Sample records for access control requirements

  1. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  2. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  3. A novel asynchronous access method with binary interfaces

    PubMed Central

    2008-01-01

    Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation. PMID:18959797

  4. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  5. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  6. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  7. Method and device for maximizing memory system bandwidth by accessing data in a dynamically determined order

    NASA Technical Reports Server (NTRS)

    Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)

    2000-01-01

    A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.

  8. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  9. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  10. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  11. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  12. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  13. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  14. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  15. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  16. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  17. Semantically Enriched Data Access Policies in eHealth.

    PubMed

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  18. Trends in communicative access solutions for children with cerebral palsy.

    PubMed

    Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom

    2014-08-01

    Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.

  19. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...

  20. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Hormone-dependent control of developmental timing through regulation of chromatin accessibility

    PubMed Central

    Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.

    2017-01-01

    Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147

  2. A Study on the Deriving Requirements of ARGO Operation System

    NASA Astrophysics Data System (ADS)

    Seo, Yoon-Kyung; Rew, Dong-Young; Lim, Hyung-Chul; Park, In-Kwan; Yim, Hong-Suh; Jo, Jung Hyun; Park, Jong-Uk

    2009-12-01

    Korea Astronomy and Space Science Institute (KASI) has been developing one mobile and one stationary SLR system since 2008 named as ARGO-M and ARGO-F, respectively. KASI finished the step of deriving the system requirements of ARGO. The requirements include definitions and scopes of various software and hardware components which are necessary for developing the ARGO-M operation system. And the requirements define function, performance, and interface requirements. The operation system consisting of ARGO-M site, ARGO-F site, and Remote Operation Center (ROC) inside KASI is designed for remote access and the automatic tracking and control system which are the main operation concept of ARGO system. To accomplish remote operation, we are considering remote access to ARGO-F and ARGO-M from ROC. The mobile-phone service allows us to access the ARGO-F remotely and to control the system in an emergency. To implement fully automatic tracking and control function in ARGO-F, we have investigated and described the requirements about the automatic aircraft detection system and the various meteorological sensors. This paper addresses the requirements of ARGO Operation System.

  3. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  4. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    PubMed

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  5. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    PubMed Central

    Huarte, Maider; Romaña, Pedro

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338

  6. Security middleware infrastructure for DICOM images in health information systems.

    PubMed

    Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A

    2003-12-01

    In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.

  7. Security for safety critical space borne systems

    NASA Technical Reports Server (NTRS)

    Legrand, Sue

    1987-01-01

    The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.

  8. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  9. 25 CFR 543.16 - What are the minimum internal controls for information technology?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... controls for information technology? (a) Physical security measures restricting access to agents, including... longer required. (2) In the event of remote access, the information technology employees must prepare a... 25 Indians 2 2012-04-01 2012-04-01 false What are the minimum internal controls for information...

  10. 25 CFR 543.16 - What are the minimum internal controls for information technology?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... controls for information technology? (a) Physical security measures restricting access to agents, including... longer required. (2) In the event of remote access, the information technology employees must prepare a... 25 Indians 2 2011-04-01 2011-04-01 false What are the minimum internal controls for information...

  11. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  12. 78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.

  13. 48 CFR 5.102 - Availability of solicitations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Disclosure would compromise the national security (e.g., would result in disclosure of classified information, or information subject to export controls) or create other security risks. The fact that access to... information that requires additional controls to monitor access and distribution (e.g., technical data...

  14. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  15. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  16. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The individual...

  17. 25 CFR 543.16 - What are the minimum internal controls for information technology?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... technology? 543.16 Section 543.16 Indians NATIONAL INDIAN GAMING COMMISSION, DEPARTMENT OF THE INTERIOR HUMAN... controls for information technology? (a) Physical security measures restricting access to agents, including... longer required. (2) In the event of remote access, the information technology employees must prepare a...

  18. 7. Administrative structures.

    PubMed

    2014-05-01

    The basic systems of any society rarely can operate independently. Instead, they are dependent and often interdependent upon other entities. Such entities control the resources within their respective systems. Thus, coordination and control agencies require contracts or memoranda of understanding with these entities in order to assure access to the resources required during a crisis. These administrative structures include: (1) governmental institutions and agencies, including the military; (2) intergovernmental organisations; (3) nongovernmental organisations; (4) commercial private sector organisations; and (5) academic institutions. These dependencies create potential barriers to the provision of coordination and control including: (1) the complexity of the administrative structures with which coordination and control must interact; (2) the location of resources; (3) finding responsible person(s); (4) the competence and compatibility; (5) methods of access; (6) payment; (7) contracts and memoranda of understanding; (8) inventories of accessible resources; (9) competition for the mandate, power, and resources; and (10) jealousy. The need for potential interactions between administrative structures requires that agreements for the sharing of resources during crises be reached as part of planning and preparedness. Gaining an understanding of these relationships is an important area for research.

  19. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  20. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and facilities; (4) Granting access to only those responding to the security incident or threat... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security...

  1. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... shall: (i) Design, construct, install and maintain physical barriers as necessary to control access into.... (10) Vehicle control measures. Consistent with the physical protection program design requirements of... maintain vehicle control measures, as necessary, to protect against the design basis threat of radiological...

  2. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... shall: (i) Design, construct, install and maintain physical barriers as necessary to control access into.... (10) Vehicle control measures. Consistent with the physical protection program design requirements of... maintain vehicle control measures, as necessary, to protect against the design basis threat of radiological...

  3. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... shall: (i) Design, construct, install and maintain physical barriers as necessary to control access into.... (10) Vehicle control measures. Consistent with the physical protection program design requirements of... maintain vehicle control measures, as necessary, to protect against the design basis threat of radiological...

  4. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  5. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  6. Access from Space: A New Perspective on NASA's Space Transportation Technology Requirements and Opportunities

    NASA Technical Reports Server (NTRS)

    Rasky, Daniel J.

    2004-01-01

    The need for robust and reliable access from space is clearly demonstrated by the recent loss of the Space Shuttle Columbia; as well as the NASA s goals to get the Shuttle re-flying and extend its life, build new vehicles for space access, produce successful robotic landers and s a q k retrr? llisrions, and maximize the science content of ambitious outer planets missions that contain nuclear reactors which must be safe for re-entry after possible launch aborts. The technology lynch pin of access from space is hypersonic entry systems such the thermal protection system, along with navigation, guidance and control (NG&C). But it also extends to descent and landing systems such as parachutes, airbags and their control systems. Current space access technology maturation programs such as NASA s Next Generation Launch Technology (NGLT) program or the In-Space Propulsion (ISP) program focus on maturing laboratory demonstrated technologies for potential adoption by specific mission applications. A key requirement for these programs success is a suitable queue of innovative technologies and advanced concepts to mature, including mission concepts enabled by innovative, cross cutting technology advancements. When considering space access, propulsion often dominates the capability requirements, as well as the attention and resources. From the perspective of access from space some new cross cutting technology drivers come into view, along with some new capability opportunities. These include new miniature vehicles (micro, nano, and picosats), advanced automated systems (providing autonomous on-orbit inspection or landing site selection), and transformable aeroshells (to maximize capabilities and minimize weight). This paper provides an assessment of the technology drivers needed to meet future access from space mission requirements, along with the mission capabilities that can be envisioned from innovative, cross cutting access from space technology developments.

  7. 10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...

  8. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  9. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  10. 10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...

  11. 10 CFR 11.16 - Cancellation of request for special nuclear material access authorization.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Cancellation of request for special nuclear material access authorization. 11.16 Section 11.16 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for...

  12. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  13. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  14. 10 CFR 11.15 - Application for special nuclear material access authorization.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Application for special nuclear material access authorization. 11.15 Section 11.15 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL Requirements for Special Nuclear Material...

  15. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  16. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  17. Data General Corporation Advanced Operating System/Virtual Storage (AOS/ VS). Revision 7.60

    DTIC Science & Technology

    1989-02-22

    control list for each directory and data file. An access control list includes the users who can and cannot access files as well as the access...and any required data, it can -5- February 22, 1989 Final Evaluation Report Data General AOS/VS SYSTEM OVERVIEW operate asynchronously and in parallel...memory. The IOC can perform the data transfer without further interventiin from the CPU. The I/O channels interface with the processor or system

  18. Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent

    NASA Technical Reports Server (NTRS)

    Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.

    2013-01-01

    This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.

  19. Managing Information On Technical Requirements

    NASA Technical Reports Server (NTRS)

    Mauldin, Lemuel E., III; Hammond, Dana P.

    1993-01-01

    Technical Requirements Analysis and Control Systems/Initial Operating Capability (TRACS/IOC) computer program provides supplemental software tools for analysis, control, and interchange of project requirements so qualified project members have access to pertinent project information, even if in different locations. Enables users to analyze and control requirements, serves as focal point for project requirements, and integrates system supporting efficient and consistent operations. TRACS/IOC is HyperCard stack for use on Macintosh computers running HyperCard 1.2 or later and Oracle 1.2 or later.

  20. 76 FR 51457 - Order Temporarily Exempting the Floor Broker Operations of Broker-Dealers With Market Access That...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-18

    ... applicable in connection with market access.\\9\\ The required financial risk management controls and... Act of 1934 August 15, 2011. I. Introduction Pursuant to Rule 15c3-5(f) under the Securities Exchange... maintain a system of risk management controls and supervisory procedures that, among other things, is...

  1. 33. Perimeter acquisition radar building room #320, perimeter acquisition radar ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    33. Perimeter acquisition radar building room #320, perimeter acquisition radar operations center (PAROC), contains the tactical command and control group equipment required to control the par site. Showing spacetrack monitor console - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND

  2. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  3. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  4. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  5. National Airspace System. Operational Requirements.

    DTIC Science & Technology

    1984-10-01

    1. Access to manned NAS tacilities shall be control’ed at all times to prevent intc.rruptio;i of service., distraction of specialists, and theft of...user requirements which cannot otherwise be accomplished. ALTRVs are approved by the appropriate FAA facility. AREA CONTROL1 FACILITY (ACF) - A

  6. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  7. Access to augmentative and alternative communication: new technologies and clinical decision-making.

    PubMed

    Fager, Susan; Bardach, Lisa; Russell, Susanne; Higginbotham, Jeff

    2012-01-01

    Children with severe physical impairments require a variety of access options to augmentative and alternative communication (AAC) and computer technology. Access technologies have continued to develop, allowing children with severe motor control impairments greater independence and access to communication. This article will highlight new advances in access technology, including eye and head tracking, scanning, and access to mainstream technology, as well as discuss future advances. Considerations for clinical decision-making and implementation of these technologies will be presented along with case illustrations.

  8. The Paperless Solution

    NASA Technical Reports Server (NTRS)

    2001-01-01

    REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.

  9. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  10. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  11. [On the improvement of the legal support of the food safety in the conditions of trade and economic integration of states-members of the Customs union and the Russian Federation's accession to the WTO].

    PubMed

    Bragina, I V; Aksenova, O I; Bokit'ko, B G; Gorsky, A A

    2013-01-01

    In the article priority activities of The Federal Service for the Oversight of Consumer Protection and Welfare on improvement of standard legal support of safety of foodstuff and control of compliance of foodstuff to legislation requirements are reported. The main documents directed on harmonization of the international requirements with national ones and requirements of the Customs union on safety of foodstuff are submitted. Work within a framework of Russian Federation's accession to the WTO is described. And data on control of quality and safety of foodstuff are provided also.

  12. The Impact of Preoperative α-Adrenergic Antagonists on Ureteral Access Sheath Insertion Force and the Upper Limit of Force Required to Avoid Ureteral Mucosal Injury: A Randomized Controlled Study.

    PubMed

    Koo, Kyo Chul; Yoon, Jun-Ho; Park, No-Cheol; Lee, Hye Sun; Ahn, Hyun Kyu; Lee, Kwang Suk; Kim, Do Kyung; Cho, Kang Su; Chung, Byung Ha; Hong, Chang Hee

    2018-06-01

    Excessive bulking force during primary access of the ureteral access sheath may induce ureteral injury. We investigated the efficacy of preoperative α-blockade to reduce ureteral access sheath insertion force and determine the upper limit required to avoid ureteral injury. In this randomized controlled trial 135 patients from a single institution who had ureteropelvic junction or renal pelvis stones and were scheduled to undergo retrograde intrarenal surgery were prospectively enrolled from December 2015 to January 2017. Of the patients 41 and 42 were randomly assigned to the control and experimental groups, respectively. The experimental group received α-blockade preoperatively. The 21 patients who were pre-stented were assessed separately. We developed a homemade device to measure maximal ureteral access sheath insertion force. Our ureteral access sheath insertion force measurement device showed excellent reproducibility. Higher insertion velocity resulted in greater maximal sheath insertion force. Maximal insertion force in the α-blockade group was significantly lower than in the control group at the ureterovesical junction (p = 0.008) and the proximal ureter (p = 0.036). Maximal insertion force in the α-blockade group was comparable to that in pre-stented patients. Female patients and patients 70 years old or older showed a lower maximal ureteral access sheath insertion force than their counterparts. The rate of grade 2 or greater ureteral injury was lower in the α-blockade group than in controls (p = 0.038). No injury occurred in any case in which ureteral access sheath insertion force did not exceed 600 G. Preoperative α-blockade and slow sheath placement may reduce maximal ureteral access sheath insertion force. If the force exceeds 600 G, a smaller diameter sheath may be an alternative. Alternatively the procedure can be terminated and followed later by pre-stented retrograde intrarenal surgery. Copyright © 2018 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  13. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  14. Can antibiotic use be both just and sustainable... or only more or less so?

    PubMed

    Millar, Michael

    2011-03-01

    Antibiotic resistance threatens the capacity to treat life-threatening infections. If it is accepted that it will be many years (if not decades) until the production of new antibiotics overcomes current concerns with antibiotic resistance then ways to conserve the effectiveness of current antibiotics will have to be found. For many bacterial agents of infection levels of antibiotic resistance are directly dependent on the quantity of antibiotic prescribed. Antibiotics are currently underutilised in many parts of the world. If a just distribution of access to antibiotics requires equal access for individuals with equal need irrespective of wealth then responding to this requirement of justice has the potential to shorten the effective life of currently available antibiotics. Increasing the range and numbers of individuals treated with antibiotics would seem to threaten sustainability and also potentially undermine the access of future generations to cost-effective treatments for bacterial infection. The control of antibiotic resistance requires that the determinants of infectious disease transmission are addressed, such as poor housing, education and nutrition as well as the provision of antibiotics. The apparent tension between intragenerational justice and sustainability diminishes when the account of distributive justice extends beyond access to antibiotics and includes plural entitlements. Controlling antibiotic resistance requires more than the redistribution or reduction (in the overall use) of antibiotics.

  15. Review of manual control methods for handheld maneuverable instruments.

    PubMed

    Fan, Chunman; Dodou, Dimitra; Breedveld, Paul

    2013-06-01

    By the introduction of new technologies, surgical procedures have been varying from free access in open surgery towards limited access in minimal access surgery. Improving access to difficult-to-reach anatomic sites, e.g. in neurosurgery or percutaneous interventions, needs advanced maneuverable instrumentation. Advances in maneuverable technology require the development of dedicated methods enabling surgeons to stay in direct, manual control of these complex instruments. This article gives an overview of the state-of-the-art in the development of manual control methods for handheld maneuverable instruments. It categorizes the manual control methods in three levels: a) number of steerable segments, b) number of Degrees Of Freedom (DOF), and c) coupling between control motion of the handle and steering motion of the tip. The literature research was completed by using Web of Science, Scopus and PubMed. The study shows that in controlling single steerable segments, direct as well as indirect control methods have been developed, whereas in controlling multiple steerable segments, a gradual shift can be noticed from parallel and serial control to integrated control. The development of multi-segmented maneuverable instruments is still at an early stage, and an intuitive and effective method to control them has to become a primary focus in the domain of minimal access surgery.

  16. An SSH key management system: easing the pain of managing key/user/account associations

    NASA Astrophysics Data System (ADS)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  17. Stably accessing octave-spanning microresonator frequency combs in the soliton regime.

    PubMed

    Li, Qing; Briles, Travis C; Westly, Daron A; Drake, Tara E; Stone, Jordan R; Ilic, B Robert; Diddams, Scott A; Papp, Scott B; Srinivasan, Kartik

    2017-02-01

    Microresonator frequency combs can be an enabling technology for optical frequency synthesis and timekeeping in low size, weight, and power architectures. Such systems require comb operation in low-noise, phase-coherent states such as solitons, with broad spectral bandwidths (e.g., octave-spanning) for self-referencing to detect the carrier-envelope offset frequency. However, accessing such states is complicated by thermo-optic dispersion. For example, in the Si 3 N 4 platform, precisely dispersion-engineered structures can support broadband operation, but microsecond thermal time constants often require fast pump power or frequency control to stabilize the solitons. In contrast, here we consider how broadband soliton states can be accessed with simple pump laser frequency tuning, at a rate much slower than the thermal dynamics. We demonstrate octave-spanning soliton frequency combs in Si 3 N 4 microresonators, including the generation of a multi-soliton state with a pump power near 40 mW and a single-soliton state with a pump power near 120 mW. We also develop a simplified two-step analysis to explain how these states are accessed without fast control of the pump laser, and outline the required thermal properties for such operation. Our model agrees with experimental results as well as numerical simulations based on a Lugiato-Lefever equation that incorporates thermo-optic dispersion. Moreover, it also explains an experimental observation that a member of an adjacent mode family on the red-detuned side of the pump mode can mitigate the thermal requirements for accessing soliton states.

  18. An integrated set of UNIX based system tools at control room level

    NASA Astrophysics Data System (ADS)

    Potepan, F.; Scafuri, C.; Bortolotto, C.; Surace, G.

    1994-12-01

    The design effort of providing a simple point-and-click approach to the equipment access has led to the definition and realization of a modular set of software tools to be used at the ELETTRA control room level. Point-to-point equipment access requires neither programming nor specific knowledge of the control system architecture. The development and integration of communication, graphic, editing and global database modules are described in depth, followed by a report of their use in the first commissioning period.

  19. SERVER DEVELOPMENT FOR NSLS-II PHYSICS APPLICATIONS AND PERFORMANCE ANALYSIS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen, G.; Kraimer, M.

    2011-03-28

    The beam commissioning software framework of NSLS-II project adopts a client/server based architecture to replace the more traditional monolithic high level application approach. The server software under development is available via an open source sourceforge project named epics-pvdata, which consists of modules pvData, pvAccess, pvIOC, and pvService. Examples of two services that already exist in the pvService module are itemFinder, and gather. Each service uses pvData to store in-memory transient data, pvService to transfer data over the network, and pvIOC as the service engine. The performance benchmarking for pvAccess and both gather service and item finder service are presented inmore » this paper. The performance comparison between pvAccess and Channel Access are presented also. For an ultra low emittance synchrotron radiation light source like NSLS II, the control system requirements, especially for beam control are tight. To control and manipulate the beam effectively, a use case study has been performed to satisfy the requirement and theoretical evaluation has been performed. The analysis shows that model based control is indispensable for beam commissioning and routine operation. However, there are many challenges such as how to re-use a design model for on-line model based control, and how to combine the numerical methods for modeling of a realistic lattice with the analytical techniques for analysis of its properties. To satisfy the requirements and challenges, adequate system architecture for the software framework for beam commissioning and operation is critical. The existing traditional approaches are self-consistent, and monolithic. Some of them have adopted a concept of middle layer to separate low level hardware processing from numerical algorithm computing, physics modelling, data manipulating and plotting, and error handling. However, none of the existing approaches can satisfy the requirement. A new design has been proposed by introducing service oriented architecture technology, and client interface is undergoing. The design and implementation adopted a new EPICS implementation, namely epics-pvdata [9], which is under active development. The implementation of this project under Java is close to stable, and binding to other language such as C++ and/or Python is undergoing. In this paper, we focus on the performance benchmarking and comparison for pvAccess and Channel Access, the performance evaluation for 2 services, gather and item finder respectively.« less

  20. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices...

  1. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  2. A New Signaling Architecture THREP with Autonomous Radio-Link Control for Wireless Communications Systems

    NASA Astrophysics Data System (ADS)

    Hirono, Masahiko; Nojima, Toshio

    This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.

