

    2013-11-01

    The strategies used in population-based colorectal screening strategies culminate in colonoscopy and consequently the success of these programs largely depends on the quality of this diagnostic test. The main factors to consider when evaluating quality are scientific-technical quality, safety, patient satisfaction, and accessibility. Quality indicators allow variability among hospitals, endoscopy units and endoscopists to be determined and can identify those not achieving recommended standards. In Spain, the working group for colonoscopy quality of the Spanish Society of Gastroenterology and the Spanish Society of Gastrointestinal Endoscopy have recently drawn up a Clinical Practice Guideline that contains the available evidence on the quality of screening colonoscopy, as well as the basic requirements that must be met by endoscopy units and endoscopists carrying out this procedure. The implementation of training programs and screening colonoscopy quality controls are strongly recommended to guarantee the success of population-based colorectal cancer screening.

  11. 46 CFR 63.20-1 - Specific control system requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 2 2014-10-01 2014-10-01 false Specific control system requirements. 63.20-1 Section 63.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC AUXILIARY BOILERS Additional Control System Requirements § 63.20-1 Specific control system requirements. In addition to the requirements found...

  12. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  13. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  14. Privacy-aware access control for video data in intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Vagts, Hauke; Jakoby, Andreas

    2012-06-01

    Surveillance systems became powerful. Objects can be identified and intelligent surveillance services can generate events when a specific situation occurs. Such surveillance services can be organized in a Service Oriented Architecture (SOA) to fulfill surveillance tasks for specific purposes. Therefore the services process information on a high level, e.g., just the position of an object. Video data is still required to visualize a situation to an operator and is required as evidence in court. Processing of personal related and sensitive information threatens privacy. To protect the user and to be compliant with legal requirements it must be ensured that sensitive information can only be processed for a defined propose by specific users or services. This work proposes an architecture for Access Control that enforces the separation of data between different surveillance tasks. Access controls are enforced at different levels: for the users starting the tasks, for the services within the tasks processing data stored in central store or calculated by other services and for sensor related services that extract information out of the raw data and provide them.

  15. An Extended Role-Based Access Control Model for Delegating Obligations

    NASA Astrophysics Data System (ADS)

    Ben-Ghorbel-Talbi, Meriam; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Bouhoula, Adel

    The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the administration and delegation of obligations. Managing such delegations implies more requirements than managing traditional privileges delegation. In fact, delegating obligations may include two interpretations: the delegation of the obligation and the delegation of the responsibility related to this obligation. Therefore, it is important to deal with these two notions separately. Moreover, since delegating an obligation involves the delegation of sanctions, then the consent of the user who receives this delegation may be required in some cases. We address in this paper these requirements and we propose a formalism to deal with them.

  16. Wireless Access Control with Smart Antenna for M2M Communications

    NASA Astrophysics Data System (ADS)

    Sakamoto, Hiroshi; Bandai, Masaki; Watanabe, Takashi

    Machine to machine (M2M) is a promising technology to achieve an ubiquitous environment by uniting machines and machines over the Internet. The network used for M2M consists of core network and access network. This paper discusses effective controls of the wireless access network for M2M. Among typical examples of the wireless access network for M2M is a wireless sensor network (WSN). WSN for M2M may require energy efficiency, high reliability and throughput. For these requirements, in this paper, we propose a scheme to build a hierarchical sensor network using smart antenna. The proposed scheme uses omni-directional antennas together with smart antennas. Since smart antennas can extend communications distance, the proposed scheme enables reduction of number of hops to reduce the traffic load on relay nodes. As a result, the energy consumption, data collection ratio and throughput can be improved. We implement the proposed scheme on a real testbed. The testbed uses UNAGI as smart antenna nodes and Mica Mote as sensor nodes. In addition to the fundamental evaluation on the testbed, we simulate large-scale sensor networks. The results show the effectiveness of the proposed hierarchical sensor network with smart antennas.

  17. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  18. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  19. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  20. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  1. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  2. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  3. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  4. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  5. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation...

  6. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  7. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  8. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas....

  9. Generalized access control strategies for integrated services token passing systems

    NASA Astrophysics Data System (ADS)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  10. Handling qualities requirements for control configured vehicles

    NASA Technical Reports Server (NTRS)

    Woodcock, R. J.; George, F. L.

    1976-01-01

    The potential effects of fly by wire and control configured vehicle concepts on flying qualities are considered. Failure mode probabilities and consequences, controllability, and dynamics of highly augmented aircraft are among the factors discussed in terms of design criteria.

  11. Display/control requirements for VTOL aircraft

    NASA Technical Reports Server (NTRS)

    Hoffman, W. C.; Curry, R. E.; Kleinman, D. L.; Hollister, W. M.; Young, L. R.

    1975-01-01

    Quantative metrics were determined for system control performance, workload for control, monitoring performance, and workload for monitoring. Pilot tasks were allocated for navigation and guidance of automated commercial V/STOL aircraft in all weather conditions using an optimal control model of the human operator to determine display elements and design.

  12. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  13. An interaction-based access control model (IBAC) for collaborative services

    SciTech Connect

    Altunay, Mine; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  14. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  15. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority.

  16. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  17. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  18. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  19. 47 CFR 5.107 - Transmitter control requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Transmitter control requirements. 5.107 Section 5.107 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EXPERIMENTAL RADIO SERVICE Technical Standards and Operating Requirements § 5.107 Transmitter control requirements. Each licensee shall be responsible for maintaining control of...

  20. 47 CFR 95.651 - Crystal control required.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Crystal control required. 95.651 Section 95.651... SERVICES Technical Regulations Certification Requirements § 95.651 Crystal control required. All transmitters used in the Personal Radio Services must be crystal controlled, except an R/C station...

  1. 47 CFR 95.651 - Crystal control required.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Crystal control required. 95.651 Section 95.651... SERVICES Technical Regulations Certification Requirements § 95.651 Crystal control required. All transmitters used in the Personal Radio Services must be crystal controlled, except an R/C station...

  2. 47 CFR 95.651 - Crystal control required.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Crystal control required. 95.651 Section 95.651... SERVICES Technical Regulations Certification Requirements § 95.651 Crystal control required. All transmitters used in the Personal Radio Services must be crystal controlled, except an R/C station...

  3. 47 CFR 95.651 - Crystal control required.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Crystal control required. 95.651 Section 95.651... SERVICES Technical Regulations Certification Requirements § 95.651 Crystal control required. All transmitters used in the Personal Radio Services must be crystal controlled, except an R/C station...

  4. 47 CFR 95.651 - Crystal control required.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Crystal control required. 95.651 Section 95.651... SERVICES Technical Regulations Certification Requirements § 95.651 Crystal control required. All transmitters used in the Personal Radio Services must be crystal controlled, except an R/C station...

  5. Motor Control Research Requires Nonlinear Dynamics

    ERIC Educational Resources Information Center

    Guastello, Stephen J.

    2006-01-01

    The author comments on the original article "The Cinderella of psychology: The neglect of motor control in the science of mental life and behavior," by D. A. Rosenbaum. Rosenbaum draws attention to the study of motor control and evaluates seven possible explanations for why the topic has been relatively neglected. The point of this comment is that…

  6. Payload/orbiter contamination control requirement study

    NASA Technical Reports Server (NTRS)

    Bareiss, L. E.; Ress, E. B.

    1975-01-01

    The results of a contamination impact analysis upon the spacelab carrier and the spacelab carrier upon some of its potential payloads are presented. These results are based upon contamination computer modeling techniques developed to predict the induced environment for spacelab and to provide the basis for evaluation of the predicted environment against the current on orbit contamination control criteria as specified for payloads. Those spacelab carrier contamination sources evaluated against the stated contamination control criteria were outgassing/offgassing of the major nonmetallic thermal control coating of the spacelab carriers, spacelab core and experiment module and tunnel cabin atmosphere leakage, avionics bay vent, spacelab condensate vent, random particulate sloughing, and the return flux of the molecular content of these sources from the gas-gas interactions with the ambient orbital environment. It is indicated that the spacelab carrier can meet the intent of the contamination control criteria through incorporating known contamination control practices.

  7. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  8. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    NASA Astrophysics Data System (ADS)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  9. 17 CFR 240.17i-5 - Record creation, maintenance, and access requirements for supervised investment bank holding...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... investment bank holding company to move liquid assets across international borders when the events described... investment bank holding company to access credit or assets held at a particular institution when the events..., and access requirements for supervised investment bank holding companies. 240.17i-5 Section...