  3. Supporting NATO C2-Simulation Experimentation with Scripted Web Services

    DTIC Science & Technology

    2011-06-01

    SBMLServices services must parse the input scripts. • Semaphores are created to insure serial access to the remaining global resources: − Since there can only...be one connection to the JC3IEDM RI, that connection now must be shared among all instances; this requires a semaphore to control access...Initialization of SBMLServer is also now protected by a semaphore . • Setting and using object identifiers (OIDs) for pushing to the RI requires

  4. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  5. 48 CFR 235.071 - Export-controlled items.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Export-controlled items..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 235.071 Export-controlled items. For requirements regarding access to export-controlled items, see Subpart 204.73. [73 FR...

  6. Defense Message System Way Ahead: Conclusions and Recommendations from the Industry Advisory Panel

    DTIC Science & Technology

    2000-03-01

    access terminals • Increasing requirement for authentication and data security for conducting business • Mergers and acquisitions in Internet space...market, used to carry PKI certificates for all types of security services including access control, confidentiality, integrity, and non-repudiation...Wireless access widespread § Unified messaging pervasive § Security /privacy dependent on service provider Long-term § Highly reliable systems

  7. 76 FR 38647 - Notice of Proposed Information Collection Requests

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... for the Access to Telework Program under the Rehabilitation Act of 1973, as Amended. OMB Control... states currently have Access to Telework programs that provide financial loans to individuals with... that is not required for submission by the Telework grantees, further reducing the burden from...

  8. 10 CFR 960.5-2-2 - Site ownership and control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NUCLEAR WASTE REPOSITORY Preclosure Guidelines Preclosure Radiological Safety § 960.5-2-2 Site ownership... control of access that are required in order that surface and subsurface activities during repository...

  9. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  10. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  11. Florida's Response to Serving Citizens in the Information Age.

    ERIC Educational Resources Information Center

    Jones, Daryl L.

    1995-01-01

    Florida's Joint Committee on Information Technology Resources analyzed the impact of technology on the Florida Public Records Law and proposed legislation requiring agencies to consider issues such as encouraging a diversity of sources, the public's right to access, prohibiting monopoly control, and access fees in the development of information…

  12. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  13. Defense Finance and Accounting Service Needs to Strengthen Procedures to Comply with the Federal Financial Management Improvement Act

    DTIC Science & Technology

    2012-08-14

    Improvement Act requirements and secure access to two payroll offices at Indianapolis, Indiana, that process sensitive payroll information. We...Without adequate controls over physical access, individuals could gain unauthorized access to computers and sensitive payroll data contained in online...and resolved. 2  Personnel and payroll data transmitted to and from interfacing systems were transferred completely, accurately, and timely

  14. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  15. Stably accessing octave-spanning microresonator frequency combs in the soliton regime

    PubMed Central

    Li, Qing; Briles, Travis C.; Westly, Daron A.; Drake, Tara E.; Stone, Jordan R.; Ilic, B. Robert; Diddams, Scott A.; Papp, Scott B.; Srinivasan, Kartik

    2017-01-01

    Microresonator frequency combs can be an enabling technology for optical frequency synthesis and timekeeping in low size, weight, and power architectures. Such systems require comb operation in low-noise, phase-coherent states such as solitons, with broad spectral bandwidths (e.g., octave-spanning) for self-referencing to detect the carrier-envelope offset frequency. However, accessing such states is complicated by thermo-optic dispersion. For example, in the Si3N4 platform, precisely dispersion-engineered structures can support broadband operation, but microsecond thermal time constants often require fast pump power or frequency control to stabilize the solitons. In contrast, here we consider how broadband soliton states can be accessed with simple pump laser frequency tuning, at a rate much slower than the thermal dynamics. We demonstrate octave-spanning soliton frequency combs in Si3N4 microresonators, including the generation of a multi-soliton state with a pump power near 40 mW and a single-soliton state with a pump power near 120 mW. We also develop a simplified two-step analysis to explain how these states are accessed without fast control of the pump laser, and outline the required thermal properties for such operation. Our model agrees with experimental results as well as numerical simulations based on a Lugiato-Lefever equation that incorporates thermo-optic dispersion. Moreover, it also explains an experimental observation that a member of an adjacent mode family on the red-detuned side of the pump mode can mitigate the thermal requirements for accessing soliton states. PMID:28603754

  16. Analysis and Simulation of Traffic Control for Resource Management in DVB-Based Broadband Satellite Access Networks

    NASA Astrophysics Data System (ADS)

    Impemba, Ernesto; Inzerilli, Tiziano

    2003-07-01

    Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.

  17. Spanish-language community-based mental health treatment programs, policy-required language-assistance programming, and mental health treatment access among Spanish-speaking clients.

    PubMed

    Snowden, Lonnie R; McClellan, Sean R

    2013-09-01

    We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California's Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997-2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services.

  18. Spanish-Language Community-Based Mental Health Treatment Programs, Policy-Required Language-Assistance Programming, and Mental Health Treatment Access Among Spanish-Speaking Clients

    PubMed Central

    McClellan, Sean R.

    2013-01-01

    Objectives. We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California’s Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Methods. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997–2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. Results. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Conclusions. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services. PMID:23865663

  19. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    PubMed Central

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  20. Selected aspects of tobacco control in Croatia.

    PubMed

    Loubeau, Patricia R

    2009-03-01

    This paper seeks to outline the challenges of tobacco consumption control in the transitional economy of Croatia. It focuses on issues of taxation, high unemployment, and smuggling while attempting to meet European Union (EU) accession requirements for tobacco control legislation that reduces smoking consumption. The issue of tobacco control is not a simple one and requires a multi-pronged approach. While Croatia has made good progress in adopting legislation, it needs to strengthen its efforts both in terms of enforcement and increased taxation of cigarettes.

  1. On-board processing satellite network architecture and control study

    NASA Technical Reports Server (NTRS)

    Campanella, S. Joseph; Pontano, Benjamin A.; Chalmers, Harvey

    1987-01-01

    The market for telecommunications services needs to be segmented into user classes having similar transmission requirements and hence similar network architectures. Use of the following transmission architecture was considered: satellite switched TDMA; TDMA up, TDM down; scanning (hopping) beam TDMA; FDMA up, TDM down; satellite switched MF/TDMA; and switching Hub earth stations with double hop transmission. A candidate network architecture will be selected that: comprises multiple access subnetworks optimized for each user; interconnects the subnetworks by means of a baseband processor; and optimizes the marriage of interconnection and access techniques. An overall network control architecture will be provided that will serve the needs of the baseband and satellite switched RF interconnected subnetworks. The results of the studies shall be used to identify elements of network architecture and control that require the greatest degree of technology development to realize an operational system. This will be specified in terms of: requirements of the enabling technology; difference from the current available technology; and estimate of the development requirements needed to achieve an operational system. The results obtained for each of these tasks are presented.

  2. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  3. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    NASA Astrophysics Data System (ADS)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective integration with services and resources which they must protect. Effective policy and governance structures are needed for ongoing operations Federated identity infrastructures often exist only at the national level making it difficult for international research collaborations to exploit them.

  4. 17 CFR 240.17i-5 - Record creation, maintenance, and access requirements for supervised investment bank holding...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be established...

  5. 17 CFR 240.17i-5 - Record creation, maintenance, and access requirements for supervised investment bank holding...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be established...

  6. 17 CFR 240.17i-5 - Record creation, maintenance, and access requirements for supervised investment bank holding...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be established...

  7. 17 CFR 240.17i-5 - Record creation, maintenance, and access requirements for supervised investment bank holding...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... shall make and keep current the following records: (1) A record reflecting the results of stress tests...; and (5) Records documenting the system of internal risk management controls required to be established...

  8. 78 FR 52808 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-26

    ... access to customers or other persons, to implement risk management controls and supervisory procedures... requires brokers or dealers to establish, document, and maintain certain risk management controls and... of its risk management controls as part of its books and records in a manner consistent with Rule 17a...

  9. 40 CFR 63.962 - Standards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... shall control air emissions from the individual drain system using one or a combination of the following... closure device. (3) Junction box control requirements. Each junction box shall be equipped with controls as follows: (i) The junction box shall be equipped with a closure device (e.g., manhole cover, access...

  10. 40 CFR 63.962 - Standards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... shall control air emissions from the individual drain system using one or a combination of the following... closure device. (3) Junction box control requirements. Each junction box shall be equipped with controls as follows: (i) The junction box shall be equipped with a closure device (e.g., manhole cover, access...

  11. 40 CFR 63.962 - Standards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... shall control air emissions from the individual drain system using one or a combination of the following... closure device. (3) Junction box control requirements. Each junction box shall be equipped with controls as follows: (i) The junction box shall be equipped with a closure device (e.g., manhole cover, access...

  12. 40 CFR 63.962 - Standards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... shall control air emissions from the individual drain system using one or a combination of the following... closure device. (3) Junction box control requirements. Each junction box shall be equipped with controls as follows: (i) The junction box shall be equipped with a closure device (e.g., manhole cover, access...

  13. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  14. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  15. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  16. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  17. 46 CFR 116.530 - Fire control plan.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Fire control plan. 116.530 Section 116.530 Shipping... and Embarkation Station Requirements § 116.530 Fire control plan. A fire control plan must be posted on the vessel in a location that is accessible and visible to all passengers. The plan must show...

  18. 77 FR 37058 - Draft Guidance for Industry and Food and Drug Administration Staff; Class II Special Controls...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ...] Draft Guidance for Industry and Food and Drug Administration Staff; Class II Special Controls Guidance... availability of the draft guidance entitled ``Class II Special Controls Guidance Document: Implanted Blood... blood access devices may comply with the requirement of special controls for class II devices. This...

  19. The OPL Access Control Policy Language

    NASA Astrophysics Data System (ADS)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  20. Enterprise systems security management: a framework for breakthrough protection

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.

    2010-04-01

    Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.

  1. Current Hale ROA Voice and Control Communication Practices and Performance: White Paper

    NASA Technical Reports Server (NTRS)

    2007-01-01

    The objective of this white paper is to help achieve the ACCESS 5 goal by sharing the UNITE members knowledge of current HALE ROA communication systems with other ACCESS 5 participants so that all interested parties start from a common understanding as we begin the clarification of requirements for voice and C2 communication. This white paper is also intended to describe the point of departure for any future developments that need to be realized to achieve the long term ACCESS 5 goal. Although this white paper describes the current systems, the functional and performance requirements that are also being developed under ACCESS 5 may not require the same levels of functionality and performance as currently exist. The paper addresses the following: 1) A description of a typical current HALE ROA communications system, 2) HALE ROA communications systems performance metrics, 3) HALE ROA communications systems performance, and 5) A comparison of current HALE ROA communications systems with current regulations.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not tomore » unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.« less

  3. Acceptance test report (MI-74067-009-00). SVWS access arm (Serial number AA-09-03) (drawing 75M08129-13)

    NASA Technical Reports Server (NTRS)

    Hagood, J. T.

    1973-01-01

    Acceptance tests were conducted at Kennedy Space Center of the Saturn Vehicle Workshop Spacecraft Access Arm and related equipment. The tests were conducted to prove complete system capability to operate satisfactorily under conditions required to support spacecraft operations and activities. The SVWS Access Arm, serial number AA-09-03, is a Command Module Service Arm, S/A 9, which was removed from the mobile launcher and modified to support the SVWS operations. The C/M environmental chamber was removed and a completely new chamber was installed. The retract system was redesigned to remove the automatic/remote control capability and replaced with a local manual control. The SVWS Access Arm System was successfully tested and supported spacecraft processing without major problems.

  4. An Extended Role-Based Access Control Model for Delegating Obligations

    NASA Astrophysics Data System (ADS)

    Ben-Ghorbel-Talbi, Meriam; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Bouhoula, Adel

    The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the administration and delegation of obligations. Managing such delegations implies more requirements than managing traditional privileges delegation. In fact, delegating obligations may include two interpretations: the delegation of the obligation and the delegation of the responsibility related to this obligation. Therefore, it is important to deal with these two notions separately. Moreover, since delegating an obligation involves the delegation of sanctions, then the consent of the user who receives this delegation may be required in some cases. We address in this paper these requirements and we propose a formalism to deal with them.

  5. Feedback power control strategies in wireless sensor networks with joint channel decoding.

    PubMed

    Abrardo, Andrea; Ferrari, Gianluigi; Martalò, Marco; Perna, Fabio

    2009-01-01

    In this paper, we derive feedback power control strategies for block-faded multiple access schemes with correlated sources and joint channel decoding (JCD). In particular, upon the derivation of the feasible signal-to-noise ratio (SNR) region for the considered multiple access schemes, i.e., the multidimensional SNR region where error-free communications are, in principle, possible, two feedback power control strategies are proposed: (i) a classical feedback power control strategy, which aims at equalizing all link SNRs at the access point (AP), and (ii) an innovative optimized feedback power control strategy, which tries to make the network operational point fall in the feasible SNR region at the lowest overall transmit energy consumption. These strategies will be referred to as "balanced SNR" and "unbalanced SNR," respectively. While they require, in principle, an unlimited power control range at the sources, we also propose practical versions with a limited power control range. We preliminary consider a scenario with orthogonal links and ideal feedback. Then, we analyze the robustness of the proposed power control strategies to possible non-idealities, in terms of residual multiple access interference and noisy feedback channels. Finally, we successfully apply the proposed feedback power control strategies to a limiting case of the class of considered multiple access schemes, namely a central estimating officer (CEO) scenario, where the sensors observe noisy versions of a common binary information sequence and the AP's goal is to estimate this sequence by properly fusing the soft-output information output by the JCD algorithm.

  6. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  7. 77 FR 65372 - Agency Information Collection Activities; Submission to the Office of Management and Budget for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... System. OMB Control Number: Pending. Type of Review: New collection, request for a new OMB Control Number... been issued the required two factor authentication tokens can access the FS SAS. The FS SAS allows...

  8. Design of a patient-centered, multi-institutional healthcare information network using peer-to-peer communication in a highly distributed architecture.

    PubMed

    Geissbuhler, Antoine; Spahni, Stéphane; Assimacopoulos, André; Raetzo, Marc-André; Gobet, Gérard

    2004-01-01

    to design a community healthcare information network for all 450,000 citizen in the State of Geneva, Switzerland, connecting public and private healthcare professionals. Requirements include the decentralized storage of information at the source of its production, the creation of a virtual patient record at the time of the consultation, the control by the patient of the access rights to the information, and the interoperability with other similar networks at the national and european level. a participative approach and real-world pilot projects are used to design, test and validate key components of the network, including its technical architecture and the strategy for the management of access rights by the patients. a distributed architecture using peer-to-peer communication of information mediators can implement the various requirements while limiting to an absolute minimum the amount of centralized information. Access control can be managed by the patient with the help of a medical information mediator, the physician of trust.

  9. Provider responses to patients controlling access to their electronic health records: a prospective cohort study in primary care.

    PubMed

    Tierney, William M; Alpert, Sheri A; Byrket, Amy; Caine, Kelly; Leventhal, Jeremy C; Meslin, Eric M; Schwartz, Peter H

    2015-01-01

    Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data. We designed a program that captures patients' preferences for provider access to an urban health system's EHR. Patients could allow or restrict providers' access to all data (diagnoses, medications, test results, reports, etc.) or only highly sensitive data (sexually transmitted infections, HIV/AIDS, drugs/alcohol, mental or reproductive health). Except for information in free-text reports, we redacted EHR data shown to providers according to patients' preferences. Providers could "break the glass" to display redacted information. We prospectively studied this system in one primary care clinic, noting redactions and when users "broke the glass," and surveyed providers about their experiences and opinions. Eight of nine eligible clinic physicians and all 23 clinic staff participated. All 105 patients who enrolled completed the preference program. Providers did not know which of their patients were enrolled, nor their preferences for accessing their EHRs. During the 6-month prospective study, 92 study patients (88 %) returned 261 times, during which providers viewed their EHRs 126 times (48 %). Providers "broke the glass" 102 times, 92 times for patients not in the study and ten times for six returning study patients, all of whom had restricted EHR access. Providers "broke the glass" for six (14 %) of 43 returning study patients with redacted data vs. zero among 49 study patients without redactions (p = 0.01). Although 54 % of providers agreed that patients should have control over who sees their EHR information, 58 % believed restricting EHR access could harm provider-patient relationships and 71 % felt quality of care would suffer. Patients frequently preferred restricting provider access to their EHRs. Providers infrequently overrode patients' preferences to view hidden data. Providers believed that restricting EHR access would adversely impact patient care. Applying Fair Information Practice principles to EHRs will require balancing patient preferences, providers' needs, and health care quality.

  10. A development framework for artificial intelligence based distributed operations support systems

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.; Cottman, Bruce H.

    1990-01-01

    Advanced automation is required to reduce costly human operations support requirements for complex space-based and ground control systems. Existing knowledge based technologies have been used successfully to automate individual operations tasks. Considerably less progress has been made in integrating and coordinating multiple operations applications for unified intelligent support systems. To fill this gap, SOCIAL, a tool set for developing Distributed Artificial Intelligence (DAI) systems is being constructed. SOCIAL consists of three primary language based components defining: models of interprocess communication across heterogeneous platforms; models for interprocess coordination, concurrency control, and fault management; and for accessing heterogeneous information resources. DAI applications subsystems, either new or existing, will access these distributed services non-intrusively, via high-level message-based protocols. SOCIAL will reduce the complexity of distributed communications, control, and integration, enabling developers to concentrate on the design and functionality of the target DAI system itself.

  11. Patients' experiences of an open access follow up arrangement in managing inflammatory bowel disease

    PubMed Central

    Rogers, A; Kennedy, A; Nelson, E; Robinson, A

    2004-01-01

    Background: Improving access is a key policy issue in improving quality of care and extending patient choice and participation. People's experience of changing from fixed outpatient appointments to more flexible direct access arrangements for chronic disease has been underexplored. Objectives: To examine patients' views on using an open system of access compared with fixed outpatient appointments as part of a guided self-management intervention for inflammatory bowel disease (IBD). Design: Embedded qualitative study undertaken alongside a randomised controlled trial. Semi-structured interviews were undertaken to obtain an in depth understanding of patients' experience of the change in access arrangements. Participants: A purposive sample (n = 30) was drawn from the intervention group (n = 700) according to a range of responses to the trial baseline and follow up quantitative measures. Results: 28 interviews were included in the analysis. Compared with the previous system of fixed appointments, preference for the new open access system was based on enhanced personal control in contacting services and the view that it fitted better with everyday routine management and the requirement for urgent medical contact when symptoms fail to respond to medication. Preference for retaining fixed appointments was based on a sense of security from gaining access which did not require the individual to initiate the request for medical help. Conclusions: Open access may fit better with patients' self-management of their condition and everyday routines, roles and responsibilities. Ensuring that outpatient organisational arrangements and personnel are responsive to patient initiated requests for appointments is likely to impact on the acceptability of this type of access arrangement. Some people may continue to prefer the fixed appointment system which should be retained if patient choice is to be respected. PMID:15465941

  12. Security in Distributed Collaborative Environments: Limitations and Solutions

    NASA Astrophysics Data System (ADS)

    Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel

    The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.

  13. 21 CFR 1311.120 - Electronic prescription application requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... the practitioner to sign multiple prescriptions for a single patient at one time using a single... practitioners, a practitioner authorized to sign controlled substance prescriptions must approve logical access... application must require the practitioner or his agent to select the DEA registration number to be included on...

  14. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  15. 36 CFR 1192.37 - Stop request.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY GUIDELINES FOR TRANSPORTATION VEHICLES Buses, Vans and... shall provide auditory and visual indications that the request has been made. (b) Controls required by...

  16. Detecting Payload Attacks on Programmable Logic Controllers (PLCs)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan

    Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less

  17. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  18. Human Systems Integration: Requirements and Functional Decomposition

    NASA Technical Reports Server (NTRS)

    Berson, Barry; Gershzohn, Gary; Boltz, Laura; Wolf, Russ; Schultz, Mike

    2005-01-01

    This deliverable was intended as an input to the Access 5 Policy and Simulation Integrated Product Teams. This document contains high-level pilot functionality for operations in the National Airspace System above FL430. Based on the derived pilot functions the associated pilot information and control requirements are given.

  19. 77 FR 15813 - Preoperational Testing of Instrument and Control Air Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... seismic requirement, ICAS air-dryer testing to meet dew point design requirements, ICAS accumulator check... ensure consideration only for comments received on or before this date. Although a time limit is given... improvements in all published guides are encouraged at any time. ADDRESSES: You may access information and...

  20. 32 CFR 327.7 - Access by individuals

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... comply with the established requirements. This includes refusing to name a physician to receive medical... are kept or discarded at the author's discretion and over which DeCA exercises no direct control, are...; or (ii) An individual fails to comply with the established requirements including refusing to name a...

  1. EPICS Channel Access Server for LabVIEW

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhukov, Alexander P.

    It can be challenging to interface National Instruments LabVIEW (http://www.ni.com/labview/) with EPICS (http://www.aps.anl.gov/epics/). Such interface is required when an instrument control program was developed in LabVIEW but it also has to be part of global control system. This is frequently useful in big accelerator facilities. The Channel Access Server is written in LabVIEW, so it works on any hardware/software platform where LabVIEW is available. It provides full server functionality, so any EPICS client can communicate with it.

  2. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... applicable, individual practitioner's DEA registration expires, unless the registration has been renewed. (3) The institutional practitioner's or, where applicable, individual practitioner's DEA registration is...

  3. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  4. 76 FR 5799 - Prairie Power, Inc.; Notice of Filing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-02

    .... (Midwest ISO) Schedule 2, for reactive supply and voltage control service from certain of its owned... and Midwest ISO requirements for the provision of reactive supply and voltage control under Schedule 2 of the Midwest ISO Open Access Transmission, Energy, and Operating Reserve Markets Tariff, including...

  5. Feedback Power Control Strategies in Wireless Sensor Networks with Joint Channel Decoding

    PubMed Central

    Abrardo, Andrea; Ferrari, Gianluigi; Martalò, Marco; Perna, Fabio

    2009-01-01

    In this paper, we derive feedback power control strategies for block-faded multiple access schemes with correlated sources and joint channel decoding (JCD). In particular, upon the derivation of the feasible signal-to-noise ratio (SNR) region for the considered multiple access schemes, i.e., the multidimensional SNR region where error-free communications are, in principle, possible, two feedback power control strategies are proposed: (i) a classical feedback power control strategy, which aims at equalizing all link SNRs at the access point (AP), and (ii) an innovative optimized feedback power control strategy, which tries to make the network operational point fall in the feasible SNR region at the lowest overall transmit energy consumption. These strategies will be referred to as “balanced SNR” and “unbalanced SNR,” respectively. While they require, in principle, an unlimited power control range at the sources, we also propose practical versions with a limited power control range. We preliminary consider a scenario with orthogonal links and ideal feedback. Then, we analyze the robustness of the proposed power control strategies to possible non-idealities, in terms of residual multiple access interference and noisy feedback channels. Finally, we successfully apply the proposed feedback power control strategies to a limiting case of the class of considered multiple access schemes, namely a central estimating officer (CEO) scenario, where the sensors observe noisy versions of a common binary information sequence and the AP's goal is to estimate this sequence by properly fusing the soft-output information output by the JCD algorithm. PMID:22291536

  6. Game-Based Learning and Information Literacy: A Randomized Controlled Trial to Determine the Efficacy of Two Information Literacy Learning Experiences

    ERIC Educational Resources Information Center

    Wilson, Scott Neal; Engler, Caroline E.; Black, Jessica E.; Yager-Elorriaga, Derik K.; Thompson, William Michael; McConnell, Andrae; Cecena, Javier Elizondo; Ralston, Ryan; Terry, Robert A.

    2017-01-01

    In the 21st century, students have access to a plethora of information. As such, the skills required to access and effectively sort through this information (information literacy skills) become ever more important for success in both academic and non-academic settings. This study sought to assess the efficacy of two educational games designed to…

  7. Tactical Networking Requirements for Digital Command and Control

    DTIC Science & Technology

    2013-06-01

    Enhanced target acquisition platoon concept. Marine Corps Gazette, 89(6), 18-22. Cacas , Max. "Corps Command and Control on the Move." AFCEA. March 2012...Accessed February 05, 2013. http://www.afcea.org/content/?q=node/2893 Cacas , M. (2012). Marines Go Back to the Amphibious Future. Signal Online

  8. Teaching Self-Control to Small Groups of Dually Diagnosed Adults.

    ERIC Educational Resources Information Center

    Dixon, Mark R.; Holcomb, Sharon

    2000-01-01

    A study used a progressive delay procedure to teach self-control to six adults with mental retardation. At baseline, participants chose an immediate smaller reinforcer rather than a larger delayed reinforcer. Progressive increases in work requirements for gaining access to a larger reinforcer resulted in participants selecting larger delayed…

  9. Assessing Self-Control Training in Children with Attention Deficit Hyperactivity Disorder

    ERIC Educational Resources Information Center

    Bloh, Christopher

    2009-01-01

    This study examined the use of a progressive delay procedure with and without a concurrent activity to teach self-control to children with attention deficit hyperactivity disorder. Three participants were initially required to wait progressively longer periods of time for access to preferred edible reinforcers. After demonstrating this…

  10. Step 1: Human System Integration Simulation and Flight Test Progress Report

    NASA Technical Reports Server (NTRS)

    2005-01-01

    The Access 5 Human Systems Integration Work Package produced simulation and flight demonstration planning products for use throughout the program. These included: Test Objectives for Command, Control, Communications; Pilot Questionnaire for Command, Control, Communications; Air Traffic Controller Questionnaire for Command, Control, Communications; Test Objectives for Collision Avoidance; Pilot Questionnaire for Collision Avoidance; Plans for Unmanned Aircraft Systems Control Station Simulations Flight Requirements for the Airspace Operations Demonstration

  11. Vascular Access Outcomes Reported in Maintenance Hemodialysis Trials: A Systematic Review.

    PubMed

    Viecelli, Andrea K; O'Lone, Emma; Sautenet, Benedicte; Craig, Jonathan C; Tong, Allison; Chemla, Eric; Hooi, Lai-Seong; Lee, Timmy; Lok, Charmaine; Polkinghorne, Kevan R; Quinn, Robert R; Vachharajani, Tushar; Vanholder, Raymond; Zuo, Li; Irish, Ashley B; Mori, Trevor A; Pascoe, Elaine M; Johnson, David W; Hawley, Carmel M

    2018-03-01

    Many randomized controlled trials have been performed with the goal of improving outcomes related to hemodialysis vascular access. If the reported outcomes are relevant and measured consistently to allow comparison of interventions across trials, such trials can inform decision making. This study aimed to assess the scope and consistency of vascular access outcomes reported in contemporary hemodialysis trials. Systematic review. Adults requiring maintenance hemodialysis. All randomized controlled trials and trial protocols reporting vascular access outcomes identified from ClinicalTrials.gov, Embase, MEDLINE, and the Cochrane Kidney and Transplant Specialized Register from January 2011 to June 2016. Any hemodialysis-related intervention. The frequency and characteristics of vascular access outcome measures were analyzed and classified. From 168 relevant trials, 1,426 access-related outcome measures were extracted and classified into 23 different outcomes. The 3 most common outcomes were function (136 [81%] trials), infection (63 [38%]), and maturation (31 [18%]). Function was measured in 489 different ways, but most frequently reported as "mean access blood flow (mL/min)" (37 [27%] trials) and "number of thromboses" (30 [22%]). Infection was assessed in 136 different ways, with "number of access-related infections" being the most common measure. Maturation was assessed in 44 different ways at 15 different time points and most commonly characterized by vein diameter and blood flow. Patient-reported outcomes, including pain (19 [11%]) and quality of life (5 [3%]), were reported infrequently. Only a minority of trials used previously standardized outcome definitions. Restricted sampling frame for feasibility and focus on contemporary trials. The reporting of access outcomes in hemodialysis trials is very heterogeneous, with limited patient-reported outcomes and infrequent use of standardized outcome measures. Efforts to standardize outcome reporting for vascular access are critical to optimizing the comparability, reliability, and value of trial evidence to improve outcomes for patients requiring hemodialysis. Copyright © 2017 National Kidney Foundation, Inc. All rights reserved.

  12. Quantified Trust Levels for Authentication

    NASA Astrophysics Data System (ADS)

    Thomas, Ivonne; Menzel, Michael; Meinel, Christoph

    Service-oriented Architectures (SOAs) facilitate applications to integrate seamlessly services from collaborating business partners regardless of organizational borders. In order to secure access to these services, mechanisms for authentication and authorisation must be deployed that control the access based on identity-related information. To enable a business partners’ users to access the provided services, an identity federation is often established that enables the brokering of identity information across organisational borders. The establishment of such a federation requires complex agreements and contracts that define common policies, obligations and procedures. Generally, this includes obligations on the authentication process as well.

  13. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  14. Verification of Security Policy Enforcement in Enterprise Systems

    NASA Astrophysics Data System (ADS)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  15. Planning assistance for the NASA 30/20 GHz program. Network control architecture study.

    NASA Technical Reports Server (NTRS)

    Inukai, T.; Bonnelycke, B.; Strickland, S.

    1982-01-01

    Network Control Architecture for a 30/20 GHz flight experiment system operating in the Time Division Multiple Access (TDMA) was studied. Architecture development, identification of processing functions, and performance requirements for the Master Control Station (MCS), diversity trunking stations, and Customer Premises Service (CPS) stations are covered. Preliminary hardware and software processing requirements as well as budgetary cost estimates for the network control system are given. For the trunking system control, areas covered include on board SS-TDMA switch organization, frame structure, acquisition and synchronization, channel assignment, fade detection and adaptive power control, on board oscillator control, and terrestrial network timing. For the CPS control, they include on board processing and adaptive forward error correction control.

  16. 78 FR 19689 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-02

    ... proposed collection of information is necessary for the proper performance of the functions of the agency....) but is not required for that person to be registered and gain access to the controlled installation...

  17. Passive serialization in a multitasking environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hennessey, J.P.; Osisek, D.L.; Seigh, J.W. II

    1989-02-28

    In a multiprocessing system having a control program in which data objects are shared among processes, this patent describes a method for serializing references to a data object by the processes so as to prevent invalid references to the data object by any process when an operation requiring exclusive access is performed by another process, comprising the steps of: permitting the processes to reference data objects on a shared access basis without obtaining a shared lock; monitoring a point of execution of the control program which is common to all processes in the system, which occurs regularly in the process'more » execution and across which no references to any data object can be maintained by any process, except references using locks; establishing a system reference point which occurs after each process in the system has passed the point of execution at least once since the last such system reference point; requesting an operation requiring exclusive access on a selected data object; preventing subsequent references by other processes to the selected data object; waiting until two of the system references points have occurred; and then performing the requested operation.« less

  18. Effect of expansions in state Medicaid eligibility on access to care and the use of emergency department services for adult Medicaid enrollees.

    PubMed

    Ndumele, Chima D; Mor, Vincent; Allen, Susan; Burgess, James F; Trivedi, Amal N

    2014-06-01

    Medicaid enrollees typically report worse access to care than other insured populations. Expansions in Medicaid through less restrictive income eligibility requirements and the resulting influx of new enrollees may further erode access to care for those already enrolled in Medicaid. To assess the effect of previous Medicaid expansions on self-reported access to care and the use of emergency department services by Medicaid enrollees. Quasi-experimental difference-in-differences design among 1714 adult Medicaid enrollees in 10 states that expanded Medicaid between June 1, 2000, and October 1, 2009, and 5097 Medicaid enrollees in 14 bordering control states that did not expand Medicaid. Self-reported access to care and annualized emergency department use. Among states expanding their Medicaid program for adults, the mean income eligibility level increased from 82.6% to 144.2% of the federal poverty level. Income eligibility in matched control states remained constant at 77.1% of the federal poverty level. The proportion of adults reporting being enrolled in Medicaid increased from 7.2% to 8.8% in expansion states and from 6.1% to 6.4% in matched control states. In Medicaid program expansion states, the proportion of Medicaid enrollees reporting poor access to care declined from 8.5% before the expansion to 7.3% after the expansion. In matched control states, the proportion of Medicaid enrollees reporting poor access to care remained constant at 5.3%. The proportion of enrollees reporting any emergency department use decreased from 41.2% to 40.1% in expansion states and from 37.3% to 36.1% in matched control states. In the period following expansions, newly eligible enrollees reported poorer access to care than previously enrolled beneficiaries, although the overall difference between groups did not reach statistical significance. We found no evidence that expanding the number of individuals eligible for Medicaid coverage eroded perceived access to care or increased the use of emergency services among adult Medicaid enrollees.

  19. Electromagnetic malfunction of semiconductor-type electronic personal dosimeters caused by access control systems for radiation facilities.

    PubMed

    Deji, Shizuhiko; Ito, Shigeki; Ariga, Eiji; Mori, Kazuyuki; Hirota, Masahiro; Saze, Takuya; Nishizawa, Kunihide

    2006-08-01

    High frequency electromagnetic fields in the 120 kHz band emitted from card readers for access control systems in radiation control areas cause abnormally high and erroneous indicated dose readings on semiconductor-type electronic personal dosimeters (SEPDs). All SEPDs malfunctioned but recovered their normal performance by resetting after the exposure ceased. The minimum distances required to prevent electromagnetic interference varied from 5.0 to 38.0 cm. The electric and magnetic immunity levels ranged from 35.1 to 267.6 V m(-1) and from 1.0 to 16.6 A m(-1), respectively. Electromagnetic immunity levels of SEPDs should be strengthened from the standpoint of radiation protection.

  20. Packet communications in satellites with multiple-beam antennas and signal processing

    NASA Technical Reports Server (NTRS)

    Davies, R.; Chethik, F.; Penick, M.

    1980-01-01

    A communication satellite with a multiple-beam antenna and onboard signal processing is considered for use in a 'message-switched' data relay system. The signal processor may incorporate demodulation, routing, storage, and remodulation of the data. A system user model is established and key functional elements for the signal processing are identified. With the throughput and delay requirements as the controlled variables, the hardware complexity, operational discipline, occupied bandwidth, and overall user end-to-end cost are estimated for (1) random-access packet switching; and (2) reservation-access packet switching. Other aspects of this network (eg, the adaptability to channel switched traffic requirements) are examined. For the given requirements and constraints, the reservation system appears to be the most attractive protocol.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dykstra, D.; Blomer, J.

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFSmore » and Frontier.« less

  2. Evaluation of Standards for Access Control Enabling PHR-S Federation.

    PubMed

    Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan

    2017-01-01

    The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.

  3. Minimizing opportunity costs to aquatic connectivity restoration while controlling an invasive species.

    PubMed

    Milt, Austin W; Diebel, Matthew W; Doran, Patrick J; Ferris, Michael C; Herbert, Matthew; Khoury, Mary L; Moody, Allison T; Neeson, Thomas M; Ross, Jared; Treska, Ted; O'Hanley, Jesse R; Walter, Lisa; Wangen, Steven R; Yacobson, Eugene; McIntyre, Peter B

    2018-03-08

    Controlling invasive species is critical for conservation but can have unintended consequences for native species and divert resources away from other efforts. This dilemma occurs on a grand scale in the North American Great Lakes, where dams and culverts block tributary access to habitat of desirable fish species and are a lynchpin of long-standing efforts to limit ecological damage inflicted by the invasive, parasitic sea lamprey (Petromyzon marinus). Habitat restoration and sea-lamprey control create conflicting goals for managing aging infrastructure. We used optimization to minimize opportunity costs of habitat gains for 37 desirable migratory fishes that arose from restricting sea lamprey access (0-25% increase) when selecting barriers for removal under a limited budget (US$1-105 million). Imposing limits on sea lamprey habitat reduced gains in tributary access for desirable species by 15-50% relative to an unconstrained scenario. Additional investment to offset the effect of limiting sea-lamprey access resulted in high opportunity costs for 30 of 37 species (e.g., an additional US$20-80 million for lake sturgeon [Acipenser fulvescens]) and often required ≥5% increase in sea-lamprey access to identify barrier-removal solutions adhering to the budget and limiting access. Narrowly distributed species exhibited the highest opportunity costs but benefited more at less cost when small increases in sea-lamprey access were allowed. Our results illustrate the value of optimization in limiting opportunity costs when balancing invasion control against restoration benefits for diverse desirable species. Such trade-off analyses are essential to the restoration of connectivity within fragmented rivers without unleashing invaders. © 2018 Society for Conservation Biology.

  4. 78 FR 14564 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-06

    ... due to the fact that the Family Smoking Prevention and Tobacco Control Act, which gives the Food and... actively enforcing the vending machine requirements of the Family Smoking Prevention and Tobacco Control Act''). This new option is included because federal law bans vending machines in youth accessible...

  5. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    PubMed Central

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  6. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  7. Development of a HIPAA-compliant environment for translational research data and analytics.

    PubMed

    Bradford, Wayne; Hurdle, John F; LaSalle, Bernie; Facelli, Julio C

    2014-01-01

    High-performance computing centers (HPC) traditionally have far less restrictive privacy management policies than those encountered in healthcare. We show how an HPC can be re-engineered to accommodate clinical data while retaining its utility in computationally intensive tasks such as data mining, machine learning, and statistics. We also discuss deploying protected virtual machines. A critical planning step was to engage the university's information security operations and the information security and privacy office. Access to the environment requires a double authentication mechanism. The first level of authentication requires access to the university's virtual private network and the second requires that the users be listed in the HPC network information service directory. The physical hardware resides in a data center with controlled room access. All employees of the HPC and its users take the university's local Health Insurance Portability and Accountability Act training series. In the first 3 years, researcher count has increased from 6 to 58.

  8. Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.

    PubMed

    Eom, Jieun; Lee, Dong Hoon; Lee, Kwangsu

    2016-12-01

    In recent years, many countries have been trying to integrate electronic health data managed by each hospital to offer more efficient healthcare services. Since health data contain sensitive information of patients, there have been much research that present privacy preserving mechanisms. However, existing studies either require a patient to perform various steps to secure the data or restrict the patient to exerting control over the data. In this paper, we propose patient-controlled attribute-based encryption, which enables a patient (a data owner) to control access to the health data and reduces the operational burden for the patient, simultaneously. With our method, the patient has powerful control capability of his/her own health data in that he/she has the final say on the access with time limitation. In addition, our scheme provides emergency medical services which allow the emergency staffs to access the health data without the patient's permission only in the case of emergencies. We prove that our scheme is secure under cryptographic assumptions and analyze its efficiency from the patient's perspective.

  9. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.

  10. Evaluation of the resistance of a geopolymer-based drug delivery system to tampering.

    PubMed

    Cai, Bing; Engqvist, Håkan; Bredenberg, Susanne

    2014-04-25

    Tamper-resistance is an important property of controlled-release formulations of opioid drugs. Tamper-resistant formulations aim to increase the degree of effort required to override the controlled release of the drug molecules from extended-release formulations for the purpose of non-medical use. In this study, the resistance of a geopolymer-based formulation to tampering was evaluated by comparing it with a commercial controlled-release tablet using several methods commonly used by drug abusers. Because of its high compressive strength and resistance to heat, much more effort and time was required to extract the drug from the geopolymer-based formulation. Moreover, in the drug-release test, the geopolymer-based formulation maintained its controlled-release characteristics after milling, while the drug was released immediately from the milled commercial tablets, potentially resulting in dose dumping. Although the tampering methods used in this study does not cover all methods that abuser could access, the results obtained by the described methods showed that the geopolymer matrix increased the degree of effort required to override the controlled release of the drug, suggesting that the formulation has improved resistance to some common drug-abuse tampering methods. The geopolymer matrix has the potential to make the opioid product less accessible and attractive to non-medical users. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. Benefit requirements for substance use disorder treatment in state health insurance exchanges.

    PubMed

    Tran Smith, Bikki; Seaton, Kathleen; Andrews, Christina; Grogan, Colleen M; Abraham, Amanda; Pollack, Harold; Friedmann, Peter; Humphreys, Keith

    2018-01-01

    Established in 2014, state health insurance exchanges have greatly expanded substance use disorder (SUD) treatment coverage in the United States as qualified health plans (QHPs) within the exchanges are required to conform to parity provisions laid out by the Affordable Care Act and the Mental Health Parity and Addiction Equity Act (MHPAEA). Coverage improvements, however, have not been even as states have wide discretion over how they meet these regulations. How states regulate SUD treatment benefits offered by QHPs has implications for the accessibility and quality of care. In this study, we assessed the extent to which state insurance departments regulate the types of SUD services and medications plans must provide, as well as their use of utilization controls. Data were collected as part of the National Drug Abuse Treatment System Survey, a nationally-representative, longitudinal study of substance use disorder treatment. Data were obtained from state Departments of Insurance via a 15-minute internet-based survey. States varied widely in regulations on QHPs' administration of SUD treatment benefits. Some states required plans to cover all 11 SUD treatment services and medications we assessed in the study, whereas others did not require plans to cover anything at all. Nearly all states allowed the plans to employ utilization controls, but reported little guidance regarding how they should be used. Although some states have taken full advantage of the health insurance exchanges to increase access to SUD treatment, others seem to have done the bare minimum required by the ACA. By not requiring coverage for the entire SUD continuum of care, states are hindering client access to appropriate types of care necessary for recovery.