  10. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  11. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  12. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  13. 40 CFR 65.42 - Control requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... (ii) For owners or operators referenced to this part from 40 CFR part 63, subpart G, and if the owner... internal floating roof meeting the requirements of § 65.45. (4) Closed vent system and flare. Operate and maintain a closed vent system and flare as specified in § 65.142(a)(1). Periods of planned...

  14. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  15. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  16. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  17. A Passive EMI Filter Requiring Access to the Ungrounded Motor-Neutral Line

    NASA Astrophysics Data System (ADS)

    Oe, Takehiko; Akagi, Hirofumi

    The authors have already proposed a passive EMI filter that does require access to the motor-neutral point. The EMI filter has been applied to an induction motor driven by a voltage-source PWM inverter with a three-phase diode rectifier used as the front end. Experimental results have shown that the EMI filter can mitigate leakage currents flowing out of the motor and the heat sink, as well as bearing currents circulating inside the motor. This paper deals with a passive EMI filter for preventing high-frequency leakage currents from flowing through the heat sink of a voltage-source PWM inverter together with a voltage-source PWM rectifier used as the front end. Both rectifier and inverter have the same carrier frequency as 14kHz. The tested motor equipped with the motor-neutral line is an interior permanent magnet synchronous motor (IPM-SM) rated at 190V, 5.5kW, 6 poles and 1,800rpm. This paper designs, constructs and tests two types of EMI filters. These filters consist mainly of two 10-mH identical common-mode inductors that are installed on the ac sides of the rectifier and the inverter, respectively. However, the two filters are slightly different in that one accesses to the dc-link mid-point, and the other does not access to it. Experimental waveforms verify that the former is superior to the latter in eliminating the high-frequency leakage currents from both the heat sink and the motor.

  18. 40 CFR 63.771 - Control equipment requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., by review of performance test results, and by inspections. (b) Cover requirements. (1) The cover and... this section. (d) Control device requirements for sources except small glycol dehydration units. Owners and operators of small glycol dehydration units, shall comply with the control device requirements...

  19. 40 CFR 63.771 - Control equipment requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., by review of performance test results, and by inspections. (b) Cover requirements. (1) The cover and... this section. (d) Control device requirements for sources except small glycol dehydration units. Owners and operators of small glycol dehydration units, shall comply with the control device requirements...

  20. 47 CFR 5.107 - Transmitter control requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Transmitter control requirements. 5.107 Section 5.107 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EXPERIMENTAL RADIO SERVICE Technical Standards and Operating Requirements § 5.107 Transmitter control requirements. Each licensee...

  1. Model Based User's Access Requirement Analysis of E-Governance Systems

    NASA Astrophysics Data System (ADS)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  2. Experimental control requirements for life sciences

    NASA Technical Reports Server (NTRS)

    Berry, W. E.; Sharp, J. C.

    1978-01-01

    The Life Sciences dedicated Spacelab will enable scientists to test hypotheses in various disciplines. Building upon experience gained in mission simulations, orbital flight test experiments, and the first three Spacelab missions, NASA will be able to progressively develop the engineering and management capabilities necessary for the first Life Sciences Spacelab. Development of experiments for these missions will require implementation of life-support systems not previously flown in space. Plant growth chambers, animal holding facilities, aquatic specimen life-support systems, and centrifuge-mounted specimen holding units are examples of systems currently being designed and fabricated for flight.

  3. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  4. Privacy aware access controls for medical data disclosure on European healthgrids.

    PubMed

    Rahmouni, Hanene Boussi; Solomonides, Tony; Mont, Marco Casassa; Shiu, Simon

    2010-01-01

    To be processed within a healthgrid environment, medical data goes through a complete lifecycle and several stages until it is finally used for the primary reason it has been collected for. This stage is not always the final occurrence of when the data would have been manipulated. The data could rather continue to be needed for secondary purposes of legitimate or non legitimate nature. Although other privacy issues are related to the processing of patient data while it is residing on a healthgrid environment, the control of data disclosure is our primary interest. When sharing medical data between different Healthcare and biomedical research organizations in Europe, it is important that the different parties involved in the sharing handle the data in the same way indicated by the legislation of the member state where the data was originally collected as the requirements might differ from one state to another. Privacy requirements, such as patient consent, may be subject to conflicting conditions between different national frameworks as well as between different legal and ethical frameworks within a single member state. These circumstances have made the compliance management process in European healthgrid very challenging. In this paper we are presenting an approach to tackle these issues by relying on several technologies contained in the semantic web stack. Our work suggests a direct mapping from high level legislation on privacy and data protection to operational level privacy aware controls. Additionally we suggest an architecture for the enforcement of these controls on access control models adopted by healthgrids security infrastructures.

  5. 42 CFR 84.40 - Quality control plans; filing requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Quality control plans; filing requirements. 84.40 Section 84.40 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES OCCUPATIONAL... Control § 84.40 Quality control plans; filing requirements. As a part of each application for approval...

  6. 42 CFR 84.40 - Quality control plans; filing requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Quality control plans; filing requirements. 84.40 Section 84.40 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES OCCUPATIONAL... Control § 84.40 Quality control plans; filing requirements. As a part of each application for approval...

  7. 42 CFR 84.40 - Quality control plans; filing requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Quality control plans; filing requirements. 84.40 Section 84.40 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES OCCUPATIONAL... Control § 84.40 Quality control plans; filing requirements. As a part of each application for approval...

  8. 42 CFR 84.40 - Quality control plans; filing requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Quality control plans; filing requirements. 84.40 Section 84.40 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES OCCUPATIONAL... Control § 84.40 Quality control plans; filing requirements. As a part of each application for approval...

  9. 42 CFR 84.40 - Quality control plans; filing requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Quality control plans; filing requirements. 84.40 Section 84.40 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES OCCUPATIONAL... Control § 84.40 Quality control plans; filing requirements. As a part of each application for approval...

  10. 46 CFR 164.019-13 - Production quality control requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 6 2011-10-01 2011-10-01 false Production quality control requirements. 164.019-13....019-13 Production quality control requirements. (a) General. Each component manufacturer shall establish procedures for maintaining quality control of the materials used in production,...

  11. 49 CFR 236.205 - Signal control circuits; requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Signal control circuits; requirements. 236.205... Block Signal Systems Standards § 236.205 Signal control circuits; requirements. The circuits shall be so... fouling point derail equipped with switch circuit controller is not in derailing position, (d) When...

  12. 49 CFR 236.205 - Signal control circuits; requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Signal control circuits; requirements. 236.205... Block Signal Systems Standards § 236.205 Signal control circuits; requirements. The circuits shall be so... fouling point derail equipped with switch circuit controller is not in derailing position, (d) When...

  13. 49 CFR 236.205 - Signal control circuits; requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Signal control circuits; requirements. 236.205... Block Signal Systems Standards § 236.205 Signal control circuits; requirements. The circuits shall be so... fouling point derail equipped with switch circuit controller is not in derailing position, (d) When...

  14. 21 CFR 1308.46 - Control required under international treaty.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Control required under international treaty. 1308... CONTROLLED SUBSTANCES Hearings § 1308.46 Control required under international treaty. Pursuant to section 201... under international treaties, conventions, or protocols in effect on May 1, 1971, the...

  15. 21 CFR 1308.46 - Control required under international treaty.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Control required under international treaty. 1308... CONTROLLED SUBSTANCES Hearings § 1308.46 Control required under international treaty. Pursuant to section 201... under international treaties, conventions, or protocols in effect on May 1, 1971, the...

  16. 21 CFR 1308.46 - Control required under international treaty.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Control required under international treaty. 1308... CONTROLLED SUBSTANCES Hearings § 1308.46 Control required under international treaty. Pursuant to section 201... under international treaties, conventions, or protocols in effect on May 1, 1971, the...

  17. 21 CFR 1308.46 - Control required under international treaty.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Control required under international treaty. 1308... CONTROLLED SUBSTANCES Hearings § 1308.46 Control required under international treaty. Pursuant to section 201... international treaties, conventions, or protocols in effect on May 1, 1971, the Administrator shall issue...

  18. 49 CFR 236.205 - Signal control circuits; requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Signal control circuits; requirements. 236.205... Block Signal Systems Standards § 236.205 Signal control circuits; requirements. The circuits shall be so... fouling point derail equipped with switch circuit controller is not in derailing position, (d) When...

  19. 40 CFR 63.1281 - Control equipment requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... review of the records required by § 63.1284, the reports required by § 63.1285, by review of performance... requirements for sources except small glycol dehydration units. Owners and operators of small glycol dehydration units shall comply with the control requirements in paragraph (f) of this section. (1) The...