  12. A clinical data repository enhances hospital infection control.

    PubMed Central

    Samore, M.; Lichtenberg, D.; Saubermann, L.; Kawachi, C.; Carmeli, Y.

    1997-01-01

    We describe the benefits of a relational database of hospital clinical data (Clinical Data Repository; CDR) for an infection control program. The CDR consists of > 40 Sybase tables, and is directly accessible for ad hoc queries by members of the infection control unit who have been granted privileges for access by the Information Systems Department. The data elements and functional requirements most useful for surveillance of nosocomial infections, antibiotic use, and resistant organisms are characterized. Specific applications of the CDR are presented, including the use of automated definitions of nosocomial infection, graphical monitoring of resistant organisms with quality control limits, and prospective detection of inappropriate antibiotic use. Hospital surveillance and quality improvement activities are significantly benefited by the availability of a querable set of tables containing diverse clinical data. PMID:9357588

  13. An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.

    PubMed

    Li, Huaming; Tan, Jindong

    2005-01-01

    In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.

  14. 42 CFR 1001.1301 - Failure to grant immediate access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...)(3) of the Act; (J) An end-stage renal disease facility is meeting the requirements of section 1881(b...'s statutory functions; or (iv) A State Medicaid fraud control unit for the purpose of conducting its...

  15. Design analysis tracking and data relay satellite simulation system

    NASA Technical Reports Server (NTRS)

    1974-01-01

    The design and development of the equipment necessary to simulate the S-band multiple access link between user spacecraft, the Tracking and Data Relay Satellite, and a ground control terminal are discussed. The core of the S-band multiple access concept is the use of an Adaptive Ground Implemented Phased Array. The array contains thirty channels and provides the multiplexing and demultiplexing equipment required to demonstrate the ground implemented beam forming feature. The system provided will make it possible to demonstrate the performance of a desired user and ten interfering sources attempting to pass data through the multiple access system.

  16. 47 CFR 90.475 - Operation of internal transmitter control systems in specially equipped systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... systems involving fixed systems whose base stations are controlled by such systems may automatically access these base stations through the microwave or operational fixed systems from positions in the PSTN, so long as the base stations and mobile units meet the requirements of § 90.483 and if a separate...

  17. EAC and the Development of National and European Gateways to Archives

    ERIC Educational Resources Information Center

    Ottosson, Per-Gunnar

    2005-01-01

    In the development of gateways to archives there are two different approaches, one focusing on the descriptions of the material and the other on the creators. Search and retrieval with precision and quality require controlled access points and name authority control. National registries of private archives have a long tradition in implementing the…

  18. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...

  19. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...

  20. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...

  1. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...

  2. Exploring Improvement Science in Education: Promoting College Access in Fresno Unified School District

    ERIC Educational Resources Information Center

    Aguilar, Jorge; Nayfack, Michelle; Bush-Mecenas, Susan

    2017-01-01

    California's Local Control Funding Formula (LCFF) requires districts to report multiple measures of student performance that reflect success in the goal of preparing students for college, career, and citizenship. As they engage in the Local Control Accountability Plan (LCAP) process, they are expected to use state and local indicator data from…

  3. Security in the CernVM File System and the Frontier Distributed Database Caching System

    NASA Astrophysics Data System (ADS)

    Dykstra, D.; Blomer, J.

    2014-06-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  4. Technical Proceedings fo the Symposium on Military Information Systems Engineering (Panel 11 on Information Processing Technology, Defence Research Group).

    DTIC Science & Technology

    1991-12-27

    session. The following gives the flavour of the comments made. 17. Prototyping captures requirements. The prototype exercises requirements and allows the...can modify the data in a given sub-set. These sub-sets can be used as granules of database distribu- tion in order to simplify access control. (3

  5. A High-Availability, Distributed Hardware Control System Using Java

    NASA Technical Reports Server (NTRS)

    Niessner, Albert F.

    2011-01-01

    Two independent coronagraph experiments that require 24/7 availability with different optical layouts and different motion control requirements are commanded and controlled with the same Java software system executing on many geographically scattered computer systems interconnected via TCP/IP. High availability of a distributed system requires that the computers have a robust communication messaging system making the mix of TCP/IP (a robust transport), and XML (a robust message) a natural choice. XML also adds the configuration flexibility. Java then adds object-oriented paradigms, exception handling, heavily tested libraries, and many third party tools for implementation robustness. The result is a software system that provides users 24/7 access to two diverse experiments with XML files defining the differences

  6. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  7. 49 CFR 571.207 - Standard No. 207; Seating systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Motor Vehicle Safety Standards § 571.207 Standard No. 207; Seating systems. S1. Purpose and scope. This... equipped with the device and, if access to the control is required in order to exit from the vehicle, to...

  8. 14 CFR 382.69 - What requirements must carriers meet concerning the accessibility of videos, DVDs, and other...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... carriers must use an equivalent non-video alternative for transmitting the briefing to passengers with... audio-visual displays played on aircraft for informational purposes that were created under your control...

  9. 14 CFR 382.69 - What requirements must carriers meet concerning the accessibility of videos, DVDs, and other...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... carriers must use an equivalent non-video alternative for transmitting the briefing to passengers with... audio-visual displays played on aircraft for informational purposes that were created under your control...

  10. 14 CFR 382.69 - What requirements must carriers meet concerning the accessibility of videos, DVDs, and other...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... carriers must use an equivalent non-video alternative for transmitting the briefing to passengers with... audio-visual displays played on aircraft for informational purposes that were created under your control...

  11. Design and implementation of an audit trail in compliance with US regulations.

    PubMed

    Jiang, Keyuan; Cao, Xiang

    2011-10-01

    Audit trails have been used widely to ensure quality of study data and have been implemented in computerized clinical trials data systems. Increasingly, there is a need to audit access to study participant identifiable information to provide assurance that study participant privacy is protected and confidentiality is maintained. In the United States, several federal regulations specify how the audit trail function should be implemented. To describe the development and implementation of a comprehensive audit trail system that meets the regulatory requirements of assuring data quality and integrity and protecting participant privacy and that is also easy to implement and maintain. The audit trail system was designed and developed after we examined regulatory requirements, data access methods, prevailing application architecture, and good security practices. Our comprehensive audit trail system was developed and implemented at the database level using a commercially available database management software product. It captures both data access and data changes with the correct user identifier. Documentation of access is initiated automatically in response to either data retrieval or data change at the database level. Currently, our system has been implemented only on one commercial database management system. Although our audit trail algorithm does not allow for logging aggregate operations, aggregation does not reveal sensitive private participant information. Careful consideration must be given to data items selected for monitoring because selection of all data items using our system can dramatically increase the requirements for computer disk space. Evaluating the criticality and sensitivity of individual data items selected can control the storage requirements for clinical trial audit trail records. Our audit trail system is capable of logging data access and data change operations to satisfy regulatory requirements. Our approach is applicable to virtually any data that can be stored in a relational database.

  12. Working memory capacity and controlled serial memory search.

    PubMed

    Mızrak, Eda; Öztekin, Ilke

    2016-08-01

    The speed-accuracy trade-off (SAT) procedure was used to investigate the relationship between working memory capacity (WMC) and the dynamics of temporal order memory retrieval. High- and low-span participants (HSs, LSs) studied sequentially presented five-item lists, followed by two probes from the study list. Participants indicated the more recent probe. Overall, accuracy was higher for HSs compared to LSs. Crucially, in contrast to previous investigations that observed no impact of WMC on speed of access to item information in memory (e.g., Öztekin & McElree, 2010), recovery of temporal order memory was slower for LSs. While accessing an item's representation in memory can be direct, recovery of relational information such as temporal order information requires a more controlled serial memory search. Collectively, these data indicate that WMC effects are particularly prominent during high demands of cognitive control, such as serial search operations necessary to access temporal order information from memory. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. Improving access to adequate pain management in Taiwan.

    PubMed

    Scholten, Willem

    2015-06-01

    There is a global crisis in access to pain management in the world. WHO estimates that 4.65 billion people live in countries where medical opioid consumption is near to zero. For 2010, WHO considered a per capita consumption of 216.7 mg morphine equivalents adequate, while Taiwan had a per capita consumption of 0.05 mg morphine equivalents in 2007. In Asia, the use of opioids is sensitive because of the Opium Wars in the 19th century and for this reason, the focus of controlled substances policies has been on the prevention of diversion and dependence. However, an optimal public health outcome requires that also the beneficial aspects of these substances are acknowledged. Therefore, WHO recommends a policy based on the Principle of Balance: ensuring access for medical and scientific purposes while preventing diversion, harmful use and dependence. Furthermore, international law requires that countries ensure access to opioid analgesics for medical and scientific purposes. There is evidence that opioid analgesics for chronic pain are not associated with a major risk for developing dependence. Barriers for access can be classified in the categories of overly restrictive laws and regulations; insufficient medical training on pain management and problems related to assessment of medical needs; attitudes like an excessive fear for dependence or diversion; and economic and logistical problems. The GOPI project found many examples of such barriers in Asia. Access to opioid medicines in Taiwan can be improved by analysing the national situation and drafting a plan. The WHO policy guidelines Ensuring Balance in National Policies on Controlled Substances can be helpful for achieving this purpose, as well as international guidelines for pain treatment. Copyright © 2015. Published by Elsevier B.V.

  14. Emergency access to protected health records.

    PubMed

    Künzi, Julien; Koster, Paul; Petković, Milan

    2009-01-01

    Digital Rights Management (DRM) schemes are receiving increased attention in the healthcare domain for the protection of sensitive health records as they offer security against insider attacks and advance protection features such as usage control. However, to be accepted by health care providers, a DRM solution has to fulfill specific healthcare requirements including emergency access. In this paper, we propose such DRM solution that can be deployed in highly distributed environments of electronic or personal health record infrastructures.

  15. Programmable data communications controller requirements

    NASA Technical Reports Server (NTRS)

    1977-01-01

    The design requirements for a Programmable Data Communications Controller (PDCC) that reduces the difficulties in attaching data terminal equipment to a computer are presented. The PDCC is an interface between the computer I/O channel and the bit serial communication lines. Each communication line is supported by a communication port that handles all line control functions and performs most terminal control functions. The port is fabricated on a printed circuit board that plugs into a card chassis, mating with a connector that is joined to all other card stations by a data bus. Ports are individually programmable; each includes a microprocessor, a programmable read-only memory for instruction storage, and a random access memory for data storage.

  16. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    NASA Astrophysics Data System (ADS)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  17. Cooperative photoinduced metastable phase control in strained manganite films

    NASA Astrophysics Data System (ADS)

    Zhang, Jingdi; Tan, Xuelian; Liu, Mengkun; Teitelbaum, S. W.; Post, K. W.; Jin, Feng; Nelson, K. A.; Basov, D. N.; Wu, Wenbin; Averitt, R. D.

    2016-09-01

    A major challenge in condensed-matter physics is active control of quantum phases. Dynamic control with pulsed electromagnetic fields can overcome energetic barriers, enabling access to transient or metastable states that are not thermally accessible. Here we demonstrate strain-engineered tuning of La2/3Ca1/3MnO3 into an emergent charge-ordered insulating phase with extreme photo-susceptibility, where even a single optical pulse can initiate a transition to a long-lived metastable hidden metallic phase. Comprehensive single-shot pulsed excitation measurements demonstrate that the transition is cooperative and ultrafast, requiring a critical absorbed photon density to activate local charge excitations that mediate magnetic-lattice coupling that, in turn, stabilize the metallic phase. These results reveal that strain engineering can tune emergent functionality towards proximal macroscopic states to enable dynamic ultrafast optical phase switching and control.

  18. Ontology based log content extraction engine for a posteriori security control.

    PubMed

    Azkia, Hanieh; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Coatrieux, Gouenou

    2012-01-01

    In a posteriori access control, users are accountable for actions they performed and must provide evidence, when required by some legal authorities for instance, to prove that these actions were legitimate. Generally, log files contain the needed data to achieve this goal. This logged data can be recorded in several formats; we consider here IHE-ATNA (Integrating the healthcare enterprise-Audit Trail and Node Authentication) as log format. The difficulty lies in extracting useful information regardless of the log format. A posteriori access control frameworks often include a log filtering engine that provides this extraction function. In this paper we define and enforce this function by building an IHE-ATNA based ontology model, which we query using SPARQL, and show how the a posteriori security controls are made effective and easier based on this function.

  19. Experimental realization of a multiplexed quantum memory with 225 individually accessible memory cells.

    PubMed

    Pu, Y-F; Jiang, N; Chang, W; Yang, H-X; Li, C; Duan, L-M

    2017-05-08

    To realize long-distance quantum communication and quantum network, it is required to have multiplexed quantum memory with many memory cells. Each memory cell needs to be individually addressable and independently accessible. Here we report an experiment that realizes a multiplexed DLCZ-type quantum memory with 225 individually accessible memory cells in a macroscopic atomic ensemble. As a key element for quantum repeaters, we demonstrate that entanglement with flying optical qubits can be stored into any neighboring memory cells and read out after a programmable time with high fidelity. Experimental realization of a multiplexed quantum memory with many individually accessible memory cells and programmable control of its addressing and readout makes an important step for its application in quantum information technology.

  20. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  1. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  2. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  3. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  4. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  5. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  6. Life history changes in Trogoderma variabile and T. inclusum due to mating delay with implications for mating disruption as a management tactic

    USDA-ARS?s Scientific Manuscript database

    Controlling postharvest pest species is a costly process with insecticide resistance and species specific control requiring multiple tactics. Mating disruption can be used to both decrease a female’s access to males and delay timing of mating and decreases overall mating success in a population and ...

  7. Mobile Recommender Apps with Privacy Management for Accessible and Usable Technologies.

    PubMed

    Hersh, Marion; Leporini, Barbara

    2017-01-01

    The paper presents the preliminary results of an ongoing survey of the use of computers and mobile devices, interest in recommender apps and knowledge and concerns about privacy issues amongst English and Italian speaking disabled people. Participants were found to be regular users of computers and mobile devices for a range of applications. They were interested in recommender apps for household items, computer software and apps that met their accessibility and other requirements. They showed greater concerns about controlling access to personal data of different types than this data being retained by the computer or mobile device. They were also willing to make tradeoffs to improve device performance.

  8. Association of mandated language access programming and quality of care provided by mental health agencies.

    PubMed

    McClellan, Sean R; Snowden, Lonnie

    2015-01-01

    This study examined the association between language access programming and quality of psychiatric care received by persons with limited English proficiency (LEP). In 1999, the California Department of Mental Health required county Medicaid agencies to implement a "threshold language access policy" to meet the state's Title VI obligations. This policy required Medi-Cal agencies to provide language access programming, including access to interpreters and translated written material, to speakers of languages other than English if the language was spoken by at least 3,000, or 5%, of the county's Medicaid population. Using a longitudinal study design with a nonequivalent control group, this study examined the quality of care provided to Spanish speakers with LEP and a severe mental illness before and after implementation of mandatory language access programming. Quality was measured by receipt of at least two follow-up medication visits within 90 days or three visits within 180 days of an initial medication visit over a period of 38 quarter-years. On average, only 40% of Spanish-speaking clients received at least three medication follow-up visits within 180 days. In multivariate analyses, language access programming was not associated with receipt of at least two medication follow-up visits within 90 days or at least three visits within 180 days. This study found no evidence that language access programming led to increased rates of follow-up medication visits for clients with LEP.

  9. Space Transportation System Availability Relationships to Life Cycle Cost

    NASA Technical Reports Server (NTRS)

    Rhodes, Russel E.; Donahue, Benjamin B.; Chen, Timothy T.

    2009-01-01

    Future space transportation architectures and designs must be affordable. Consequently, their Life Cycle Cost (LCC) must be controlled. For the LCC to be controlled, it is necessary to identify all the requirements and elements of the architecture at the beginning of the concept phase. Controlling LCC requires the establishment of the major operational cost drivers. Two of these major cost drivers are reliability and maintainability, in other words, the system's availability (responsiveness). Potential reasons that may drive the inherent availability requirement are the need to control the number of unique parts and the spare parts required to support the transportation system's operation. For more typical space transportation systems used to place satellites in space, the productivity of the system will drive the launch cost. This system productivity is the resultant output of the system availability. Availability is equal to the mean uptime divided by the sum of the mean uptime plus the mean downtime. Since many operational factors cannot be projected early in the definition phase, the focus will be on inherent availability which is equal to the mean time between a failure (MTBF) divided by the MTBF plus the mean time to repair (MTTR) the system. The MTBF is a function of reliability or the expected frequency of failures. When the system experiences failures the result is added operational flow time, parts consumption, and increased labor with an impact to responsiveness resulting in increased LCC. The other function of availability is the MTTR, or maintainability. In other words, how accessible is the failed hardware that requires replacement and what operational functions are required before and after change-out to make the system operable. This paper will describe how the MTTR can be equated to additional labor, additional operational flow time, and additional structural access capability, all of which drive up the LCC. A methodology will be presented that provides the decision makers with the understanding necessary to place constraints on the design definition. This methodology for the major drivers will determine the inherent availability, safety, reliability, maintainability, and the life cycle cost of the fielded system. This methodology will focus on the achievement of an affordable, responsive space transportation system. It is the intent of this paper to not only provide the visibility of the relationships of these major attribute drivers (variables) to each other and the resultant system inherent availability, but also to provide the capability to bound the variables, thus providing the insight required to control the system's engineering solution. An example of this visibility is the need to provide integration of similar discipline functions to allow control of the total parts count of the space transportation system. Also, selecting a reliability requirement will place a constraint on parts count to achieve a given inherent availability requirement, or require accepting a larger parts count with the resulting higher individual part reliability requirements. This paper will provide an understanding of the relationship of mean repair time (mean downtime) to maintainability (accessibility for repair), and both mean time between failure (reliability of hardware) and the system inherent availability.

  10. A Content Standard for Computational Models; Digital Rights Management (DRM) Architectures; A Digital Object Approach to Interoperable Rights Management: Finely-Grained Policy Enforcement Enabled by a Digital Object Infrastructure; LOCKSS: A Permanent Web Publishing and Access System; Tapestry of Time and Terrain.

    ERIC Educational Resources Information Center

    Hill, Linda L.; Crosier, Scott J.; Smith, Terrence R.; Goodchild, Michael; Iannella, Renato; Erickson, John S.; Reich, Vicky; Rosenthal, David S. H.

    2001-01-01

    Includes five articles. Topics include requirements for a content standard to describe computational models; architectures for digital rights management systems; access control for digital information objects; LOCKSS (Lots of Copies Keep Stuff Safe) that allows libraries to run Web caches for specific journals; and a Web site from the U.S.…

  11. Optical multiple access techniques for on-board routing

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Park, Eugene; Gagliardi, Robert M.

    1992-01-01

    The purpose of this research contract was to design and analyze an optical multiple access system, based on Code Division Multiple Access (CDMA) techniques, for on board routing applications on a future communication satellite. The optical multiple access system was to effect the functions of a circuit switch under the control of an autonomous network controller and to serve eight (8) concurrent users at a point to point (port to port) data rate of 180 Mb/s. (At the start of this program, the bit error rate requirement (BER) was undefined, so it was treated as a design variable during the contract effort.) CDMA was selected over other multiple access techniques because it lends itself to bursty, asynchronous, concurrent communication and potentially can be implemented with off the shelf, reliable optical transceivers compatible with long term unattended operations. Temporal, temporal/spatial hybrids and single pulse per row (SPR, sometimes termed 'sonar matrices') matrix types of CDMA designs were considered. The design, analysis, and trade offs required by the statement of work selected a temporal/spatial CDMA scheme which has SPR properties as the preferred solution. This selected design can be implemented for feasibility demonstration with off the shelf components (which are identified in the bill of materials of the contract Final Report). The photonic network architecture of the selected design is based on M(8,4,4) matrix codes. The network requires eight multimode laser transmitters with laser pulses of 0.93 ns operating at 180 Mb/s and 9-13 dBm peak power, and 8 PIN diode receivers with sensitivity of -27 dBm for the 0.93 ns pulses. The wavelength is not critical, but 830 nm technology readily meets the requirements. The passive optical components of the photonic network are all multimode and off the shelf. Bit error rate (BER) computations, based on both electronic noise and intercode crosstalk, predict a raw BER of (10 exp -3) when all eight users are communicating concurrently. If better BER performance is required, then error correction codes (ECC) using near term electronic technology can be used. For example, the M(8,4,4) optical code together with Reed-Solomon (54,38,8) encoding provides a BER of better than (10 exp -11). The optical transceiver must then operate at 256 Mb/s with pulses of 0.65 ns because the 'bits' are now channel symbols.

  12. KISS--a new approach to self-controlled e-learning of selected chapters in Medical Engineering and other fields at bachelor and master course level.

    PubMed

    Hutten, Helmut; Stiegmaier, Wolfgang; Rauchegger, Günter

    2005-09-01

    Modern life style requires new methods for individual lifelong learning, based on access at every time and from every place. This fundamental requirement is provided by the Internet. The Internet technology promises an increasing potential in the future for e-learning or tele-learning. Some special requirements are password-controlled access, applicability of most commercially available PCs and laptops equipped with standard software (Microsoft Internet Explorer 6.0), central evaluation of the students' performance, inclusion of an examination part, provision of a picture gallery and a comprehensive glossary accessible in the learning mode. The KISS-shell has been developed based on the Oracle 10g application server in combination with a relational data base (Oracle 8i) on the server side and a web browser based interface using JavaScript for user control of data input on the client side (Kontrolliertes Intelligentes Selbstgesteuertes Studium, KISS). The first tutorial application has been realized with a chapter about cardiac pacemakers. The weight of that chapter (or module) is about 2 ECTS (i.e. the equivalent of 30 working hours; European Credit Transfer System, ECTS). The internal structure of the chapter is organized in sequential mode. It consists of five main sections. Each of those five sections is subdivided into five subsections of comparable length. Progression from one subsection to the next is possible only after successfully passing through the respective examination. The whole learning programme with the pacemaker chapter has been evaluated by 10 students. The system will be presented together with first experiences including the evaluation results. Until now the program has not been used for training purposes.

  13. A personally controlled electronic health record for Australia

    PubMed Central

    Pearce, Christopher; Bainbridge, Michael

    2014-01-01

    Objective On July 1, 2012 Australia launched a personally controlled electronic health record (PCEHR) designed around the needs of consumers. Using a distributed model and leveraging key component national eHealth infrastructure, the PCEHR is designed to enable sharing of any health information about a patient with them and any other health practitioner involved in their care to whom the patient allows access. This paper discusses the consumer-facing part of the program. Method Design of the system was through stakeholder consultation and the development of detailed requirements, followed by clinical design assurance. Results Patients are able to access any posted information through a web-accessible ‘consumer portal.’ Within the portal they are able to assert access controls on all or part of their record. The portal includes areas for consumers to record their own personal information. Discussion The PCEHR has the potential to transform the ability of patients to actively engage in their own healthcare, and to enable the emerging partnership model of health and healthcare in medicine. The ability to access health information traditionally kept within the closed walls of institutions also raises challenges for the profession, both in the language clinicians choose and the ethical issues raised by the changed roles and responsibilities. Conclusions The PCEHR is aimed at connecting all participants and their interventions, and is intended to become a system-wide activity. PMID:24650635

  14. Exchange of natural enemies for biological control: is it a rocky road?-the road in the Euro-Mediterranean region and the South American common market.

    PubMed

    Coutinot, D; Briano, J; Parra, J R P; de Sá, L A N; Cônsoli, F L

    2013-02-01

    The access and benefit sharing (ABS) regulations from the Convention on Biological Diversity (CBD) for the use of natural resources became an important issue because the biodiversity of developing countries was heavily accessed and unilaterally exploited by pharmaceutical and seed companies. However, natural enemies used for biological control are living and unmodified genetic resources which cannot be patented and have been treated as resources such as drugs, seeds, or other commercial products. Consequently, the ABS requirements have limited not only the use of natural enemies but also the positive effects that scientifically supported biological control strategies have on the society, the environment, and the economy, reducing problems of pesticide residues, water and soil contamination, and non-target effects. During the last several years, the biological control scientific community has faced new and extremely complicated legislation dictated by a high and diverse number of governmental agencies at different levels, making the access to natural resources for biocontrol purposes a rocky road. Society at large should be aware of how the strict ABS regulations affect the use of natural enemies as biological resources to secure food production, food safety, and global environmental protection. We discuss in here the current difficulties derived from CBD for the exchange of natural enemies taking as example the Euro-Mediterranean region, Argentina, and Brazil to demonstrate how long and diverse are the steps to be followed to obtain the required permits for access and exportation/importation of natural enemies. We then argue that the public visibility of biocontrol strategies should be increased and their benefits highlighted in order to persuade legislators for the development of a less bureaucratic, more expedient, and more centralized regulatory frame, greatly favoring the practice and benefits of biological control. We finally propose a general framework in which ABS issues should be dealt in ways to attend the CBD, but also to make the use of natural resources for the biological control of pests to secure food production and security a possible alternative.

  15. Continental Land Mass Air Traffic Control (COLM ATC). [using three artificial satellite configurations

    NASA Technical Reports Server (NTRS)

    Pecar, J. A.; Henrich, J. E.

    1973-01-01

    The application of various satellite systems and techniques relative to providing air traffic control services for the continental United States was studied. Three satellite configurations were reviewed. The characteristics and capabilities of the satellites are described. The study includes consideration for the various ranging waveforms, multiple access alternatives, and the power and bandwidth required as a function of the number of users.

  16. Secure DBMS Auditor

    DTIC Science & Technology

    1990-07-01

    i k RAYMOND P. URTZ, JR. Technical Director Directorate of Command & Control FOR TH!E C0OKANDER: IGOR G. PLONISCH Directorate of Plans & Programs If...access controls and for thwarting inference and aggregation attacks ae generally considered inadequate for high usurance systems. Consequently, thee is...requirements was to have been based on a state-of-the-art survey involving interviews with TDBMS researchers and developers and security officers and auditors

  17. Semantic control and modality: an input processing deficit in aphasia leading to deregulated semantic cognition in a single modality.

    PubMed

    Thompson, Hannah E; Jefferies, Elizabeth

    2013-08-01

    Research suggests that semantic memory deficits can occur in at least three ways. Patients can (1) show amodal degradation of concepts within the semantic store itself, such as in semantic dementia (SD), (2) have difficulty in controlling activation within the semantic system and accessing appropriate knowledge in line with current goals or context, as in semantic aphasia (SA) and (3) experience a semantic deficit in only one modality following degraded input from sensory cortex. Patients with SA show deficits of semantic control and access across word and picture tasks, consistent with the view that their problems arise from impaired modality-general control processes. However, there are a few reports in the literature of patients with semantic access problems restricted to auditory-verbal materials, who show decreasing ability to retrieve concepts from words when they are presented repeatedly with closely related distractors. These patients challenge the notion that semantic control processes are modality-general and suggest instead a separation of 'access' to auditory-verbal and non-verbal semantic systems. We had the rare opportunity to study such a case in detail. Our aims were to examine the effect of manipulations of control demands in auditory-verbal semantic, non-verbal semantic and non-semantic tasks, allowing us to assess whether such cases always show semantic control/access impairments that follow a modality-specific pattern, or whether there are alternative explanations. Our findings revealed: (1) deficits on executive tasks, unrelated to semantic demands, which were more evident in the auditory modality than the visual modality; (2) deficits in executively-demanding semantic tasks which were accentuated in the auditory-verbal domain compared with the visual modality, but still present on non-verbal tasks, and (3) a coupling between comprehension and executive control requirements, in that mild impairment on single word comprehension was greatly increased on more demanding, associative judgements across modalities. This pattern of results suggests that mild executive-semantic impairment, paired with disrupted connectivity from auditory input, may give rise to semantic 'access' deficits affecting only the auditory modality. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Design and Performance... irradiator must have a door or other physical barrier to prevent inadvertent entry of personnel if the sources are not in the shielded position. Product conveyor systems may serve as barriers as long as they...

  19. Too Much or Too Little

    ERIC Educational Resources Information Center

    Obeng, Letitia E.

    1975-01-01

    All countries require an ample supply of water for agricultural and industrial uses. Most have sufficient water supplies, but availability and accessibility vary. With the development of water irrigation systems, health conditions often deteriorate. The author recommends a water management program to control quality and quantity of available…

  20. Methodological proceedings to evaluate the physical accessibility in urban historic sites.

    PubMed

    Ribeiro, Gabriela Sousa; Martins, Laura Bezerra; Monteiro, Circe Maria Gama

    2012-01-01

    Historic urban sites are set by cultural and social diversities, generating multiple activities and use and access to these sites should be available to all people including those with disabilities. Taking into consideration that using the same methodology that was used in different historic sites researches with positive results facilitates replication, we aimed to develop methodological procedures that identify conditions of physical accessibility in open public spaces and access to public buildings in historic urban sites to support proposals about design requirements for improvements to the problems diagnosed and control inadequacies of the physical environment. The study methods and techniques from different areas of knowledge culminated in a proposal built with an emphasis on user participation that could be applied with low cost and in relatively short period of time.

  1. Experimental realization of a multiplexed quantum memory with 225 individually accessible memory cells

    PubMed Central

    Pu, Y-F; Jiang, N.; Chang, W.; Yang, H-X; Li, C.; Duan, L-M

    2017-01-01

    To realize long-distance quantum communication and quantum network, it is required to have multiplexed quantum memory with many memory cells. Each memory cell needs to be individually addressable and independently accessible. Here we report an experiment that realizes a multiplexed DLCZ-type quantum memory with 225 individually accessible memory cells in a macroscopic atomic ensemble. As a key element for quantum repeaters, we demonstrate that entanglement with flying optical qubits can be stored into any neighboring memory cells and read out after a programmable time with high fidelity. Experimental realization of a multiplexed quantum memory with many individually accessible memory cells and programmable control of its addressing and readout makes an important step for its application in quantum information technology. PMID:28480891

  2. Preparation for an Airport Master Plan for Joint Use Operation at Scott AFB, Illinois.

    DTIC Science & Technology

    1987-08-01

    Airfield and approach lighting b) Air traffic control tower c) Meteorological facilities d) Airport access and service roads e) Utilities f) Public...use, and to comply with all requirements for control of air, water and noise pollution as well as solid waste disposal. Specific conditions would be...Identification of Persons e Identification of Ground Vehicles S• Fencing 0 Gates I * Security Lighting i * Locks and Key Control 9 Critical Areas (Other Than

  3. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems

    PubMed Central

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-01

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN’s MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS. PMID:28134853

  4. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems.

    PubMed

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-28

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.

  5. High performance bilateral telerobot control.

    PubMed

    Kline-Schoder, Robert; Finger, William; Hogan, Neville

    2002-01-01

    Telerobotic systems are used when the environment that requires manipulation is not easily accessible to humans, as in space, remote, hazardous, or microscopic applications or to extend the capabilities of an operator by scaling motions and forces. The Creare control algorithm and software is an enabling technology that makes possible guaranteed stability and high performance for force-feedback telerobots. We have developed the necessary theory, structure, and software design required to implement high performance telerobot systems with time delay. This includes controllers for the master and slave manipulators, the manipulator servo levels, the communication link, and impedance shaping modules. We verified the performance using both bench top hardware as well as a commercial microsurgery system.

  6. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  7. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  8. 45 CFR 1232.13 - General requirement concerning accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false General requirement concerning accessibility. 1232.13 Section 1232.13 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR... FEDERAL FINANCIAL ASSISTANCE Accessibility § 1232.13 General requirement concerning accessibility. No...

  9. High-Moisture Diet for Laboratory Rats: Nutrient Analysis, Growth, and Organ Weights

    NASA Technical Reports Server (NTRS)

    Battles, August H.; Knapka, Joseph T.; Lewis, Laura; Lang, Marie T.; Gruendel, Douglas J.

    1991-01-01

    A diet (KSC-25) to be sterilized by irradiation was formulated to contain 66% moisture and to provide the required nutrients for growing rats. Analyses of the irradiated dry diet provided data to evaluate its nutrient content. The diet was evaluated for its ability to supply all nutrients, including water, required by immature rats. Sixteen Sprague-Dawley rats were fed the high-moisture diet with or without access to a water bottle. Rats (n = 16) fed an irradiated purified diet in a meal form with access to a water bottle were the control animals. Feed efficiency, food and water consumption, and growth rate data were collected during the 28-day study. Organ weights were collected on day 28. The test diet met or exceeded the National Research Council (NRC) estimated nutritional requirements for immature laboratory rats. The 66% moisture KSC-25 diet provided all nutrients, including water, required by weanling male Sprague-Dawley rats for growth equivalent to the established purified diet.

  10. Barriers and facilitators to intraosseous access in adult resuscitations when peripheral intravenous access is not achievable.

    PubMed

    James Cheung, Warren; Rosenberg, Hans; Vaillancourt, Christian

    2014-03-01

    Studies suggest that intraosseous (IO) access is underutilized in adult resuscitations, despite recommendations from advanced trauma and cardiac life support guidelines. The objective was to determine factors associated with IO access use by physicians during adult resuscitations when intravenous (IV) access is not immediately achievable. This study was an online survey among physicians purposefully recruited from various clinical care areas at three teaching hospitals. Questions were generated from the qualitative results of 20 iterative interviews, verified for internal validity, and piloted. The interview guide was based on the constructs of the Theory of Planned Behavior (TPB), which elicits salient attitudes, social influences, and control beliefs that potentially influence intention to use IO access. Recruitment took place in September 2012 until reaching more than 100% of the required sample size (n = 200). Internal consistency was measured using Cronbach's alpha, and the effect of TPB constructs and specific beliefs were assessed with regression analyses. For the 205 respondents, the mean age was 35 years (range = 20 to 66 years), and 53.3% were male. Participants' departmental affiliations were 50.3% emergency medicine (EM), 16.9% internal medicine, 14.9% anesthesia, 10.8% general surgery, and 7.2% critical care. Residents comprised 60.7% of the sample, and 39.3% were attending physicians. Median intention to use IO access when IV is not immediately achievable was 4.67 (interquartile range [IQR] = 4 to 5) out of 5 (5 highest) and predicted by the following TPB constructs: attitudes (AdjCoefficients = 0.504; 95% confidence interval [CI] = 0.334 to 0.673), social influences (AdjCoefficients = 0.285; 95% CI = 0.172 to 0.398), and control beliefs (AdjCoefficients 0.217; 95% CI = 0.113 to 0.320). Physicians were more likely to use IO access if they believed that it provided rapid vascular access for delivering large volumes of fluids, could prevent delays in care, and was associated with a low complication rate. Conversely, the perception that nurses are not familiar or supportive of IO access and a lack of physician confidence regarding the appropriate indications for IO access were barriers to use. These data are an important step in the knowledge-to-action process, as they identify specific factors associated with physician use of IO access. Interventions addressing these actionable facilitators and barriers are likely to have a positive effect on increasing the appropriate physician use of this potentially life-saving technique in adult patients requiring emergent vascular access. © 2014 by the Society for Academic Emergency Medicine.

  11. 21 CFR 1309.72 - Felony conviction; employer responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... OF MANUFACTURERS, DISTRIBUTORS, IMPORTERS AND EXPORTERS OF LIST I CHEMICALS Security Requirements... consideration of employment of persons who will have access to listed chemicals, who have been convicted of a felony offense relating to controlled substances or listed chemicals, or who have, at any time, had an...

  12. 14 CFR 1274.942 - Export licenses.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... appropriate licenses or other approvals, if required, for exports of hardware, technical data, and software... installation], where the foreign person will have access to export-controlled technical data or software. (c... software) pursuant to the exemption at 22 CFR 125.4(b)(3). The Agreement Officer or designated...

  13. 49 CFR 219.905 - Access to facilities and records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... with this section. (For purposes of this section only, urine drug testing records are considered... drug testing programs conducted under this part and any other information pertaining to the railroad's... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CONTROL OF ALCOHOL AND DRUG USE Recordkeeping Requirements § 219.905...

  14. 49 CFR 219.905 - Access to facilities and records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... with this section. (For purposes of this section only, urine drug testing records are considered... drug testing programs conducted under this part and any other information pertaining to the railroad's... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CONTROL OF ALCOHOL AND DRUG USE Recordkeeping Requirements § 219.905...

  15. 49 CFR 219.905 - Access to facilities and records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... with this section. (For purposes of this section only, urine drug testing records are considered... drug testing programs conducted under this part and any other information pertaining to the railroad's... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CONTROL OF ALCOHOL AND DRUG USE Recordkeeping Requirements § 219.905...

  16. 49 CFR 219.905 - Access to facilities and records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... with this section. (For purposes of this section only, urine drug testing records are considered... drug testing programs conducted under this part and any other information pertaining to the railroad's... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CONTROL OF ALCOHOL AND DRUG USE Recordkeeping Requirements § 219.905...

  17. 49 CFR 219.905 - Access to facilities and records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... with this section. (For purposes of this section only, urine drug testing records are considered... drug testing programs conducted under this part and any other information pertaining to the railroad's... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CONTROL OF ALCOHOL AND DRUG USE Recordkeeping Requirements § 219.905...

  18. Positive Affect Modulates Flexibility and Evaluative Control

    ERIC Educational Resources Information Center

    van Wouwe, Nelleke C.; Band, Guido P. H.; Ridderinkhof, K. Richard

    2011-01-01

    The ability to interact with a constantly changing environment requires a balance between maintaining the currently relevant working memory content and being sensitive to potentially relevant new information that should be given priority access to working memory. Mesocortical dopamine projections to frontal brain areas modulate working memory…

  19. 49 CFR 217.9 - Program of operational tests and inspections; recordkeeping.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... controls accessibility to such information retained in its electronic database system and identifies those... inspections required by this section, the Associate Administrator for Safety may, for cause stated, disapprove... disapproval decision. If the Associate Administrator for Safety disapproves the program, (1) The railroad has...

  20. 49 CFR 217.9 - Program of operational tests and inspections; recordkeeping.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... controls accessibility to such information retained in its electronic database system and identifies those... inspections required by this section, the Associate Administrator for Safety may, for cause stated, disapprove... disapproval decision. If the Associate Administrator for Safety disapproves the program, (1) The railroad has...

  1. 49 CFR 217.9 - Program of operational tests and inspections; recordkeeping.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... controls accessibility to such information retained in its electronic database system and identifies those... inspections required by this section, the Associate Administrator for Safety may, for cause stated, disapprove... disapproval decision. If the Associate Administrator for Safety disapproves the program, (1) The railroad has...

  2. 49 CFR 217.9 - Program of operational tests and inspections; recordkeeping.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... controls accessibility to such information retained in its electronic database system and identifies those... inspections required by this section, the Associate Administrator for Safety may, for cause stated, disapprove... disapproval decision. If the Associate Administrator for Safety disapproves the program, (1) The railroad has...

  3. Integration of LDSE and LTVS logs with HIPAA compliant auditing system (HCAS)

    NASA Astrophysics Data System (ADS)

    Zhou, Zheng; Liu, Brent J.; Huang, H. K.; Guo, Bing; Documet, Jorge; King, Nelson

    2006-03-01

    The deadline of HIPAA (Health Insurance Portability and Accountability Act) Security Rules has passed on February 2005; therefore being HIPAA compliant becomes extremely critical to healthcare providers. HIPAA mandates healthcare providers to protect the privacy and integrity of the health data and have the ability to demonstrate examples of mechanisms that can be used to accomplish this task. It is also required that a healthcare institution must be able to provide audit trails on image data access on demand for a specific patient. For these reasons, we have developed a HIPAA compliant auditing system (HCAS) for image data security in a PACS by auditing every image data access. The HCAS was presented in 2005 SPIE. This year, two new components, LDSE (Lossless Digital Signature Embedding) and LTVS (Patient Location Tracking and Verification System) logs, have been added to the HCAS. The LDSE can assure medical image integrity in a PACS, while the LTVS can provide access control for a PACS by creating a security zone in the clinical environment. By integrating the LDSE and LTVS logs with the HCAS, the privacy and integrity of image data can be audited as well. Thus, a PACS with the HCAS installed can become HIPAA compliant in image data privacy and integrity, access control, and audit control.