  20. 40 CFR 63.1281 - Control equipment requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... review of the records required by § 63.1284, the reports required by § 63.1285, by review of performance... requirements for sources except small glycol dehydration units. Owners and operators of small glycol dehydration units shall comply with the control requirements in paragraph (f) of this section. (1) The...

  1. Resource allocation in shared spectrum access communications for operators with diverse service requirements

    NASA Astrophysics Data System (ADS)

    Kibria, Mirza Golam; Villardi, Gabriel Porto; Ishizu, Kentaro; Kojima, Fumihide; Yano, Hiroyuki

    2016-12-01

    In this paper, we study inter-operator spectrum sharing and intra-operator resource allocation in shared spectrum access communication systems and propose efficient dynamic solutions to address both inter-operator and intra-operator resource allocation optimization problems. For inter-operator spectrum sharing, we present two competent approaches, namely the subcarrier gain-based sharing and fragmentation-based sharing, which carry out fair and flexible allocation of the available shareable spectrum among the operators subject to certain well-defined sharing rules, traffic demands, and channel propagation characteristics. The subcarrier gain-based spectrum sharing scheme has been found to be more efficient in terms of achieved throughput. However, the fragmentation-based sharing is more attractive in terms of computational complexity. For intra-operator resource allocation, we consider resource allocation problem with users' dissimilar service requirements, where the operator supports users with delay constraint and non-delay constraint service requirements, simultaneously. This optimization problem is a mixed-integer non-linear programming problem and non-convex, which is computationally very expensive, and the complexity grows exponentially with the number of integer variables. We propose less-complex and efficient suboptimal solution based on formulating exact linearization, linear approximation, and convexification techniques for the non-linear and/or non-convex objective functions and constraints. Extensive simulation performance analysis has been carried out that validates the efficiency of the proposed solution.

  2. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  3. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  4. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  5. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  6. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    PubMed Central

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  7. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  8. 47 CFR 5.107 - Transmitter control requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Transmitter control requirements. 5.107 Section 5.107 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EXPERIMENTAL RADIO SERVICE (OTHER THAN BROADCAST) Technical Standards and Operating Requirements § 5.107 Transmitter control...

  9. 47 CFR 5.107 - Transmitter control requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Transmitter control requirements. 5.107 Section 5.107 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EXPERIMENTAL RADIO SERVICE (OTHER THAN BROADCAST) Technical Standards and Operating Requirements § 5.107 Transmitter control...

  10. 47 CFR 5.107 - Transmitter control requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Transmitter control requirements. 5.107 Section 5.107 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EXPERIMENTAL RADIO SERVICE (OTHER THAN BROADCAST) Technical Standards and Operating Requirements § 5.107 Transmitter control...

  11. 40 CFR 63.771 - Control equipment requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., by review of performance test results, and by inspections. (b) Cover requirements. (1) The cover and... accordance with one of the following performance requirements: (A) Reduces the mass content of either TOC or... shall demonstrate that a control device achieves the performance requirements of paragraph (d)(1)...

  12. 40 CFR 63.771 - Control equipment requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., by review of performance test results, and by inspections. (b) Cover requirements. (1) The cover and... accordance with one of the following performance requirements: (A) Reduces the mass content of either TOC or... shall demonstrate that a control device achieves the performance requirements of paragraph (d)(1)...

  13. 40 CFR 63.771 - Control equipment requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., by review of performance test results, and by inspections. (b) Cover requirements. (1) The cover and... accordance with one of the following performance requirements: (A) Reduces the mass content of either TOC or... shall demonstrate that a control device achieves the performance requirements of paragraph (d)(1)...

  14. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  15. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... screening of people, baggage (including carry-on items), personal effects, vehicles and the vehicle's... screening of people, personal effects, and vehicles being embarked or loaded onto the vessel as...

  16. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... screening of people, baggage (including carry-on items), personal effects, vehicles and the vehicle's... screening of people, personal effects, and vehicles being embarked or loaded onto the vessel as...

  17. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... has not expired; and (iii) A visual check of the various security features present on the card to... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... operations; (8) Evacuating the vessel; (9) Moving the vessel; or (10) Preparing for a full or partial...

  18. e-VLBI Access Point (eAXP) - a centralized control and EGAE configuration / management application

    NASA Astrophysics Data System (ADS)

    Ruszczyk, Chester Whitney, Alan

    Setting up experiments to utilize Experiment Guided Adaptive Endpoint (EGAE) and e-VLBI is presently a complex and time intensive process requiring scientific, Mark5 and networking knowledge. There is no central access to point to configure and manage all of these aspects of an experiment. The e-VLBI Access Point (eAXP) is a centralized control plane management tool that offers a GUI interface to augment the command line interface presently being used to set up and conduct experiments. eAXP contains three major toolsets: one to set up and execute an experiment using real-time or non-real time modes; the second to configure and manage EGAE; and a third to view statistics of the experiments. Initially the overall system architecture for eAXP is presented, followed by details of the Experiment Profiler toolset including screen shots of the system presently being tested. This will be followed by how eAXP will support real-time modes interfacing to the Dynamic Resource Allocation over GMPLS Optical Network (DRAGON) resource management project.

  19. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  20. Fundamental problems in modern astrophysics requiring access to the ultraviolet range

    NASA Astrophysics Data System (ADS)

    Gómez de Castro, Ana I.; Lecavelier des Étangs, Alain; Reimers, Dieter

    2006-06-01

    Progress of modern astrophysics requires the access to the electromagnetic spectrum in the broadest energy range. The ultraviolet is a fundamental energy domain; warm plasmas at temperatures of 3,000-300,000 K radiate in this range, also the electronic transitions of the most abundant molecules in the Universe are in the UV. Moreover, the UV radiation field is a powerful astrochemical and photoionizing agent. Some of the most relevant problems in modern astrophysical research are related with the properties and abundance of this warm plasma in the Universe, e.g. the chemical enrichment of the Universe, the formation of the galaxies or the contribution of the InterGalactic Medium (IGM) to the total mass of the Universe. Also, this plasma is the primary tracer of some very important processes for the generation of life in our planet like the onset and stabilization of the Solar dynamo or the acceleration of organic chemistry processes in young planetary disks. This contribution represents a brief accounting of the BIG science to be carried out if new UV instrumentation becomes, eventually, available.

  1. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  2. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  3. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  4. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures that... develop, test, and implement the relevant risk management controls and supervisory procedures...

  5. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  6. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  7. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  8. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  9. 14 CFR 417.303 - Command control system requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... control system requirements. (a) General. When initiated by a flight safety official, a command control... receipt of the signal by the onboard vehicle flight termination system. A command control system must... flight termination system used for each launch. (f) Electromagnetic interference. Each command...

  10. 14 CFR 417.303 - Command control system requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... control system requirements. (a) General. When initiated by a flight safety official, a command control... receipt of the signal by the onboard vehicle flight termination system. A command control system must... flight termination system used for each launch. (f) Electromagnetic interference. Each command...

  11. 14 CFR 417.303 - Command control system requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... control system requirements. (a) General. When initiated by a flight safety official, a command control... receipt of the signal by the onboard vehicle flight termination system. A command control system must... flight termination system used for each launch. (f) Electromagnetic interference. Each command...

  12. 47 CFR 97.7 - Control operation required.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE General Provisions § 97.7 Control operation required. When transmitting, each amateur station must have a control operator. The control operator must be a person: (a) For whom an amateur...

  13. 47 CFR 97.7 - Control operation required.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE General Provisions § 97.7 Control operation required. When transmitting, each amateur station must have a control operator. The control operator must be a person: (a) For whom an amateur...

  14. 47 CFR 97.7 - Control operator required.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE General Provisions § 97.7 Control operator required. When transmitting, each amateur station must have a control operator. The control operator must be a person: (a) For whom an amateur...

  15. 47 CFR 97.7 - Control operation required.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE General Provisions § 97.7 Control operation required. When transmitting, each amateur station must have a control operator. The control operator must be a person: (a) For whom an amateur...

  16. 47 CFR 97.7 - Control operation required.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE General Provisions § 97.7 Control operation required. When transmitting, each amateur station must have a control operator. The control operator must be a person: (a) For whom an amateur...

  17. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  18. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  19. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  20. 78 FR 31800 - Accessible Emergency Information, and Apparatus Requirements for Emergency Information and Video...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Communications and Video Accessibility Act of 2010, Report and Order, 76 FR 55585 (2011) (``2011 Video..., 77 FR 70970, sought comment on this issue, the record is not yet sufficiently detailed for us to... subscribers to access linear video programming that contains emergency information via tablets,...

  1. Controlling electronic access to the spin excitations of a single molecule in a tunnel junction

    NASA Astrophysics Data System (ADS)

    Hirjibehedin, Cyrus F.; Warner, Ben; El Hallak, Fadi; Prueser, Henning; Ajibade, Afolabi; Gill, Tobias G.; Fisher, Andrew J.; Persson, Mats

    Spintronic phenomena can be utilized to create new devices with applications in data storage and sensing. Scaling these down to the single molecule level requires controlling the properties of the current-carrying orbitals to enable access to spin states through phenomena such as inelastic electron tunneling. Here we show that the spintronic properties of a tunnel junction containing a single molecule can be controlled by their coupling to the local environment. For tunneling through iron phthalocyanine (FePc) on an insulating copper nitride (Cu2N) monolayer above Cu(001), we find that spin transitions may be strongly excited depending on the binding site of the central Fe atom. Different interactions between the Fe and the underlying Cu or N atoms shift the Fe d-orbitals with respect to the Fermi energy, and control the relative strength of the spin excitations, an effect that can described in a simple co-tunneling model. This work demonstrates the importance of the atomic-scale environment in the development of single molecule spintronic devices.

  2. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  3. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  4. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  5. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  6. 46 CFR 63.20-1 - Specific control system requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... emergency safety trip control operation, the air flow to the boiler must not automatically increase. For... addition to the requirements found in ASME CSD-1 (incorporated by reference; see 46 CFR 63.05-1),...

  7. Display/control requirements for automated VTOL aircraft

    NASA Technical Reports Server (NTRS)

    Hoffman, W. C.; Kleinman, D. L.; Young, L. R.

    1976-01-01

    A systematic design methodology for pilot displays in advanced commercial VTOL aircraft was developed and refined. The analyst is provided with a step-by-step procedure for conducting conceptual display/control configurations evaluations for simultaneous monitoring and control pilot tasks. The approach consists of three phases: formulation of information requirements, configuration evaluation, and system selection. Both the monitoring and control performance models are based upon the optimal control model of the human operator. Extensions to the conventional optimal control model required in the display design methodology include explicit optimization of control/monitoring attention; simultaneous monitoring and control performance predictions; and indifference threshold effects. The methodology was applied to NASA's experimental CH-47 helicopter in support of the VALT program. The CH-47 application examined the system performance of six flight conditions. Four candidate configurations are suggested for evaluation in pilot-in-the-loop simulations and eventual flight tests.

  8. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  9. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  10. 50 CFR 501.4 - Requests for access-times, places and requirements for identification of individuals.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 11 2014-10-01 2014-10-01 false Requests for access-times, places and requirements for identification of individuals. 501.4 Section 501.4 Wildlife and Fisheries MARINE MAMMAL COMMISSION IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 501.4 Requests for access—times, places...

  11. 50 CFR 501.4 - Requests for access-times, places and requirements for identification of individuals.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 11 2012-10-01 2012-10-01 false Requests for access-times, places and requirements for identification of individuals. 501.4 Section 501.4 Wildlife and Fisheries MARINE MAMMAL COMMISSION IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 501.4 Requests for access—times, places...

  12. 50 CFR 501.4 - Requests for access-times, places and requirements for identification of individuals.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 11 2013-10-01 2013-10-01 false Requests for access-times, places and requirements for identification of individuals. 501.4 Section 501.4 Wildlife and Fisheries MARINE MAMMAL COMMISSION IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 501.4 Requests for access—times, places...

  13. 50 CFR 501.4 - Requests for access-times, places and requirements for identification of individuals.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 9 2011-10-01 2011-10-01 false Requests for access-times, places and requirements for identification of individuals. 501.4 Section 501.4 Wildlife and Fisheries MARINE MAMMAL COMMISSION IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 501.4 Requests for access—times, places...

  14. 50 CFR 501.4 - Requests for access-times, places and requirements for identification of individuals.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Requests for access-times, places and requirements for identification of individuals. 501.4 Section 501.4 Wildlife and Fisheries MARINE MAMMAL COMMISSION IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 501.4 Requests for access—times, places...

  15. 45 CFR 2508.14 - What are the identification requirements for individuals who request access to records?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ACT OF 1974 § 2508.14 What are the identification requirements for individuals who request access to... the penalties for improper disclosure under the provisions of the Privacy Act. (b) In the event that... a fine of up to $5,000. (d) In the event a requestor wishes to be accompanied by another...

  16. 23 CFR Appendix C to Subpart B of... - Additional Required Contract Provisions, Appalachian Development Highway System and Local Access...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Development Highway System and Local Access Roads Contracts Other Than Construction Contracts C Appendix C to.... 633, Subpt. B, App. C Appendix C to Subpart B of Part 633—Additional Required Contract Provisions.... Compliance with regulations. The contractor will comply with the provisions of 23 U.S.C. 324 and with...

  17. 23 CFR Appendix C to Subpart B of... - Additional Required Contract Provisions, Appalachian Development Highway System and Local Access...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Development Highway System and Local Access Roads Contracts Other Than Construction Contracts C Appendix C to.... 633, Subpt. B, App. C Appendix C to Subpart B of Part 633—Additional Required Contract Provisions.... Compliance with regulations. The contractor will comply with the provisions of 23 U.S.C. 324 and with...

  18. 10 CFR 73.57 - Requirements for criminal history records checks of individuals granted unescorted access to a...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... entity who has provided written notice to the Commission of intent to file an application for licensing... access to the nuclear power facility. (b) General performance objective and requirements. (1) Except...: the categories of individuals specified in 10 CFR 73.59. (iii) Any licensee currently...

  19. 45 CFR 1182.9 - Identification required when requesting access to Institute records pertaining to an individual.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Identification required when requesting access to Institute records pertaining to an individual. 1182.9 Section 1182.9 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM...

  20. 47 CFR 79.105 - Video description and emergency information accessibility requirements for all apparatus.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... COMMISSION (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.105 Video..., all apparatus that is designed to receive or play back video programming transmitted simultaneously... displaying video programming transmitted simultaneously with sound that manufacturers install into...

  1. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  2. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  3. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... specified in § 648.51(a) and (b). (ii) Vessels fishing in the Closed Area I, Closed Area II, and Nantucket... Closed Area I Access Area are 111,540 lb (51 mt) and 36,000 lb (316 mt), respectively. (iii) Closed Area... Area I Access Area are 111,540 lb (51 mt) and 72,000 lb (33 mt), respectively. (2) Increase in...

  4. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  5. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  6. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  7. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the...

  8. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of...

  9. Evidence-based consensus on the insertion of central venous access devices: definition of minimal requirements for training.

    PubMed

    Moureau, N; Lamperti, M; Kelly, L J; Dawson, R; Elbarbary, M; van Boxtel, A J H; Pittiruti, M

    2013-03-01

    There is a lack of standard minimal requirements for the training of insertion techniques and maintenance of central venous access devices (CVADs). An international evidence-based consensus task force was established through the World Congress of Vascular Access (WoCoVA) to provide definitions and recommendations for training and insertion of CVADs. Medical literature published from February 1971 to April 2012 regarding 'central vascular access', 'training', 'competency', 'simulation', and 'ultrasound' was reviewed on Pubmed, BioMed Central, ScienceDirect, and Scopus databases. The GRADE and the GRADE-RAND methods were utilized to develop recommendations. Out of 156 papers initially identified, 83 papers described training for central vascular access placement. Sixteen recommendations are proposed by this task force, each with an evidence level, degree of consensus, and recommendation grade. These recommendations suggest central venous access education include didactic or web-based teaching with insertion procedure, infection prevention, complications, care, and maintenance of devices, along with laboratory models and tools for simulation practice incorporating ultrasound. Clinical competence should be determined by observation during clinical practice using a global rating scale rather than by the number of procedures performed. Ensuring safe insertion and management of central venous devices requires standardized education, simulation practice, and supervised insertions. PMID:23361124

  10. 46 CFR 63.20-1 - Specific control system requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... this condition, postpurge must be accomplished manually. (b) Combustion control system. A low fire interlock must ensure low fire start when variable firing rates are used. (c) Water level controls and low... addition to the requirements found in ASME CSD-1 (incorporated by reference; see 46 CFR 63.05-1),...

  11. Ground control requirements for precision processing of ERTS images

    USGS Publications Warehouse

    Burger, Thomas C.