  4. Secure web-based access to radiology: forms and databases for fast queries

    NASA Astrophysics Data System (ADS)

    McColl, Roderick W.; Lane, Thomas J.

    2002-05-01

    Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

  5. Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing.

    PubMed

    Kuchinke, Wolfgang; Krauth, Christian; Bergmann, René; Karakoyun, Töresin; Woollard, Astrid; Schluender, Irene; Braasch, Benjamin; Eckert, Martin; Ohmann, Christian

    2016-07-07

    In an unprecedented rate data in the life sciences is generated and stored in many different databases. An ever increasing part of this data is human health data and therefore falls under data protected by legal regulations. As part of the BioMedBridges project, which created infrastructures that connect more than 10 ESFRI research infrastructures (RI), the legal and ethical prerequisites of data sharing were examined employing a novel and pragmatic approach. We employed concepts from computer science to create legal requirement clusters that enable legal interoperability between databases for the areas of data protection, data security, Intellectual Property (IP) and security of biosample data. We analysed and extracted access rules and constraints from all data providers (databases) involved in the building of data bridges covering many of Europe's most important databases. These requirement clusters were applied to five usage scenarios representing the data flow in different data bridges: Image bridge, Phenotype data bridge, Personalised medicine data bridge, Structural data bridge, and Biosample data bridge. A matrix was built to relate the important concepts from data protection regulations (e.g. pseudonymisation, identifyability, access control, consent management) with the results of the requirement clusters. An interactive user interface for querying the matrix for requirements necessary for compliant data sharing was created. To guide researchers without the need for legal expert knowledge through legal requirements, an interactive tool, the Legal Assessment Tool (LAT), was developed. LAT provides researchers interactively with a selection process to characterise the involved types of data and databases and provides suitable requirements and recommendations for concrete data access and sharing situations. The results provided by LAT are based on an analysis of the data access and sharing conditions for different kinds of data of major databases in Europe. Data sharing for research purposes must be opened for human health data and LAT is one of the means to achieve this aim. In summary, LAT provides requirements in an interactive way for compliant data access and sharing with appropriate safeguards, restrictions and responsibilities by introducing a culture of responsibility and data governance when dealing with human data.

  6. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  7. Interacting with a security system: The Argus user interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Behrin, E.; Davis, G.E.

    1993-12-31

    In the mid-1980s the Lawrence Livermore National Laboratory (LLNL) developed the Argus Security System. Key requirements were to eliminate the telephone as a verification device for opening and closing alarm stations and to allow need-to-know access through local enrollment at alarm stations. Resulting from these requirements was an LLNL-designed user interface called the Remote Access Panel (RAP). The Argus RAP interacts with Argus field processors to allow secure station mode changes and local station enrollment, provides user direction and response, and assists station maintenance personnel. It consists of a tamper-detecting housing containing a badge reader, a keypad with sight screen,more » special-purpose push buttons and a liquid-crystal display. This paper discusses Argus system concepts, RAP design, functional characteristics and its physical configurations. The paper also describes the RAP`s use in access-control booths, it`s integration with biometrics and its operation for multi-person-rule stations and compartmented facilities.« less

  8. The Technology Information Environment with Industry{trademark} system description

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Detry, R.; Machin, G.

    The Technology Information Environment with Industry (TIE-In{trademark}) provides users with controlled access to distributed laboratory resources that are packaged in intelligent user interfaces. These interfaces help users access resources without requiring the user to have technical or computer expertise. TIE-In utilizes existing, proven technologies such as the Kerberos authentication system, X-Windows, and UNIX sockets. A Front End System (FES) authenticates users and allows them to register for resources and subsequently access them. The FES also stores status and accounting information, and provides an automated method for the resource owners to recover costs from users. The resources available through TIE-In aremore » typically laboratory-developed applications that are used to help design, analyze, and test components in the nation`s nuclear stockpile. Many of these applications can also be used by US companies for non-weapons-related work. TIE-In allows these industry partners to obtain laboratory-developed technical solutions without requiring them to duplicate the technical resources (people, hardware, and software) at Sandia.« less

  9. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  10. 50 CFR 660.316 - Open access fishery-observer requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 11 2011-10-01 2011-10-01 false Open access fishery-observer requirements. 660.316 Section 660.316 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC... West Coast Groundfish-Open Access Fisheries § 660.316 Open access fishery—observer requirements. (a...

  11. 50 CFR 660.316 - Open access fishery-observer requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-observer requirements. 660.316 Section 660.316 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC... West Coast Groundfish-Open Access Fisheries § 660.316 Open access fishery—observer requirements. (a...

  12. 50 CFR 660.316 - Open access fishery-observer requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 13 2013-10-01 2013-10-01 false Open access fishery-observer requirements. 660.316 Section 660.316 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC... West Coast Groundfish-Open Access Fisheries § 660.316 Open access fishery—observer requirements. (a...

  13. 50 CFR 660.316 - Open access fishery-observer requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 13 2012-10-01 2012-10-01 false Open access fishery-observer requirements. 660.316 Section 660.316 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC... West Coast Groundfish-Open Access Fisheries § 660.316 Open access fishery—observer requirements. (a...

  14. 50 CFR 660.316 - Open access fishery-observer requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 13 2014-10-01 2014-10-01 false Open access fishery-observer requirements. 660.316 Section 660.316 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC... West Coast Groundfish-Open Access Fisheries § 660.316 Open access fishery—observer requirements. (a...

  15. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  16. Teaching self-control to small groups of dually diagnosed adults.

    PubMed

    Dixon, M R; Holcomb, S

    2000-01-01

    The present study examined the use of a progressive delay procedure to teach self-control to two groups of dually diagnosed adults. When given a choice between an immediate smaller reinforcer and a larger delayed reinforcer, both groups chose the smaller reinforcer during baseline. During treatment, progressive increases in work requirements for gaining access to a larger reinforcer resulted in both groups selecting larger delayed reinforcers. The results are discussed with respect to increasing cooperative work behavior and self-control.

  17. Post-Attack Economic Stabilization Issues for Federal, State, and Local Governments

    DTIC Science & Technology

    1985-02-01

    workers being transfered from large urban areas to production facilities in areas of lower risk . In another case, rent control staff should be quickly...food supermarkets , which do not universally accept bank cards. 3 0 A requirement will still exist for a large number of credit cards. While there is some...separate system is required for rationing. For example, the increasingly popular automatic teller machine ( ATM ) debit card routinely accesses both a

  18. Los Coches Creek, San Diego County, California Detailed Project Report for Flood Control and Environmental Assessment. Main Report and Environmental Appendix.

    DTIC Science & Technology

    1984-08-01

    as California buckwheat (Eriogonum fasciculatum), elderberry ( Sambucus p.), bror.r bacoharis (Baccharis sarathroides), and coast live oak (Quercus...emergent wetland and riparian habitat, essentially all of the wetland and riparian habitat in the project area (Table EA-1). Access requirements for...reach a level of significance. The construction specifications would require the construction contractor to avoid polluting the creek with fuels, oils

  19. A software for managing after-hours activities in research user facilities

    DOE PAGES

    Camino, F. E.

    2017-05-01

    Here, we present an afterhours activity management program for shared facilities, which handles the processes required for afterhours access (request, approval, extension, etc.). It implements the concept of permitted afterhours activities, which consists of a list of well-defined activities that each user can perform afterhours. The program provides an easy and unambiguous way for users to know which activities they are allowed to perform afterhours. In addition, the program can enhance its safety efficacy by interacting with lab and instrument access control systems commonly present in user facilities.

  20. A software for managing after-hours activities in research user facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Camino, F. E.

    Here, we present an afterhours activity management program for shared facilities, which handles the processes required for afterhours access (request, approval, extension, etc.). It implements the concept of permitted afterhours activities, which consists of a list of well-defined activities that each user can perform afterhours. The program provides an easy and unambiguous way for users to know which activities they are allowed to perform afterhours. In addition, the program can enhance its safety efficacy by interacting with lab and instrument access control systems commonly present in user facilities.

  1. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  2. Australian Infection Control Association members' use of skills and resources that promote evidence-based infection control.

    PubMed

    Murphy, C L; McLaws, M

    2000-04-01

    To adopt an evidence-based approach, professionals must be able to access, identify, interpret, and critically appraise best evidence. Critical appraisal requires essential skills, such as computer literacy and an understanding of research principles. These skills also are required for professionals to contribute to evidence. In 1996, members of the Australian Infection Control Association were surveyed to establish a profile including the extent to which they were reading infection control publications, using specific documents for policy and guideline development, developing and undertaking research, publishing research, and using computers. The relationships between demographics, computer use, and research activity were examined. The response rate was 63. 4% (630/993). The study group comprised mostly women (96.1%), and most (66.4%) were older than 40 years of age. Median infection control experience was 4 years (mean, 5.4 years; range, <12 months to 35 years). When developing guidelines and policies (92.7%; 584/630), infection control professionals reviewed State Health Department Infection Control Guidelines and Regulations. Research relating to infection control was undertaken by 21.5% (135/628) of the sample, and 27.6% (37/134) of this group published their research findings. Of the respondents (51.1%; 318/622) who used a computer to undertake infection control tasks, the majority (89.0%) used a personal computer for word processing. Regardless of infection control experience, Australian infection control professionals must be adequately prepared to contribute to, access, appraise, and where appropriate, apply best evidence to their practice. We suggest that computer literacy, an understanding of research principles, and familiarity with infection control literature are three essential skills that infection control professionals must possess and regularly exercise.

  3. Assured Information Sharing for Ad-Hoc Collaboration

    ERIC Educational Resources Information Center

    Jin, Jing

    2009-01-01

    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation…

  4. 40 CFR 63.906 - Inspection and monitoring requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... between the roof and the tank wall; broken, cracked, or otherwise damaged seals or gaskets on closure devices; and broken or missing hatches, access covers, caps, or other closure devices. (2) The owner or... air pollution control equipment designated as such a written explanation of the reasons why the...

  5. Implementation and application of ACL in campus network

    NASA Astrophysics Data System (ADS)

    Zheng, Shiyong; Li, Zhao; Li, Biqing

    2017-03-01

    In this paper, it firstly introduces the related knowledge of access control list (ACL) technology, hardware requirements and software configuration. Then it discusses the topological structure of campus network from the perspective of campus network planning as well as demonstrates the application of ACL technology in campus network combined with examples.

  6. Comparative efficacy of multimodal digital methods in assessing trail/resource degradation

    Treesearch

    Logan O. Park

    2014-01-01

    Outdoor recreation can cause both positive and negative impacts on associated forest ecosystems. Forest recreation trails localize negative impacts to a controlled spatial extent while providing recreation access beyond developed areas and transportation networks. Current methods for assessing extent and severity of trail and proximal resource degradation require...

  7. 46 CFR 189.55-5 - Plans and specifications required for new construction.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... of the alarm and extinguishing systems, the fire extinguishers, means of access to different... dampers and the number identifying each system. (2) Ventilation diagram including dampers and other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains...

  8. 46 CFR 189.55-5 - Plans and specifications required for new construction.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., the arrangement of the alarm and extinguishing systems, the fire extinguishers, means of access to... other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains, carbon dioxide, clean agent, foam, and sprinkling systems. (e) Marine engineering. For...

  9. 46 CFR 189.55-5 - Plans and specifications required for new construction.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., the arrangement of the alarm and extinguishing systems, the fire extinguishers, means of access to... other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains, carbon dioxide, clean agent, foam, and sprinkling systems. (e) Marine engineering. For...

  10. 48 CFR 1852.225-70 - Export Licenses.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... licenses or other approvals, if required, for exports of hardware, technical data, and software, or for the... will have access to export-controlled technical data or software. (c) The Contractor shall be... software) pursuant to the exemption at 22 CFR 125.4(b)(3). The Contracting Officer or designated...

  11. 25 CFR 542.15 - What are the minimum internal control standards for credit?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...

  12. 25 CFR 542.15 - What are the minimum internal control standards for credit?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...

  13. 25 CFR 542.15 - What are the minimum internal control standards for credit?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...

  14. 25 CFR 542.15 - What are the minimum internal control standards for credit?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...

  15. 25 CFR 542.15 - What are the minimum internal control standards for credit?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) Documentation of authorization by a person designated by management to approve credit limits; and (v) Credit... approved by personnel designated by management. (4) Proper approval of credit extensions over ten percent... that require access and are so authorized by management; (ii) Outstanding credit instruments shall be...

  16. 10 CFR 11.10 - Maintenance of records.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Maintenance of records. 11.10 Section 11.10 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL General Provisions § 11.10 Maintenance of records. Each record required by this...

  17. 10 CFR 11.10 - Maintenance of records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Maintenance of records. 11.10 Section 11.10 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL General Provisions § 11.10 Maintenance of records. Each record required by this...

  18. 40 CFR 86.429-78 - Maintenance, unscheduled; test vehicles.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... vehicles in use, and does not require direct access to the combustion chamber, except for spark plug, fuel... vehicles. 86.429-78 Section 86.429-78 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM NEW AND IN-USE HIGHWAY VEHICLES AND ENGINES...

  19. 21 CFR 1309.71 - General security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... guard against theft and diversion of List I chemicals. Chemicals must be stored in containers sealed in such a manner as to indicate any attempts at tampering with the container. Where chemicals cannot be stored in sealed containers, access to the chemicals should be controlled through physical means or...

  20. 21 CFR 1309.71 - General security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... guard against theft and diversion of List I chemicals. Chemicals must be stored in containers sealed in such a manner as to indicate any attempts at tampering with the container. Where chemicals cannot be stored in sealed containers, access to the chemicals should be controlled through physical means or...

  1. 21 CFR 1309.71 - General security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... guard against theft and diversion of List I chemicals. Chemicals must be stored in containers sealed in such a manner as to indicate any attempts at tampering with the container. Where chemicals cannot be stored in sealed containers, access to the chemicals should be controlled through physical means or...

  2. 21 CFR 1309.71 - General security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... guard against theft and diversion of List I chemicals. Chemicals must be stored in containers sealed in such a manner as to indicate any attempts at tampering with the container. Where chemicals cannot be stored in sealed containers, access to the chemicals should be controlled through physical means or...

  3. 21 CFR 1309.71 - General security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... guard against theft and diversion of List I chemicals. Chemicals must be stored in containers sealed in such a manner as to indicate any attempts at tampering with the container. Where chemicals cannot be stored in sealed containers, access to the chemicals should be controlled through physical means or...

  4. 46 CFR 58.25-85 - Special requirements for tank vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... (e), (h), (i), and (j); (2) Ensure working access to machinery and controls in the steering-gear compartment (which must include handrails and either gratings or other non-slip surfaces to ensure a safe working environment in case hydraulic fluid leaks); (3) Have two separate and independent steering-gear...

  5. 40 CFR 86.429-78 - Maintenance, unscheduled; test vehicles.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., unscheduled; test vehicles. (a) Any unscheduled engine, emission control system, or fuel system adjustment... vehicles in use, and does not require direct access to the combustion chamber, except for spark plug, fuel injection component, or removable prechamber removal or replacement; and (ii) Has made a determination that...

  6. 40 CFR 86.429-78 - Maintenance, unscheduled; test vehicles.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., unscheduled; test vehicles. (a) Any unscheduled engine, emission control system, or fuel system adjustment... vehicles in use, and does not require direct access to the combustion chamber, except for spark plug, fuel injection component, or removable prechamber removal or replacement; and (ii) Has made a determination that...

  7. Addressing the Tension Between Strong Perimeter Control an Usability

    NASA Technical Reports Server (NTRS)

    Hinke, Thomas H.; Kolano, Paul Z.; Keller, Chris

    2006-01-01

    This paper describes a strong perimeter control system for a general purpose processing system, with the perimeter control system taking significant steps to address usability issues, thus mitigating the tension between strong perimeter protection and usability. A secure front end enforces two-factor authentication for all interactive access to an enclave that contains a large supercomputer and various associated systems, with each requiring their own authentication. Usability is addressed through a design in which the user has to perform two-factor authentication at the secure front end in order to gain access to the enclave, while an agent transparently performs public key authentication as needed to authenticate to specific systems within the enclave. The paper then describes a proxy system that allows users to transfer files into the enclave under script control, when the user is not present to perform two-factor authentication. This uses a pre-authorization approach based on public key technology, which is still strongly tied to both two-factor authentication and strict control over where files can be transferred on the target system. Finally the paper describes an approach to support network applications and systems such as grids or parallel file transfer protocols that require the use of many ports through the perimeter. The paper describes a least privilege approach that dynamically opens ports on a host-specific, if-authorized, as-needed, just-in-time basis.

  8. Effective Materials Property Information Management for the 21st Century

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ren, Weiju; Cebon, David; Arnold, Steve

    2010-01-01

    This paper discusses key principles for the development of materials property information management software systems. There are growing needs for automated materials information management in industry, research organizations and government agencies. In part these are fuelled by the demands for higher efficiency in material testing, product design and development and engineering analysis. But equally important, organizations are being driven to employ sophisticated methods and software tools for managing their mission-critical materials information by the needs for consistency, quality and traceability of data, as well as control of access to proprietary or sensitive information. Furthermore the use of increasingly sophisticated nonlinear,more » anisotropic and multi-scale engineering analysis approaches, particularly for composite materials, requires both processing of much larger volumes of test data for development of constitutive models and much more complex materials data input requirements for Computer-Aided Engineering (CAE) software. And finally, the globalization of engineering processes and outsourcing of design and development activities generates much greater needs for sharing a single gold source of materials information between members of global engineering teams in extended supply-chains. Fortunately material property management systems have kept pace with the growing user demands. They have evolved from hard copy archives, through simple electronic databases, to versatile data management systems that can be customized to specific user needs. The more sophisticated of these provide facilities for: (i) data management functions such as access control, version control, and quality control; (ii) a wide range of data import, export and analysis capabilities; (iii) mechanisms for ensuring that all data is traceable to its pedigree sources: details of testing programs, published sources, etc; (iv) tools for searching, reporting and viewing the data; and (v) access to the information via a wide range of interfaces, including web browsers, rich clients, programmatic access and clients embedded in third-party applications, such as CAE systems. This paper discusses the important requirements for advanced material data management systems as well as the future challenges and opportunities such as automated error checking, automated data quality assessment and characterization, identification of gaps in data, as well as functionalities and business models to keep users returning to the source: to generate user demand to fuel database growth and maintenance.« less

  9. Day care PNL using 'Santosh-PGI hemostatic seal' versus standard PNL: A randomized controlled study.

    PubMed

    Kumar, Santosh; Singh, Shivanshu; Singh, Prashant; Singh, Shrawan Kumar

    2016-01-01

    To compare the outcomes of tubeless day care PNL using hemostatic seal in the access tract versus standard PNL. It was a prospective randomized controlled study. Cases were randomized to either the day care group with hemostatic seal (DCS) or the control group where patients were admitted and a nephrostomy tube was placed at the conclusion of surgery. A total of 180 cases were screened and out of these, 113 were included in the final analysis. The stone clearance rates were comparable in both the groups. The mean drop in hemoglobin was significantly lower in DCS group than the control group (1.05 ±0.68 vs. 1.30 ±0.58 gm/dl, p = 0.038).Mean postoperative pain score, analgesic requirement (paracetamol) and duration of hospital stay were also significantly lower in the DCS group (3.79 ±1.23 vs. 6.12 ±0.96, 1.48 ±0.50 vs. 4.09 ±1.11 grams and 0.48 ±0.26 vs. 4.74 ±1.53 days respectively; p <0.05). The incidence of urine leakage through the access tract site was significantly lower in the DCS subgroup when compared to the controls (3.6% vs. 21.1%, p <0.05). Cases in the DCS group resumed their normal activities in a significantly shorter time (8.05 ±3.05 vs.18.42 ±4.42 days; p <0.05). Higher proportion of cases in the DCS group got re-admitted, although it was not a statistically significant number (7.1% vs. 1.8%; p = 0.21). Tubeless day care PNL with composite hemostatic tract seal is considered safe. It resulted in a significant reduction of blood loss and analgesic requirement with significantly reduced hospital stay, nephrostomy tube site morbidity and time required to resume normal activity when compared to the standard PNL. However, patients must be compliant with the given instructions and should have access to a health care facility, as few of them may need re-admission.