    1972-01-01

    When the first Earth Resources Technology Satellite (ERTS-A) flies in 1972, NASA expects to receive and bulk-process 9,000 images a week. From this deluge of images, a few will be selected for precision processing; that is, about 5 percent will be further treated to improve the geometry of the scene, both in the relative and absolute sense. Control points are required for this processing. This paper describes the control requirements for relating ERTS images to a reference surface of the earth. Enough background on the ERTS-A satellite is included to make the requirements meaningful to the user.

  12. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  13. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  14. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Access to Toxic Substances... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-75 Access to Toxic Substances Control Act...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to...

  15. Spanish-Language Community-Based Mental Health Treatment Programs, Policy-Required Language-Assistance Programming, and Mental Health Treatment Access Among Spanish-Speaking Clients

    PubMed Central

    McClellan, Sean R.

    2013-01-01

    Objectives. We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California’s Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Methods. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997–2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. Results. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Conclusions. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services. PMID:23865663

  16. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    NASA Astrophysics Data System (ADS)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  17. Effects of automatic/controlled access processes on semantic memory in Alzheimer's disease.

    PubMed

    Arroyo-Anlló, Eva M; Bellouard, Stéphanie; Ingrand, Pierre; Gil, Roger

    2011-01-01

    This study examines the impact of automatic/controlled access processes on the semantic network in 30 patients with Alzheimer's disease (AD). The AD group was compared with a control group using a battery of neuropsychological tests, a variation of Hodges's semantic testing battery, designed to assess semantic knowledge. The AD group had markedly lower scores than the normal group on each semantic test, but with a different degree of deterioration depending on the nature of the processes (controlled/automatic) in accessing the semantic network. AD patients had poorer performances on the explicit semantic tasks mainly involving controlled-process access (e.g., the WAIS Similarities Subtest) than those involving mainly automatic-process access (e.g., the Verbal Automatism test). Analyses of confidence intervals allowed a gradient of impaired performances in increasing order to be elaborated: a) the Verbal Automatism test, b) the WAIS Vocabulary Subtest, c) the WAIS Information Subtest, d) the Letter Fluency Task, e) Naming as a Response to Definition, f) the Category Fluency Task, g) the WAIS Similarities Subtest, and h) the Oral Denomination 80 Test. The results of our study suggest that explicit semantic tasks needing passive or automatic processes to access semantic memory would be better preserved in AD. PMID:21471640

  18. Deep Borehole Field Test Requirements and Controlled Assumptions.

    SciTech Connect

    Hardin, Ernest

    2015-07-01

    This document presents design requirements and controlled assumptions intended for use in the engineering development and testing of: 1) prototype packages for radioactive waste disposal in deep boreholes; 2) a waste package surface handling system; and 3) a subsurface system for emplacing and retrieving packages in deep boreholes. Engineering development and testing is being performed as part of the Deep Borehole Field Test (DBFT; SNL 2014a). This document presents parallel sets of requirements for a waste disposal system and for the DBFT, showing the close relationship. In addition to design, it will also inform planning for drilling, construction, and scientific characterization activities for the DBFT. The information presented here follows typical preparations for engineering design. It includes functional and operating requirements for handling and emplacement/retrieval equipment, waste package design and emplacement requirements, borehole construction requirements, sealing requirements, and performance criteria. Assumptions are included where they could impact engineering design. Design solutions are avoided in the requirements discussion. Deep Borehole Field Test Requirements and Controlled Assumptions July 21, 2015 iv ACKNOWLEDGEMENTS This set of requirements and assumptions has benefited greatly from reviews by Gordon Appel, Geoff Freeze, Kris Kuhlman, Bob MacKinnon, Steve Pye, David Sassani, Dave Sevougian, and Jiann Su.

  19. Dissecting the genetic control of natural variation in salt tolerance of Arabidopsis thaliana accessions

    PubMed Central

    Katori, Taku; Ikeda, Akiro; Iuchi, Satoshi; Kobayashi, Masatomo; Shinozaki, Kazuo; Maehashi, Kenji; Sakata, Yoichi; Tanaka, Shigeo; Taji, Teruaki

    2010-01-01

    Many accessions (ecotypes) of Arabidopsis have been collected. Although few differences exist among their nucleotide sequences, these subtle differences induce large genetic variation in phenotypic traits such as stress tolerance and flowering time. To understand the natural variability in salt tolerance, large-scale soil pot experiments were performed to evaluate salt tolerance among 350 Arabidopsis thaliana accessions. The evaluation revealed a wide variation in the salt tolerance among accessions. Several accessions, including Bu-5, Bur-0, Ll-1, Wl-0, and Zu-0, exhibited marked stress tolerance compared with a salt-sensitive experimental accession, Col-0. The salt-tolerant accessions were also evaluated by agar plate assays. The data obtained by the large-scale assay correlated well with the results of a salt acclimation (SA) assay, in which plants were transferred to high-salinity medium following placement on moderate-salinity medium for 7 d. Genetic analyses indicated that the salt tolerance without SA is a quantitative trait under polygenic control, whereas salt tolerance with SA is regulated by a single gene located on chromosome 5 that is common among the markedly salt-tolerant accessions. These results provide important information for understanding the mechanisms underlying natural variation of salt tolerance in Arabidopsis. PMID:20080827

  20. Analysis of behavioral requirements for component-based machine controllers

    NASA Astrophysics Data System (ADS)

    Proctor, Frederick M.; Michaloski, John L.; Birla, Sushil; Weinert, George F.

    2001-02-01

    Machine controllers built from standardized software components have the greatest potential to reap open architecture benefits--including plug-and-play, reusability and extensibility. A challenge to component-based controllers relates to standardizing behavior in a non- restrictive manner to accommodate component packaging and component integration. Control component packaging requires behavior to be dependable, well-defined, and well-understood among a variety of users to help ensure the reusability of the component, the reliability of the component, and the correctness of the system built using the component. Integration of control components requires that the behavior model is consistent not just within a single component, but across all components in a system so that the components interoperate correctly. At the same time, the component behavioral model must be reasonably flexible to accommodate all behavioral situations and not be restrictive to a single programming methodology. Further, not all the behavior in the system may be pre-packaged as part of a component. Thus, another issue is the suitability of the standard behavior model for programming and integration of new control logic. Ideally, we need a vendor-neutral, tool-neutral, controller- neural behavior model to allow the export/import of any and all types of control logic programs. This paper will analyze the requirements of component-based, machine controller behavior, then offer a refinement of a Finite State Machine as the basis of a behavior model to satisfy these requirements. Examples will be presented based on the behavioral model the efforts of the Open, Modular, Architecture Controller User's Group Application Programming Interface for standardized, interchangeable machine controller components.

  1. Technical support for the hydrogen control requirement for the EPRI advanced light water reactor requirements document

    SciTech Connect

    Plys, M.G.

    1988-01-01

    Hydrogen could be a significant contributor to severe-accident risk if hydrogen generation and combustion were to lead to containment failure and resulting release of fission products. To eliminate hydrogen as a significant risk contributor for advanced light water reactors (ALWRs), the Electric Power Research Institute (EPRI) ALWR requirements document has imposed a hydrogen control requirement. This requirement specifies an upper limit of 13 dry vol% for the allowable hydrogen concentration in containment. The requirement also considers hydrogen generation during severe accidents and states an upper bound on the hydrogen source equivalent to that generated by oxidizing 75% of the active cladding (commonly stated as 75% metal/water reaction (MWR)). The purpose of this paper is to technically support and substantiate the EPRI ALWR hydrogen requirement. The current understanding of hydrogen generation and combustion is evaluated as it applies to reactor systems, and it is concluded that both experimental results and analytical methods provide a sound technical basis for the requirement.

  2. Charter School Barriers: Do Enrollment Requirements Limit Student Access to Charter Schools?

    ERIC Educational Resources Information Center

    Weiler, Spencer C.; Vogel, Linda R.

    2015-01-01

    The potential of the charter school movement to positively influence traditional public education lies in the ability of charter school officials to provide all students access to the curriculum. The aim of this study was to document potential registration and enrollment barriers incorporated into the practices of Colorado charter schools. The…

  3. 22 CFR 135.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the..., documents, papers, or other records of grantees and subgrantees which are pertinent to the grant, in order to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access....

  4. 15 CFR 14.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... exceptions are the following: (1) If any litigation, claim, or audit is started before the expiration of the 3-year period, the records shall be retained until all litigation, claims or audit findings... authorized representatives, have the right of timely and unrestricted access to any books, documents,...

  5. 15 CFR 24.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... in paragraph (c) of this section. (2) If any litigation, claim, negotiation, audit or other action..., documents, papers, or other records of grantees and subgrantees which are pertinent to the grant, in order to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access....