  10. Day care PNL using ‘Santosh-PGI hemostatic seal’ versus standard PNL: A randomized controlled study

    PubMed Central

    Singh, Shivanshu; Singh, Prashant; Singh, Shrawan Kumar

    2016-01-01

    Introduction To compare the outcomes of tubeless day care PNL using hemostatic seal in the access tract versus standard PNL. Material and methods It was a prospective randomized controlled study. Cases were randomized to either the day care group with hemostatic seal (DCS) or the control group where patients were admitted and a nephrostomy tube was placed at the conclusion of surgery. Results A total of 180 cases were screened and out of these, 113 were included in the final analysis. The stone clearance rates were comparable in both the groups. The mean drop in hemoglobin was significantly lower in DCS group than the control group (1.05 ±0.68 vs. 1.30 ±0.58 gm/dl, p = 0.038).Mean postoperative pain score, analgesic requirement (paracetamol) and duration of hospital stay were also significantly lower in the DCS group (3.79 ±1.23 vs. 6.12 ±0.96, 1.48 ±0.50 vs. 4.09 ±1.11 grams and 0.48 ±0.26 vs. 4.74 ±1.53 days respectively; p <0.05). The incidence of urine leakage through the access tract site was significantly lower in the DCS subgroup when compared to the controls (3.6% vs. 21.1%, p <0.05). Cases in the DCS group resumed their normal activities in a significantly shorter time (8.05 ±3.05 vs.18.42 ±4.42 days; p <0.05). Higher proportion of cases in the DCS group got re-admitted, although it was not a statistically significant number (7.1% vs. 1.8%; p = 0.21). Conclusions Tubeless day care PNL with composite hemostatic tract seal is considered safe. It resulted in a significant reduction of blood loss and analgesic requirement with significantly reduced hospital stay, nephrostomy tube site morbidity and time required to resume normal activity when compared to the standard PNL. However, patients must be compliant with the given instructions and should have access to a health care facility, as few of them may need re-admission. PMID:27551557

  11. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    PubMed

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  12. MediaTracker system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sandoval, D. M.; Strittmatter, R. B.; Abeyta, J. D.

    2004-01-01

    The initial objectives of this effort were to provide a hardware and software platform that can address the requirements for the accountability of classified removable electronic media and vault access logging. The Media Tracker system software assists classified media custodian in managing vault access logging and Media Tracking to prevent the inadvertent violation of rules or policies for the access to a restricted area and the movement and use of tracked items. The MediaTracker system includes the software tools to track and account for high consequence security assets and high value items. The overall benefits include: (1) real-time access tomore » the disposition of all Classified Removable Electronic Media (CREM), (2) streamlined security procedures and requirements, (3) removal of ambiguity and managerial inconsistencies, (4) prevention of incidents that can and should be prevented, (5) alignment with the DOE's initiative to achieve improvements in security and facility operations through technology deployment, and (6) enhanced individual responsibility by providing a consistent method of dealing with daily responsibilities. In response to initiatives to enhance the control of classified removable electronic media (CREM), the Media Tracker software suite was developed, piloted and implemented at the Los Alamos National Laboratory beginning in July 2000. The Media Tracker software suite assists in the accountability and tracking of CREM and other high-value assets. One component of the MediaTracker software suite provides a Laboratory-approved media tracking system. Using commercial touch screen and bar code technology, the MediaTracker (MT) component of the MediaTracker software suite provides an efficient and effective means to meet current Laboratory requirements and provides new-engineered controls to help assure compliance with those requirements. It also establishes a computer infrastructure at vault entrances for vault access logging, and can accommodate several methods of positive identification including smart cards and biometrics. Currently, we have three mechanisms that provide added security for accountability and tracking purposes. One mechanism consists of a portable, hand-held inventory scanner, which allows the custodian to physically track the items that are not accessible within a particular area. The second mechanism is a radio frequency identification (RFID) consisting of a monitoring portal, which tracks and logs in a database all activity tagged of items that pass through the portals. The third mechanism consists of an electronic tagging of a flash memory device for automated inventory of CREM in storage. By modifying this USB device the user is provided with added assurance, limiting the data from being obtained from any other computer.« less

  13. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    PubMed

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.

  14. Venous hemostasis postcatheter ablation of atrial fibrillation while under therapeutic levels of oral and intravenous anticoagulation.

    PubMed

    Issa, Ziad F; Amr, Bashar S

    2015-11-01

    Catheter ablation of atrial fibrillation (AF) requires utilizing multiple venous femoral sheaths in conjunction with aggressive periprocedural anticoagulation, which can lead to increased risk of vascular access complications. The objective of this study is to evaluate the safety and efficacy of the "figure-of-eight" ("F-8") suture technique for femoral venous hemostasis while on therapeutic doses of intravenous anticoagulation at the time of sheath removal. In this case-control analysis, 376 consecutive patients underwent AF ablation while on uninterrupted oral anticoagulation and received intraprocedural heparin. In the first 253 patients (the control group), manual pressure was used for femoral venous hemostasis after reversal of heparin effects. The subsequent 123 patients (the F-8 group) had femoral venous hemostasis using the F-8 suture technique and while under therapeutic heparin effects. The F-8 subcutaneous suture technique achieved adequate venous hemostasis in 98.4% of patients. As compared to the control group, there was significantly less frequent utilization of the FemoStop compression assist device (1.2 vs. 16.8%, p < 0.0001) and in a significantly shorter interval (6.8 ± 5.7 vs. 50.7 ± 12.2 min, p < 0.0001). Vascular access complications and thromboembolic events occurred in 9.8% in the F-8 group vs. 13.0% in the control group (p = 0.678). Immediate hemostasis of the femoral venous access sites after insertion of multiple sheaths for AF ablation in the presence of anticoagulation can be safely and effectively achieved using the F-8 suture technique. This technique helps minimize the period of inadequate anticoagulation immediately following ablation and shortens the time required to achieve adequate hemostasis.

  15. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility requirements...

  16. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility requirements...

  17. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility requirements...

  18. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility requirements...

  19. 14 CFR 382.71 - What other aircraft accessibility requirements apply to carriers?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false What other aircraft accessibility requirements apply to carriers? 382.71 Section 382.71 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT... DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.71 What other aircraft accessibility requirements...

  20. 36 CFR 1193.31 - Accessibility and usability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Accessibility and usability... COMPLIANCE BOARD TELECOMMUNICATIONS ACT ACCESSIBILITY GUIDELINES Requirements for Accessibility and Usability § 1193.31 Accessibility and usability. When required by § 1193.21, telecommunications equipment and...

  1. 36 CFR 1193.31 - Accessibility and usability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Accessibility and usability... COMPLIANCE BOARD TELECOMMUNICATIONS ACT ACCESSIBILITY GUIDELINES Requirements for Accessibility and Usability § 1193.31 Accessibility and usability. When required by § 1193.21, telecommunications equipment and...

  2. 36 CFR 1193.31 - Accessibility and usability.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Accessibility and usability... COMPLIANCE BOARD TELECOMMUNICATIONS ACT ACCESSIBILITY GUIDELINES Requirements for Accessibility and Usability § 1193.31 Accessibility and usability. When required by § 1193.21, telecommunications equipment and...

  3. 36 CFR 1193.31 - Accessibility and usability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Accessibility and usability... COMPLIANCE BOARD TELECOMMUNICATIONS ACT ACCESSIBILITY GUIDELINES Requirements for Accessibility and Usability § 1193.31 Accessibility and usability. When required by § 1193.21, telecommunications equipment and...

  4. The design of the automated control system for warehouse equipment under radio-electronic manufacturing

    NASA Astrophysics Data System (ADS)

    Kapulin, D. V.; Chemidov, I. V.; Kazantsev, M. A.

    2017-01-01

    In the paper, the aspects of design, development and implementation of the automated control system for warehousing under the manufacturing process of the radio-electronic enterprise JSC «Radiosvyaz» are discussed. The architecture of the automated control system for warehousing proposed in the paper consists of a server which is connected to the physically separated information networks: the network with a database server, which stores information about the orders for picking, and the network with the automated storage and retrieval system. This principle allows implementing the requirements for differentiation of access, ensuring the information safety and security requirements. Also, the efficiency of the developed automated solutions in terms of optimizing the warehouse’s logistic characteristics is researched.

  5. Admission and Preventive Load Control for Delivery of Multicast and Broadcast Services via S-UMTS

    NASA Astrophysics Data System (ADS)

    Angelou, E.; Koutsokeras, N.; Andrikopoulos, I.; Mertzanis, I.; Karaliopoulos, M.; Henrio, P.

    2003-07-01

    An Admission Control strategy is proposed for unidirectional satellite systems delivering multicast and broadcast services to mobile users. In such systems, both the radio interface and the targeted services impose particular requirements on the RRM task. We briefly discuss the RRM requirements that stem from the services point of view and from the features of the SATIN access scheme that differentiate it from the conventional T-UMTS radio interface. The main functional entities of RRM and the alternative modes of operation are outlined and the proposed Admission Control algorithm is described in detail. The results from the simulation study that demonstrate its performance for a number of different scenarios are finally presented and conclusions derived.

  6. Storing, Browsing, Querying, and Sharing Data: the THREDDS Data Repository (TDR)

    NASA Astrophysics Data System (ADS)

    Wilson, A.; Lindholm, D.; Baltzer, T.

    2005-12-01

    The Unidata Internet Data Distribution (IDD) network delivers gigabytes of data per day in near real time to sites across the U.S. and beyond. The THREDDS Data Server (TDS) supports public browsing of metadata and data access via OPeNDAP enabled URLs for datasets such as these. With such large quantities of data, sites generally employ a simple data management policy, keeping the data for a relatively short term on the order of hours to perhaps a week or two. In order to save interesting data in longer term storage and make it available for sharing, a user must move the data herself. In this case the user is responsible for determining where space is available, executing the data movement, generating any desired metadata, and setting access control to enable sharing. This task sequence is generally based on execution of a sequence of low level operating system specific commands with significant user involvement. The LEAD (Linked Environments for Atmospheric Discovery) project is building a cyberinfrastructure to support research and education in mesoscale meteorology. LEAD orchestrations require large, robust, and reliable storage with speedy access to stage data and store both intermediate and final results. These requirements suggest storage solutions that involve distributed storage, replication, and interfacing to archival storage systems such as mass storage systems and tape or removable disks. LEAD requirements also include metadata generation and access in order to support querying. In support of both THREDDS and LEAD requirements, Unidata is designing and prototyping the THREDDS Data Repository (TDR), a framework for a modular data repository to support distributed data storage and retrieval using a variety of back end storage media and interchangeable software components. The TDR interface will provide high level abstractions for long term storage, controlled, fast and reliable access, and data movement capabilities via a variety of technologies such as OPeNDAP and gridftp. The modular structure will allow substitution of software components so that both simple and complex storage media can be integrated into the repository. It will also allow integration of different varieties of supporting software. For example, if replication is desired, replica management could be handled via a simple hash table or a complex solution such as Replica Locater Service (RLS). In order to ensure that metadata is available for all the data in the repository, the TDR will also generate THREDDS metadata when necessary. Users will be able to establish levels of access control to their metadata and data. Coupled with a THREDDS Data Server, both browsing via THREDDS catalogs and querying capabilities will be supported. This presentation will describe the motivating factors, current status, and future plans of the TDR. References: IDD: http://www.unidata.ucar.edu/content/software/idd/index.html THREDDS: http://www.unidata.ucar.edu/content/projects/THREDDS/tech/server/ServerStatus.html LEAD: http://lead.ou.edu/ RLS: http://www.isi.edu/~annc/papers/chervenakRLSjournal05.pdf

  7. Ultrashort pulse energy distribution for propulsion in space

    NASA Astrophysics Data System (ADS)

    Bergstue, Grant Jared

    This thesis effort focuses on the development of a novel, space-based ultrashort pulse transmission system for spacecraft. The goals of this research include: (1) ultrashort pulse transmission strategies for maximizing safety and efficiency; (2) optical transmission system requirements; (3) general system requirements including control techniques for stabilization; (4) optical system requirements for achieving effective ablative propulsion at the receiving spacecraft; and (5) ultrashort pulse transmission capabilities required for future missions in space. A key element of the research is the multiplexing device required for aligning the ultrashort pulses from multiple laser sources along a common optical axis for transmission. This strategy enables access to the higher average and peak powers required for useful missions in space.

  8. Engineering Design of ITER Prototype Fast Plant System Controller

    NASA Astrophysics Data System (ADS)

    Goncalves, B.; Sousa, J.; Carvalho, B.; Rodrigues, A. P.; Correia, M.; Batista, A.; Vega, J.; Ruiz, M.; Lopez, J. M.; Rojo, R. Castro; Wallander, A.; Utzel, N.; Neto, A.; Alves, D.; Valcarcel, D.

    2011-08-01

    The ITER control, data access and communication (CODAC) design team identified the need for two types of plant systems. A slow control plant system is based on industrial automation technology with maximum sampling rates below 100 Hz, and a fast control plant system is based on embedded technology with higher sampling rates and more stringent real-time requirements than that required for slow controllers. The latter is applicable to diagnostics and plant systems in closed-control loops whose cycle times are below 1 ms. Fast controllers will be dedicated industrial controllers with the ability to supervise other fast and/or slow controllers, interface to actuators and sensors and, if necessary, high performance networks. Two prototypes of a fast plant system controller specialized for data acquisition and constrained by ITER technological choices are being built using two different form factors. This prototyping activity contributes to the Plant Control Design Handbook effort of standardization, specifically regarding fast controller characteristics. Envisaging a general purpose fast controller design, diagnostic use cases with specific requirements were analyzed and will be presented along with the interface with CODAC and sensors. The requirements and constraints that real-time plasma control imposes on the design were also taken into consideration. Functional specifications and technology neutral architecture, together with its implications on the engineering design, were considered. The detailed engineering design compliant with ITER standards was performed and will be discussed in detail. Emphasis will be given to the integration of the controller in the standard CODAC environment. Requirements for the EPICS IOC providing the interface to the outside world, the prototype decisions on form factor, real-time operating system, and high-performance networks will also be discussed, as well as the requirements for data streaming to CODAC for visualization and archiving.

  9. Index of Non-Government Standards on Human Engineering Design Criteria and Program Requirements/Guidelines. Version 3

    DTIC Science & Technology

    2002-10-01

    the Seated Operator of Off-Highway Work Machines ♦ SAE J1013 1992 http://www.sae.org/servlets/ index http://standards.nasa.gov/NPTS/login.taf...Public Access permits users to view the NASA Preferred Technical Standards index , with the capability to download free of charge the NASA- Developed ...www.sae.org/servlets/ index http://www.techstreet.com/ Design of Ergonomic Requirements for the Design of Displays and Control Actuators -

  10. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    PubMed

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  11. Is the digitization of laparoscopic movement using accessible alternative technologies possible?

    PubMed

    Lorias Espinoza, Daniel; Gutiérrez Gnecchi, José Antonio; Martínez, Arturo Minor

    2012-05-01

    It is widely documented that laparoscopic surgeons require training, and an objective evaluation of the training that they receive. The most advanced evaluation systems integrate the digitization of the movement of laparoscopic tools. A great number of these systems, however, do not permit the use of real tools and their high cost limits their academic impact. Likewise, it is documented that new and accessible systems need to be developed. The aim of this article is to explore the possibility of digitizing the movement of laparoscopic tools in a three-dimensional workspace, using accessible alternative technology. Our proposal uses a commercial Wii video game control in conjunction with a program for determining kinematic variables during the execution of a recognition task.

  12. 49 CFR 39.61 - What requirements must PVOs meet concerning the accessibility of terminals and other landside...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... accessibility of terminals and other landside facilities? 39.61 Section 39.61 Transportation Office of the... Accessibility of Landside Facilities § 39.61 What requirements must PVOs meet concerning the accessibility of terminals and other landside facilities? As a PVO, you must comply with the following requirements with...

  13. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  14. Emotional and cognitive influences in air traffic controller tasks: An investigation using a virtual environment?

    PubMed

    Truschzinski, Martina; Betella, Alberto; Brunnett, Guido; Verschure, Paul F M J

    2018-05-01

    Air traffic controllers are required to perform complex tasks which require attention and high precision. This study investigates how the difficulty of such tasks influences emotional states, cognitive workload and task performance. We use quantitative and qualitative measurements, including the recording of pupil dilation and changes in affect using questionnaires. Participants were required to perform a number of air traffic control tasks using the immersive human accessible Virtual Reality space in the "eXperience Induction Machine". Based on the data collected, we developed and validated a model which integrates personality, workload and affective theories. Our results indicate that the difficulty of an air traffic control task has a direct influence on cognitive workload as well as on the self-reported mood; whereas both mood and workload seem to change independently. In addition, we show that personality, in particular neuroticism, affects both mood and performance of the participants. Copyright © 2018 Elsevier Ltd. All rights reserved.

  15. Land and Resource Management Issues Relevant to Deploying In-Situ Thermal Technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keiter, Robert; Ruple, John; Tanana, Heather

    2011-01-01

    Utah is home to oil shale resources containing roughly 1.3 trillion barrels of oil equivalent and our nation’s richest oil sands resources. If economically feasible and environmentally responsible means of tapping these resources can be developed, these resources could provide a safe and stable domestic energy source for decades to come. In Utah, oil shale and oil sands resources underlay a patchwork of federal, state, private, and tribal lands that are subject to different regulatory schemes and conflicting management objectives. Evaluating the development potential of Utah’s oil shale and oil sands resources requires an understanding of jurisdictional issues and themore » challenges they present to deployment and efficient utilization of emerging technologies. The jurisdictional patchwork and divergent management requirements inhibit efficient, economic, and environmentally sustainable development. This report examines these barriers to resource development, methods of obtaining access to landlocked resources, and options for consolidating resource ownership. This report also examines recent legislative efforts to wrest control of western public lands from the federal government. If successful, these efforts could dramatically reshape resource control and access, though these efforts appear to fall far short of their stated goals. The unintended consequences of adversarial approaches to obtaining resource access may outweigh their benefits, hardening positions and increasing tensions to the detriment of overall coordination between resource managers. Federal land exchanges represent a more efficient and mutually beneficial means of consolidating management control and improving management efficiency. Independent of exchange proposals, resource managers must improve coordination, moving beyond mere consultation with neighboring landowners and sister agencies to coordinating actions with them.« less

  16. The assessment of exploitation process of power for access control system

    NASA Astrophysics Data System (ADS)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  17. From managing access to managing care: the impact of primary care on health care delivery organizations.

    PubMed

    Hickey, M E

    1995-10-01

    Professional "revenge of the nerds" is currently taking place, as managed care evolves generalist physicians into new professional prominence. Primary care physicians are finding themselves at the center of health care market reform as health plans, insurers, and other financing organizations turn to them as the key to cost control. In short supply, they are prospering financially from the demand. As the source of patients, they are gaining in prestige from specialists and hospitals who once demeaned them. But these newfound roles are only the initial steps in the transformation of the primary care practitioner. The change that the generalists are experiencing is essentially managing access to care, not truly managing care itself. There are large and crucial differences between managing access to care and actually managing care. These differences are, in many ways, a higher calling for primary care practitioners as they refocus attention on patient outcomes, which will in itself result in a lower resource utilization above and beyond the crude controlling of access. What those differences are, what new roles they require, and what impact they will have on organizations that either house or contract with primary care physicians will be the focus of this article.

  18. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    DTIC Science & Technology

    2008-12-01

    always light at the end of the tunnel . Last but not less, the author would like to share the success of the completion of this thesis research...modern clients (e.g. Blackberries , iPhones, tactical digital assistants like the TACTICOMP), wikis do not require extensive user training or loading of

  19. 76 FR 30940 - Information Collection Being Submitted to the Office of Management and Budget for Emergency...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-27

    ... Control Number: 3060-XXXX. Title: Sections 1.1420; 1.1422; and 1.1424 Pole Attachment Access Requirements... mandate that communications companies (attachers) should be able to place facilities on utility poles. The... include the pole owner notifying all known entities with existing attachments and the requesting attacher...

  20. 25 CFR 291.4 - What must a proposal requesting Class III gaming procedures contain?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... activities of the Indian tribe's gaming operations; (4) Internal control standards designed to ensure fiscal..., maintenance, and accessibility; (6) Conduct of games, including patron requirements, posting of game rules, and hours of operation; (7) Procedures to protect the integrity of the rules for playing games; (8...