  6. 22 CFR 145.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... litigation, claim, or audit is started before the expiration of the 3-year period, the records shall be retained until all litigation, claims or audit findings involving the records have been resolved and final... representatives, have the right of timely and unrestricted access to any books, documents, papers, or...

  7. Overlapping Chat's Accessibility Requirements between Students with and without Disabilities Due to the Mobile Limitations

    ERIC Educational Resources Information Center

    Calvo, Rocío; Iglesias, Ana; Moreno, Lourdes

    2014-01-01

    The use of Chats has been extended to mobile-learning (m-learning) environments in the last decade. Students and teachers can communicate in real time and they do not need waiting till their next tutoring date to solve their problems and doubts. However, Chats have many accessibility barriers and many students cannot use this collaborative tool.…

  8. 14 CFR 382.63 - What are the requirements for accessible lavatories?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... aircraft's on-board wheelchair. (2) The accessible lavatory must afford privacy to persons using the on-board wheelchair equivalent to that afforded ambulatory users. (3) The lavatory shall provide door locks... individuals with a disability, including wheelchair users and persons with manual impairments. (b)...

  9. 14 CFR 382.63 - What are the requirements for accessible lavatories?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... aircraft's on-board wheelchair. (2) The accessible lavatory must afford privacy to persons using the on-board wheelchair equivalent to that afforded ambulatory users. (3) The lavatory shall provide door locks... individuals with a disability, including wheelchair users and persons with manual impairments. (b)...

  10. 47 CFR 79.106 - Video description and emergency information accessibility requirements for recording devices.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... COMMISSION (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.106 Video..., 2015, all apparatus that is designed to record video programming transmitted simultaneously with sound...): Apparatus includes the physical device and the video player(s) capable of displaying video...

  11. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...)(8)(i). Editorial Note: For Federal Register citations affecting § 648.60, see the List of CFR... in paragraph (g) of this section. (1) VMS. Each vessel participating in the Sea Scallop Access Area Program must have installed on board an operational VMS unit that meets the minimum performance...

  12. 77 FR 70970 - Accessible Emergency Information, and Apparatus Requirements for Emergency Information and Video...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-28

    ..., 2009 (74 FR 66356) which became effective on January 25, 2010. Needs and Uses: The Commission is... Description of Video Programming, Report and Order, 65 FR 54805 (2000) (``2000 Video Description Order''). The... Accessibility Act of 2010, Report and Order, 76 FR 55585 (2011) (``2011 Video Description Order''). The...

  13. 50 CFR 648.60 - Sea scallop area access program requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES... Permit History is not eligible to exchange trips between another vessel and the vessel for which a Confirmation of Permit History has been issued. (A) Trip exchanges involving Elephant Trunk Access Area...

  14. 50 CFR 648.60 - Sea scallop area access program requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES... of Permit History is not eligible to exchange trips between another vessel and the vessel for which a Confirmation of Permit History has been issued. (iii) (4) Area fished. While on a Sea Scallop Access Area...

  15. UML activity diagrams in requirements specification of logic controllers

    NASA Astrophysics Data System (ADS)

    Grobelna, Iwona; Grobelny, Michał

    2015-12-01

    Logic controller specification can be prepared using various techniques. One of them is the wide understandable and user-friendly UML language and its activity diagrams. Using formal methods during the design phase increases the assurance that implemented system meets the project requirements. In the approach we use the model checking technique to formally verify a specification against user-defined behavioral requirements. The properties are usually defined as temporal logic formulas. In the paper we propose to use UML activity diagrams in requirements definition and then to formalize them as temporal logic formulas. As a result, UML activity diagrams can be used both for logic controller specification and for requirements definition, what simplifies the specification and verification process.

  16. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  17. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  18. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  19. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  20. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  1. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  2. Towards human-centric visual access control for clinical data management.

    PubMed

    Fahl, Sascha; Harbach, Marian; Smith, Matthew

    2012-01-01

    We propose a novel human-centric, visual, and context-aware access control (AC) system for distributed clinical data management and health information systems. Human-centricity in this context means that medical staff should be able to configure AC rules, both in a timesaving and reliable manner. Since medical data often includes (meta-) information about a patient, it is essential that an AC system includes the patient into the AC process. To cater for the strong security needs in the medical domain, both the AC policy creation by medical staff as well as the patient-interaction feature need to be taken into account. While traditional AC systems offer sufficient security in theory, they lack in comfort and flexibility and as a result find no widespread acceptance with non tech-savvy users. Distributed medical institutions could enormously benefit from the opportunity of dynamic AC configuration at an end-user level while adhering to legal, ethical or other privacy requirements. Hence, this paper presents a human-centric visual AC model for medical data, addressing usability, information security and patient interaction. PMID:22874293

  3. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  4. Stem cell research funding policies and dynamic innovation: a survey of open access and commercialization requirements.

    PubMed

    Lévesque, Maroussia; Kim, Jihyun Rosel; Isasi, Rosario; Knoppers, Bartha Maria; Plomer, Aurora; Joly, Yann

    2014-08-01

    This article compares and contrasts the pressures of both open access data sharing and commercialization policies in the context of publicly funded embryonic stem cell research (SCR). First, normative guidelines of international SCR organizations were examined. We then examined SCR funding guidelines and the project evaluation criteria of major funding organizations in the EU, the United Kingdom (UK), Spain, Canada and the United States. Our survey of policies revealed subtle pressures to commercialize research that include: increased funding availability for commercialization opportunities, assistance for obtaining intellectual property rights (IPRs) and legislation mandating commercialization. In lieu of open access models, funders are increasingly opting for limited sharing models or "protected commons" models that make the research available to researchers within the same region or those receiving the same funding. Meanwhile, there still is need for funding agencies to clarify and standardize terms such as "non-profit organizations" and "for-profit research," as more universities are pursuing for-profit or commercial opportunities.

  5. Hysteresis-based congestion control at the B-ISDN access

    NASA Astrophysics Data System (ADS)

    Wissing, Johannes

    1993-11-01

    Multiplexing of bursty sources and refined congestion control strategies are still the subject of numerous research activities. Broadband applications with very high peak-to-mean bitrate ratio and long silence periods like still picture video gave rise to different ideas of rate control at the B-ISDN network access. Contributions on Input Rate Control for source coded traffic as well as on Server Rate Control within a LAN/ATM Interworking Unit have recently been presented. This paper addresses a congestion avoidance strategy at the network access regarding the aggregated traffic of bursty sources. Depending on the number of active sources as well as on certain defined congestion levels the cell rate at the network access is controlled. The proposed analytical approach is based on the model of uniform and continuous arrival and service. The selected underlying Markov chain contains `split' states in order to handle the congestion correlation. The proposed model is extended to an adaptive Non-Markov system where the buffer filling level is evaluated using a switching hysteresis. This type of congestion measurement turns out to be very useful for an adaptive rate control mechanism that guarantees a certain quality of service while still achieving a good statistical gain. The analytical approach is confirmed by results of a computer simulation that is extended to the more complex case of adaptive rate control.

  6. An efficient key-management scheme for hierarchical access control in e-medicine system.

    PubMed

    Wu, Shuhua; Chen, Kefei

    2012-08-01

    In e-medicine system, the sharing of patients' medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.'s scheme proposed most recently, the time complexity and the required storage space is reduced significantly. Moreover, it provides provable security, and is easy to implement. Therefore, our scheme is more suitable for e-medicine system.

  7. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  8. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  9. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  10. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  11. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... violation of section 337 in the infringement of certain patents. 73 FR 75131. The principal respondent was... order. 75 FR 44989-90 (July 30, 2010). The Commission also issued cease and desist orders against those... COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers...

  12. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  13. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  14. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final Rule; correction. SUMMARY: The Copyright Office makes a nonsubstantial correction to its regulation announcing...

  15. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... materials; 44 U.S.C. 2111, 44 U.S.C. 2201 et seq., and 36 CFR part 1270 for Presidential records; and 44 U.S.C. 2111 note and 36 CFR part 1275 for Nixon Presidential materials. ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What controls access...

  16. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  17. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  18. Control of Access to Memory: The Use of Task Interference as a Behavioral Probe

    ERIC Educational Resources Information Center

    Loft, Shayne; Humphreys, Michael S.; Whitney, Susannah J.

    2008-01-01

    Directed forgetting and prospective memory methods were combined to examine differences in the control of memory access. Between studying two lists of target words, participants were either instructed to forget the first list, or to continue remembering the first list. After study participants performed a lexical decision task with an additional…

  19. 50 CFR 648.92 - Effort-control program for monkfish limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for monkfish limited access vessels. 648.92 Section 648.92 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT... UNITED STATES Management Measures for the NE Multispecies and Monkfish Fisheries § 648.92...

  20. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  1. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  2. Fast access control of the head positioning using a digital signal processor

    NASA Astrophysics Data System (ADS)

    Hasegawa, Susumu; Mizoshita, Yoshifumi; Ueno, Takahisa; Takaishi, Kazuhiko

    1990-08-01

    We have developed a new digital servo controller for a 5"hard disk drive which has average access time of 10 ms for a 25 mm stroke. To obtain this fast access speed, we used a state estimator with a new acceleration irajectory model. The estimator and trajectory generator are implemented using a digital signal processor. There are two problems for fast access control: motor coil inductance and the mechanical resonance of the actuator and disk enclosure. To solve these problems and to achieve precise head positioning, we developed the following control method. To solve the voice coil motor inductance and actuator resonance problems, we used a new acceleration trajectory model which is not affected by the coil inductance when the head moves quickly. This design is based on an optinial control theory which minimizes the square of differentiated acceleration. By using this new trajectory model, the high harmonics of actuator drive are damped and the residual vibration ofactuator immediately after access is decreased.

  3. 42 CFR 84.256 - Quality control requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... following specific tests will be performed: (i) Apparent density; (ii) Iodine number; (iii) Moisture content; (iv) Carbon tetrachloride number; and (v) Mesh size. (2) The tests in paragraph (c)(1) of this section... and cartridges to the requirements of this subpart. (d) Final performance quality control tests on...

  4. 42 CFR 84.256 - Quality control requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... following specific tests will be performed: (i) Apparent density; (ii) Iodine number; (iii) Moisture content; (iv) Carbon tetrachloride number; and (v) Mesh size. (2) The tests in paragraph (c)(1) of this section... and cartridges to the requirements of this subpart. (d) Final performance quality control tests on...

  5. 42 CFR 84.256 - Quality control requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... following specific tests will be performed: (i) Apparent density; (ii) Iodine number; (iii) Moisture content; (iv) Carbon tetrachloride number; and (v) Mesh size. (2) The tests in paragraph (c)(1) of this section... and cartridges to the requirements of this subpart. (d) Final performance quality control tests on...

  6. 46 CFR 164.120-11 - Production quality control requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 6 2013-10-01 2013-10-01 false Production quality control requirements. 164.120-11 Section 164.120-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL MATERIALS Fire Retardant Resins for Lifeboats...

  7. 46 CFR 164.120-11 - Production quality control requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 6 2014-10-01 2014-10-01 false Production quality control requirements. 164.120-11 Section 164.120-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL MATERIALS Fire Retardant Resins for Lifeboats...

  8. 46 CFR 164.120-11 - Production quality control requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 6 2012-10-01 2012-10-01 false Production quality control requirements. 164.120-11 Section 164.120-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL MATERIALS Fire Retardant Resins for Lifeboats...

  9. Unmanned Aircraft System Control and ATC Communications Bandwidth Requirements

    NASA Technical Reports Server (NTRS)

    Henriksen, Steve

    2008-01-01

    There are significant activities taking place to establish the procedures and requirements for safe and routine operation of unmanned aircraft systems (UAS) in the National Airspace System (NAS). Among the barriers to overcome in achieving this goal is the lack of sufficient frequency spectrum necessary for the UAS control and air traffic control (ATC) communications links. This shortcoming is compounded by the fact that the UAS control communications links will likely be required to operate in protected frequency spectrum, just as ATC communications links are, because they relate to "safety and regularity of flight." To support future International Telecommunications Union (ITU) World Radio Conference (WRC) agenda items concerning new frequency allocations for UAS communications links, and to augment the Future Communications Study (FCS) Technology Evaluation Group efforts, NASA Glenn Research Center has sponsored a task to estimate the UAS control and ATC communications bandwidth requirements for safe, reliable, and routine operation of UAS in the NAS. This report describes the process and results of that task. The study focused on long-term bandwidth requirements for UAS approximately through 2030.

  10. 32 CFR 700.106 - Control of administrative requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Control of administrative requirements. 700.106 Section 700.106 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS...

  11. 32 CFR 700.106 - Control of administrative requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Control of administrative requirements. 700.106 Section 700.106 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS...

  12. 32 CFR 700.106 - Control of administrative requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Control of administrative requirements. 700.106 Section 700.106 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS...

  13. 32 CFR 700.106 - Control of administrative requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Control of administrative requirements. 700.106 Section 700.106 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS...

  14. 46 CFR 63.20-1 - Specific control system requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... emergency safety trip control operation, the air flow to the boiler must not automatically increase. For....20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC... addition to the requirements found in ASME CSD-1 (incorporated by reference; see 46 CFR 63.05-1),...

  15. 46 CFR 63.20-1 - Specific control system requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... emergency safety trip control operation, the air flow to the boiler must not automatically increase. For....20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING AUTOMATIC... addition to the requirements found in ASME CSD-1 (incorporated by reference; see 46 CFR 63.05-1),...

  16. Methionine Uptake and Required Radiation Dose to Control Glioblastoma

    SciTech Connect

    Iuchi, Toshihiko; Hatano, Kazuo; Uchino, Yoshio; Itami, Makiko; Hasegawa, Yuzo; Kawasaki, Koichiro; Sakaida, Tsukasa; Hara, Ryusuke

    2015-09-01

    Purpose: The purpose of this study was to retrospectively assess the feasibility of radiation therapy planning for glioblastoma multiforme (GBM) based on the use of methionine (MET) positron emission tomography (PET), and the correlation among MET uptake, radiation dose, and tumor control. Methods and Materials: Twenty-two patients with GBM who underwent MET-PET prior to radiation therapy were enrolled. MET uptake in 30 regions of interest (ROIs) from 22 GBMs, biologically effective doses (BEDs) for the ROIs and their ratios (MET uptake:BED) were compared in terms of whether the ROIs were controlled for >12 months. Results: MET uptake was significantly correlated with tumor control (odds ratio [OR], 10.0; P=.005); however, there was a higher level of correlation between MET uptake:BED ratio and tumor control (OR, 40.0; P<.0001). These data indicated that the required BEDs for controlling the ROIs could be predicted in terms of MET uptake; BED could be calculated as [34.0 × MET uptake] Gy from the optimal threshold of the MET uptake:BED ratio for tumor control. Conclusions: Target delineation based on MET-PET was demonstrated to be feasible for radiation therapy treatment planning. MET-PET could not only provide precise visualization of infiltrating tumor cells but also predict the required radiation doses to control target regions.

  17. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  18. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  19. 40 CFR 51.1010 - Requirements for reasonably available control technology (RACT) and reasonably available control...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 2 2011-07-01 2011-07-01 false Requirements for reasonably available control technology (RACT) and reasonably available control measures (RACM). 51.1010 Section 51.1010 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS REQUIREMENTS FOR PREPARATION, ADOPTION, AND SUBMITTAL...

  20. 32 CFR 37.915 - What requirement for access to a for-profit participant's records do I include in a TIA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... auditors, your TIA must include for that participant the standard access-to-records requirements at 32 CFR 34.42(e). If the agreement is a fixed-support TIA, the language in 32 CFR 34.42(e) may be modified to... set requirement to include a provision in your TIA for Government access to records. If the...

  1. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network access requirements for Block C in the... § 27.16 Network access requirements for Block C in the 746-757 and 776-787 MHz bands. (a) Applicability... the devices and applications of their choice on the licensee's C Block network, except: (1) Insofar...

  2. 13 CFR 143.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL GOVERNMENTS...) Required to be maintained by the terms of this part, program regulations or the grant agreement, or (ii) Otherwise reasonably considered as pertinent to program regulations or the grant agreement. (2) This...

  3. Synthesis from Design Requirements of a Hybrid System for Transport Aircraft Longitudinal Control. Volume 2

    NASA Technical Reports Server (NTRS)

    Hynes, Charles S.; Hardy, Gordon H.; Sherry, Lance

    2007-01-01

    Volume I of this report presents a new method for synthesizing hybrid systems directly from desi gn requirements, and applies the method to design of a hybrid system for longitudinal control of transport aircraft. The resulting system satisfies general requirement for safety and effectiveness specified a priori, enabling formal validation to be achieved. Volume II contains seven appendices intended to make the report accessible to readers with backgrounds in human factors, flight dynamics and control, and formal logic. Major design goals are (1) system design integrity based on proof of correctness at the design level, (2) significant simplification and cost reduction in system development and certification, and (3) improved operational efficiency, with significant alleviation of human-factors problems encountered by pilots in current transport aircraft. This report provides for the first time a firm technical basis for criteria governing design and certification of avionic systems for transport aircraft. It should be of primary interest to designers of next-generation avionic systems.

  4. Minimum Control Requirements for Advanced Life Support Systems

    NASA Technical Reports Server (NTRS)

    Boulange, Richard; Jones, Harry; Jones, Harry

    2002-01-01

    Advanced control technologies are not necessary for the safe, reliable and continuous operation of Advanced Life Support (ALS) systems. ALS systems can and are adequately controlled by simple, reliable, low-level methodologies and algorithms. The automation provided by advanced control technologies is claimed to decrease system mass and necessary crew time by reducing buffer size and minimizing crew involvement. In truth, these approaches increase control system complexity without clearly demonstrating an increase in reliability across the ALS system. Unless these systems are as reliable as the hardware they control, there is no savings to be had. A baseline ALS system is presented with the minimal control system required for its continuous safe reliable operation. This baseline control system uses simple algorithms and scheduling methodologies and relies on human intervention only in the event of failure of the redundant backup equipment. This ALS system architecture is designed for reliable operation, with minimal components and minimal control system complexity. The fundamental design precept followed is "If it isn't there, it can't fail".

  5. Computer vector multiprocessing control with multiple access memory and priority conflict resolution method

    SciTech Connect

    Chen, S.S.; Schiffleger, A.J.

    1990-02-13

    This patent describes a multiprocessor memory system. It comprises: a central memory comprised of a plurality of independently addressable memory banks organized into a plurality of sections each accessible through a plurality of access paths; a plurality of processing machines; each of the processing machine including a plurality of ports for generating memory references to any one of the central memory sections; and conflict resolution means interfacing each of the ports to each of the central memory sections through the central memory access paths. The resolution means for receiving references from the ports and coordinating and controlling the procession of the references along to the access paths. The conflict resolution means comprising a plurality of conflict resolution circuits corresponding in number to the memory sections, each of the circuits receiving the references to its corresponding section from any one of the ports and selectively conveying the references to the access paths for the corresponding section. The circuits each including; means for checking the readiness of the memory banks to be referenced and holding a reference to a busy one of the banks until the bank is ready to be referenced; means for detecting when more than one of the references is pending to the same bank simultaneously and holding all but one of the simultaneously pending references; and means communicating with the ports and the other of the conflict resolution circuits to cause one of the ports referencing the memory to suspend generation of further references when a reference from the referencing port is being held.

  6. 36 CFR 1207.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... RECORDS ADMINISTRATION GENERAL RULES UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE..., program regulations or the grant agreement, or (ii) Otherwise reasonably considered as pertinent to program regulations or the grant agreement. (2) This section does not apply to records maintained...

  7. 17 CFR 240.17i-5 - Record creation, maintenance, and access requirements for supervised investment bank holding...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be...

  8. Software requirements: Guidance and control software development specification

    NASA Technical Reports Server (NTRS)

    Withers, B. Edward; Rich, Don C.; Lowman, Douglas S.; Buckland, R. C.

    1990-01-01

    The software requirements for an implementation of Guidance and Control Software (GCS) are specified. The purpose of the GCS is to provide guidance and engine control to a planetary landing vehicle during its terminal descent onto a planetary surface and to communicate sensory information about that vehicle and its descent to some receiving device. The specification was developed using the structured analysis for real time system specification methodology by Hatley and Pirbhai and was based on a simulation program used to study the probability of success of the 1976 Viking Lander missions to Mars. Three versions of GCS are being generated for use in software error studies.

  9. Requirements and process control for quantity of product in prepackages

    NASA Astrophysics Data System (ADS)

    Sim, C. H.

    2007-02-01

    Verification of the actual quantity of product in prepackages is an important part of compliance testing to facilitate fair trade, maintain a competitive marketplace and protect consumers against under-filled prepackages. Two of the most widely used legal metrological requirements are (i) the average net quantity of product in prepackages of an inspection lot shall be at least equal to the labelled quantity and (ii) the number of prepackages, in a randomly selected sample, that are under-filled by more than a permitted quantity is less than or equal to a permitted number. Industrial and government metrology officials are required to check whether prepackages in an inspection lot comply with these requirements by sampling prepackages at the point-of-pack, wholesale outlets and retail stores. This paper discusses some drawbacks of the acceptance sampling plans and metrological requirements recommended in the international recommendation OIML R87 developed by the International Organization of Legal Metrology. To counter these drawbacks, alternative sampling plans and average prepackage requirements are proposed. Statistical control of filling processes under the OIML R87 requirements is also discussed.

  10. 40 CFR 51.1010 - Requirements for reasonably available control technology (RACT) and reasonably available control...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... control technology (RACT) and reasonably available control measures (RACM). 51.1010 Section 51.1010... PREPARATION, ADOPTION, AND SUBMITTAL OF IMPLEMENTATION PLANS Provisions for Implementation of PM2.5 National Ambient Air Quality Standards § 51.1010 Requirements for reasonably available control technology...

  11. Digital flight control software design requirements. [for space shuttle orbiter

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The objective of the integrated digital flight control system is to provide rotational and translational control of the space shuttle orbiter in all phases of flight: from launch ascent through orbit to entry and touchdown, and during powered horizontal flights. The program provides a versatile control system structure while maintaining uniform communications with other programs, sensors, and control effects by using an executive routine/function subroutine format. The program reads all external variables at a single point, copies them into its dedicated storage, and then calls the required subroutines in the proper sequence. As a result, the flight control program is largely independent of other programs in the GN and C computer complex and is equally insensitive to the characteristics of the processor configuration. The integrated structure of the control system and the DFCS executive routine which embodies that structure are described. The specific estimation and control algorithms used in the various mission phases are shown. Attitude maneuver routines that interface with the DFCS are also described.

  12. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    NASA Astrophysics Data System (ADS)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  13. Design requirements for SRB production control system. Volume 2: System requirements and conceptual description

    NASA Technical Reports Server (NTRS)

    1981-01-01

    In the development of the business system for the SRB automated production control system, special attention had to be paid to the unique environment posed by the space shuttle. The issues posed by this environment, and the means by which they were addressed, are reviewed. The change in management philosphy which will be required as NASA switches from one-of-a-kind launches to multiple launches is discussed. The implications of the assembly process on the business system are described. These issues include multiple missions, multiple locations and facilities, maintenance and refurbishment, multiple sources, and multiple contractors. The implications of these aspects on the automated production control system are reviewed including an assessment of the six major subsystems, as well as four other subsystem. Some general system requirements which flow through the entire business system are described.

  14. Advanced Environmental Monitoring and Control Program: Technology Development Requirements

    NASA Technical Reports Server (NTRS)

    Jan, Darrell (Editor); Seshan, Panchalam (Editor); Ganapathi, Gani (Editor); Schmidt, Gregory (Editor); Doarn, Charles (Editor)

    1996-01-01

    Human missions in space, from the International Space Station on towards potential human exploration of the moon, Mars and beyond into the solar system, will require advanced systems to maintain an environment that supports human life. These systems will have to recycle air and water for many months or years at a time, and avoid harmful chemical or microbial contamination. NASA's Advanced Environmental Monitoring and Control program has the mission of providing future spacecraft with advanced, integrated networks of microminiaturized sensors to accurately determine and control the physical, chemical and biological environment of the crew living areas. This document sets out the current state of knowledge for requirements for monitoring the crew environment, based on (1) crew health, and (2) life support monitoring systems. Both areas are updated continuously through research and space mission experience. The technologies developed must meet the needs of future life support systems and of crew health monitoring. These technologies must be inexpensive and lightweight, and use few resources. Using these requirements to continue to push the state of the art in miniaturized sensor and control systems will produce revolutionary technologies to enable detailed knowledge of the crew environment.

  15. 21 CFR 312.305 - Requirements for all expanded access uses.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of the facility where the drug will be manufactured; (vi) Chemistry, manufacturing, and controls information adequate to ensure the proper identification, quality, purity, and strength of the investigational... interfere with the initiation, conduct, or completion of clinical investigations that could...

  16. Controlled Access Headings in EAD Finding Aids: Current Practices in Number of and Types of Headings Assigned

    ERIC Educational Resources Information Center

    Mascaro, Michelle

    2011-01-01

    This article presents the findings from a study of controlled access headings assigned to encoded archival description finding aids in the Ohio Library and Information Network Finding Aid Repository, focusing on the number of headings per finding aid and the category of terms assigned. Assigning multiple controlled access headings was widely…

  17. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  18. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  19. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  20. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.