  1. 25 CFR 291.4 - What must a proposal requesting Class III gaming procedures contain?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... activities of the Indian tribe's gaming operations; (4) Internal control standards designed to ensure fiscal..., maintenance, and accessibility; (6) Conduct of games, including patron requirements, posting of game rules, and hours of operation; (7) Procedures to protect the integrity of the rules for playing games; (8...

  2. 25 CFR 291.4 - What must a proposal requesting Class III gaming procedures contain?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... activities of the Indian tribe's gaming operations; (4) Internal control standards designed to ensure fiscal..., maintenance, and accessibility; (6) Conduct of games, including patron requirements, posting of game rules, and hours of operation; (7) Procedures to protect the integrity of the rules for playing games; (8...

  3. 25 CFR 291.4 - What must a proposal requesting Class III gaming procedures contain?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... activities of the Indian tribe's gaming operations; (4) Internal control standards designed to ensure fiscal..., maintenance, and accessibility; (6) Conduct of games, including patron requirements, posting of game rules, and hours of operation; (7) Procedures to protect the integrity of the rules for playing games; (8...

  4. 25 CFR 291.4 - What must a proposal requesting Class III gaming procedures contain?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... activities of the Indian tribe's gaming operations; (4) Internal control standards designed to ensure fiscal..., maintenance, and accessibility; (6) Conduct of games, including patron requirements, posting of game rules, and hours of operation; (7) Procedures to protect the integrity of the rules for playing games; (8...

  5. 40 CFR 63.1103 - Source category-specific applicability, definitions, and requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... separation of raw materials and by-products from the stabilized polymer. Front end process vent means any... vent systems, control devices, recovery devices, and routing to a fuel gas system or a process), as... allow worker access; passage of material into or out of the enclosure by conveyor, vehicles, or other...

  6. 29 CFR 1910.306 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... means required by paragraph (e)(1) of this section. (f) X-Ray equipment. This paragraph applies to X-ray... disconnecting means shall be operable from a location readily accessible from the X-ray control. For equipment... suitable nonmetallic raceways or cable trays; or (C) Wire or cable in suitable metal raceways or metal...

  7. 29 CFR 1910.306 - Specific purpose equipment and installations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... means required by paragraph (e)(1) of this section. (f) X-Ray equipment. This paragraph applies to X-ray... disconnecting means shall be operable from a location readily accessible from the X-ray control. For equipment... suitable nonmetallic raceways or cable trays; or (C) Wire or cable in suitable metal raceways or metal...

  8. Politic of Security, Privacy and Transparency in Human Learning Systems

    ERIC Educational Resources Information Center

    Jeghal, Adil; Oughdir, Lahcen; Tairi, Hamid

    2016-01-01

    The preservation of confidentiality has become a major issue for the majority of applications that process personal information, the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. A great deal of research has already been conducted in educational environments. However, one aspect…

  9. 40 CFR Table 5 to Subpart Ggg of... - Control Requirements for Items of Equipment That Meet the Criteria of § 63.1252(f)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...(h)(2); or (b) Equip with a floating roof that meets the equipment specifications of § 60.693(a)(1)(i... and other points of access to a conveyance system. c A fixed roof may have openings necessary for...

  10. EBOOK.EXE: A Desktop Authoring Tool for HURAA.

    ERIC Educational Resources Information Center

    Hu, Xiangen; Mathews, Eric; Graesser, Arthur C.; Susarla, Suresh

    The development of authoring tools for intelligent systems is an important step for creating, maintaining, and structuring content in a quick and easy manner. It has the benefit of allowing for a rapid change to new domains or topics for tutoring. The development of such tools requires functional control, access protection, ease of learning, and…

  11. 46 CFR 58.25-85 - Special requirements for tank vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... must meet equivalent standards to the satisfaction of the Commanding Officer, Marine Safety Center. (d... installed are non-duplicated hydraulic and if— (1) The actuators comply with § 58.25-60; and (2) In case of... (e), (h), (i), and (j); (2) Ensure working access to machinery and controls in the steering-gear...

  12. 46 CFR 58.25-85 - Special requirements for tank vessels.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... must meet equivalent standards to the satisfaction of the Commanding Officer, Marine Safety Center. (d... installed are non-duplicated hydraulic and if— (1) The actuators comply with § 58.25-60; and (2) In case of... (e), (h), (i), and (j); (2) Ensure working access to machinery and controls in the steering-gear...

  13. The Houston Community College Eligible Legalized Alien Program. Evaluation Program. Evaluation Report.

    ERIC Educational Resources Information Center

    Seaman, Don F.; Cuellar, Sylvia

    The Houston Community College (Texas) program (TOTAL ACCESS) designed in response to the Immigration Reform and Control Act of 1986, is described and evaluated. The program offers classes to eligible aliens (97% Hispanic Americans from Mexico, El Salvador, and Guatemala) wishing to pursue the educational program required for legalization. Program…

  14. 32 CFR 34.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Retention and access requirements for records. 34.42 Section 34.42 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD... ORGANIZATIONS Post-award Requirements Reports and Records § 34.42 Retention and access requirements for records...

  15. 32 CFR 34.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Retention and access requirements for records. 34.42 Section 34.42 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD... ORGANIZATIONS Post-award Requirements Reports and Records § 34.42 Retention and access requirements for records...

  16. Accessing the exceptional points of parity-time symmetric acoustics

    PubMed Central

    Shi, Chengzhi; Dubois, Marc; Chen, Yun; Cheng, Lei; Ramezani, Hamidreza; Wang, Yuan; Zhang, Xiang

    2016-01-01

    Parity-time (PT) symmetric systems experience phase transition between PT exact and broken phases at exceptional point. These PT phase transitions contribute significantly to the design of single mode lasers, coherent perfect absorbers, isolators, and diodes. However, such exceptional points are extremely difficult to access in practice because of the dispersive behaviour of most loss and gain materials required in PT symmetric systems. Here we introduce a method to systematically tame these exceptional points and control PT phases. Our experimental demonstration hinges on an active acoustic element that realizes a complex-valued potential and simultaneously controls the multiple interference in the structure. The manipulation of exceptional points offers new routes to broaden applications for PT symmetric physics in acoustics, optics, microwaves and electronics, which are essential for sensing, communication and imaging. PMID:27025443

  17. Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application

    NASA Astrophysics Data System (ADS)

    Zhang, De-gan; Zhang, Xiao-dan

    2012-11-01

    With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.

  18. User Access Management Based on Network Pricing for Social Network Applications

    PubMed Central

    Ma, Xingmin; Gu, Qing

    2018-01-01

    Social applications play a very important role in people’s lives, as users communicate with each other through social networks on a daily basis. This presents a challenge: How does one receive high-quality service from social networks at a low cost? Users can access different kinds of wireless networks from various locations. This paper proposes a user access management strategy based on network pricing such that networks can increase its income and improve service quality. Firstly, network price is treated as an optimizing access parameter, and an unascertained membership algorithm is used to make pricing decisions. Secondly, network price is adjusted dynamically in real time according to network load. Finally, selecting a network is managed and controlled in terms of the market economy. Simulation results show that the proposed scheme can effectively balance network load, reduce network congestion, improve the user's quality of service (QoS) requirements, and increase the network’s income. PMID:29495252

  19. Intestinal Master Transcription Factor CDX2 Controls Chromatin Access for Partner Transcription Factor Binding

    PubMed Central

    Verzi, Michael P.; Shin, Hyunjin; San Roman, Adrianna K.

    2013-01-01

    Tissue-specific gene expression requires modulation of nucleosomes, allowing transcription factors to occupy cis elements that are accessible only in selected tissues. Master transcription factors control cell-specific genes and define cellular identities, but it is unclear if they possess special abilities to regulate cell-specific chromatin and if such abilities might underlie lineage determination and maintenance. One prevailing view is that several transcription factors enable chromatin access in combination. The homeodomain protein CDX2 specifies the embryonic intestinal epithelium, through unknown mechanisms, and partners with transcription factors such as HNF4A in the adult intestine. We examined enhancer chromatin and gene expression following Cdx2 or Hnf4a excision in mouse intestines. HNF4A loss did not affect CDX2 binding or chromatin, whereas CDX2 depletion modified chromatin significantly at CDX2-bound enhancers, disrupted HNF4A occupancy, and abrogated expression of neighboring genes. Thus, CDX2 maintains transcription-permissive chromatin, illustrating a powerful and dominant effect on enhancer configuration in an adult tissue. Similar, hierarchical control of cell-specific chromatin states is probably a general property of master transcription factors. PMID:23129810

  20. Cloud Optimized Image Format and Compression

    NASA Astrophysics Data System (ADS)

    Becker, P.; Plesea, L.; Maurer, T.

    2015-04-01

    Cloud based image storage and processing requires revaluation of formats and processing methods. For the true value of the massive volumes of earth observation data to be realized, the image data needs to be accessible from the cloud. Traditional file formats such as TIF and NITF were developed in the hay day of the desktop and assumed fast low latency file access. Other formats such as JPEG2000 provide for streaming protocols for pixel data, but still require a server to have file access. These concepts no longer truly hold in cloud based elastic storage and computation environments. This paper will provide details of a newly evolving image storage format (MRF) and compression that is optimized for cloud environments. Although the cost of storage continues to fall for large data volumes, there is still significant value in compression. For imagery data to be used in analysis and exploit the extended dynamic range of the new sensors, lossless or controlled lossy compression is of high value. Compression decreases the data volumes stored and reduces the data transferred, but the reduced data size must be balanced with the CPU required to decompress. The paper also outlines a new compression algorithm (LERC) for imagery and elevation data that optimizes this balance. Advantages of the compression include its simple to implement algorithm that enables it to be efficiently accessed using JavaScript. Combing this new cloud based image storage format and compression will help resolve some of the challenges of big image data on the internet.

  1. 28 CFR 41.56 - General requirement concerning program accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false General requirement concerning program accessibility. 41.56 Section 41.56 Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF EXECUTIVE... Determining Discriminatory Practices Program Accessibility § 41.56 General requirement concerning program...

  2. 78 FR 31769 - Accessible Emergency Information; Apparatus Requirements for Emergency Information and Video...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Accessible Emergency Information; Apparatus Requirements for Emergency Information and Video Description...] Accessible Emergency Information; Apparatus Requirements for Emergency Information and Video Description... manufacturers of devices that display video programming to ensure that certain apparatus are able to make...

  3. Location Based Application Availability

    NASA Astrophysics Data System (ADS)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  4. Indirect Gas Species Monitoring Using Tunable Diode Lasers

    DOEpatents

    Von Drasek, William A.; Saucedo, Victor M.

    2005-02-22

    A method for indirect gas species monitoring based on measurements of selected gas species is disclosed. In situ absorption measurements of combustion species are used for process control and optimization. The gas species accessible by near or mid-IR techniques are limited to species that absorb in this spectral region. The absorption strength is selected to be strong enough for the required sensitivity and is selected to be isolated from neighboring absorption transitions. By coupling the gas measurement with a software sensor gas, species not accessible from the near or mid-IR absorption measurement can be predicted.

  5. Securing Ground Data System Applications for Space Operations

    NASA Technical Reports Server (NTRS)

    Pajevski, Michael J.; Tso, Kam S.; Johnson, Bryan

    2014-01-01

    The increasing prevalence and sophistication of cyber attacks has prompted the Multimission Ground Systems and Services (MGSS) Program Office at Jet Propulsion Laboratory (JPL) to initiate the Common Access Manager (CAM) effort to protect software applications used in Ground Data Systems (GDSs) at JPL and other NASA Centers. The CAM software provides centralized services and software components used by GDS subsystems to meet access control requirements and ensure data integrity, confidentiality, and availability. In this paper we describe the CAM software; examples of its integration with spacecraft commanding software applications and an information management service; and measurements of its performance and reliability.

  6. Implementing a Data Quality Strategy to Simplify Access to Data

    NASA Astrophysics Data System (ADS)

    Druken, K. A.; Trenham, C. E.; Evans, B. J. K.; Richards, C. J.; Wang, J.; Wyborn, L. A.

    2016-12-01

    To ensure seamless programmatic access for data analysis (including machine learning), standardization of both data and services is vital. At the Australian National Computational Infrastructure (NCI) we have developed a Data Quality Strategy (DQS) that currently provides processes for: (1) the consistency of data structures in the underlying High Performance Data (HPD) platform; (2) quality control through compliance with recognized community standards; and (3) data quality assurance through demonstrated functionality across common platforms, tools and services. NCI hosts one of Australia's largest repositories (10+ PBytes) of research data collections spanning datasets from climate, coasts, oceans and geophysics through to astronomy, bioinformatics and the social sciences. A key challenge is the application of community-agreed data standards to the broad set of Earth systems and environmental data that are being used. Within these disciplines, data span a wide range of gridded, ungridded (i.e., line surveys, point clouds), and raster image types, as well as diverse coordinate reference projections and resolutions. By implementing our DQS we have seen progressive improvement in the quality of the datasets across the different subject domains, and through this, the ease by which the users can programmatically access the data, either in situ or via web services. As part of its quality control procedures, NCI has developed a compliance checker based upon existing domain standards. The DQS also includes extensive Functionality Testing which include readability by commonly used libraries (e.g., netCDF, HDF, GDAL, etc.); accessibility by data servers (e.g., THREDDS, Hyrax, GeoServer), validation against scientific analysis and programming platforms (e.g., Python, Matlab, QGIS); and visualization tools (e.g., ParaView, NASA Web World Wind). These tests ensure smooth interoperability between products and services as well as exposing unforeseen requirements and dependencies. The results provide an important component of quality control within the DQS as well as clarifying the requirement for any extensions to the relevant standards that help support the uptake of data by broader international communities.

  7. Reclamation and revegetation along a 250-mile 500 kV power line corridor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Griffith, E.F.

    1990-12-31

    Reclamation and revegetation success along the Montana Power Company Colstrip to Deepdale 500 kV powerline was monitored from 1985 through 1989. Followup revegetation was hampered by inadequate road and tower site earth work as a result of premature release of the reclamation bond. Drought conditions in 1985 and 1988 seriously affected revegetation efforts, especially on difficult sites. Weed control improved markedly, and all ROW areas are weed free except those next to infested range and cropland where a major cooperative effort is needed to control weeds. Access roads in previously unroaded areas resulted in changes of access, management practices, andmore » cattle grazing behavior, all of which adversely affected revegetation success. Erosion, exacerbated by undersized culverts, the presence of very erodible soils, the occasional untrained contractor, is now the major ROW maintenance concern. Observation of the revegetation efforts clearly shows the need for adequate and appropriate reclamation by qualified equipment operators up front, and a patient, measured effort of continued revegetation, weed control and erosion control over the long term. The bond period of 5 years may not be long enough to achieve the 90 percent revegetation success required by the permit. Future projects guidelines should consider look to a flexible timeframe and more realistic vegetation requirements to account for the effects of non-construction related impacts.« less

  8. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Sea scallop access area program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop access area program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  9. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false Sea scallop access area program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop access area program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  10. 50 CFR 648.60 - Sea scallop area access program requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Sea scallop area access program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop area access program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  11. 50 CFR 648.60 - Sea scallop access area program requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Sea scallop access area program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop access area program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  12. 50 CFR 648.60 - Sea scallop area access program requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Sea scallop area access program... Management Measures for the Atlantic Sea Scallop Fishery § 648.60 Sea scallop area access program requirements. (a) A limited access scallop vessel may only fish in the Sea Scallop Access Areas specified in...

  13. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  14. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  15. Vaccine production, distribution, access and uptake

    PubMed Central

    Smith, Jon; Lipsitch, Marc; Almond, Jeffrey W.

    2011-01-01

    Making human vaccines available on a global scale requires the use of complex production methods, meticulous quality control and reliable distribution channels that ensure the products are potent and effective at their point of use. The technologies involved in manufacturing different types of vaccines may strongly influence vaccine cost, ease of industrial scale-up, stability and ultimately world-wide availability. Manufacturing complexity is compounded by the need for different formulations for different countries and age groups. Reliable vaccine production in appropriate quantities and at affordable prices is the cornerstone of developing global vaccination policies. However, ensuring optimal access and uptake also requires strong partnerships between private manufacturers, regulatory authorities and national and international public health services. For vaccines whose supplies are limited, either due to rapidly emerging diseases or longer-term mismatch of supply and demand, prioritizing target groups can increase vaccine impact. Focusing on influenza vaccines as an example that well illustrates many of the relevant points, this article considers current production, distribution, access and other factors that ultimately impact on vaccine uptake and population-level effectiveness. PMID:21664680

  16. A baseline maritime satellite communication system

    NASA Technical Reports Server (NTRS)

    Durrani, S. H.; Mcgregor, D. N.

    1974-01-01

    This paper describes a baseline system for maritime communications via satellite during the 1980s. The system model employs three geostationary satellites with global coverage antennas. Access to the system is controlled by a master station; user access is based on time-ordered polling or random access. Each Thor-Delta launched satellite has an RF power of 100 W (spinner) or 250 W (three-axis stabilized), and provides 10 equivalent duplex voice channels for up to 1500 ships with average waiting times of approximately 2.5 minutes. The satellite capacity is bounded by the available bandwidth to 50 such channels, which can serve up to 10,000 ships with an average waiting time of 5 minutes. The ships must have peak antenna gains of approximately 15.5 dB or 22.5 dB for the two cases (10 or 50 voice channels) when a spinner satellite is used; the required gains are 4 dB lower if a three-axis stabilized satellite is used. The ship antenna requirements can be reduced by 8 to 10 dB by employing a high-gain multi-beam phased array antenna on the satellite.

  17. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  18. Adaptive Power Control for Space Communications

    NASA Technical Reports Server (NTRS)

    Thompson, Willie L., II; Israel, David J.

    2008-01-01

    This paper investigates the implementation of power control techniques for crosslinks communications during a rendezvous scenario of the Crew Exploration Vehicle (CEV) and the Lunar Surface Access Module (LSAM). During the rendezvous, NASA requires that the CEV supports two communication links: space-to-ground and crosslink simultaneously. The crosslink will generate excess interference to the space-to-ground link as the distances between the two vehicles decreases, if the output power is fixed and optimized for the worst-case link analysis at the maximum distance range. As a result, power control is required to maintain the optimal power level for the crosslink without interfering with the space-to-ground link. A proof-of-concept will be described and implemented with Goddard Space Flight Center (GSFC) Communications, Standard, and Technology Lab (CSTL).

  19. Frequency control of wind turbine in power system

    NASA Astrophysics Data System (ADS)

    Xu, Huawei

    2018-06-01

    In order to improve the stability of the overall frequency of the power system, automatic power generation control and secondary frequency adjustment were applied. Automatic power generation control was introduced into power generation planning. A dual-fed wind generator power regulation model suitable for secondary frequency regulation was established. The results showed that this method satisfied the basic requirements of frequency regulation control of large-scale wind power access power systems and improved the stability and reliability of power system operation. Therefore, this system frequency control method and strategy is relatively simple. The effect is significant. The system frequency can quickly reach a steady state. It is worth applying and promoting.

  20. SODR Memory Control Buffer Control ASIC

    NASA Technical Reports Server (NTRS)

    Hodson, Robert F.

    1994-01-01

    The Spacecraft Optical Disk Recorder (SODR) is a state of the art mass storage system for future NASA missions requiring high transmission rates and a large capacity storage system. This report covers the design and development of an SODR memory buffer control applications specific integrated circuit (ASIC). The memory buffer control ASIC has two primary functions: (1) buffering data to prevent loss of data during disk access times, (2) converting data formats from a high performance parallel interface format to a small computer systems interface format. Ten 144 p in, 50 MHz CMOS ASIC's were designed, fabricated and tested to implement the memory buffer control function.

  1. Airspace Operations Demo Functional Requirements Matrix

    NASA Technical Reports Server (NTRS)

    2005-01-01

    The Flight IPT assessed the reasonableness of demonstrating each of the Access 5 Step 1 functional requirements. The functional requirements listed in this matrix are from the September 2005 release of the Access 5 Functional Requirements Document. The demonstration mission considered was a notional Western US mission (WUS). The conclusion of the assessment is that 90% of the Access 5 Step 1 functional requirements can be demonstrated using the notional Western US mission.

  2. Evolution and Convergence of State Laws Governing Controlled Substance Prescription Monitoring Programs, 1998-2011

    PubMed Central

    Pierce, Matthew; Dasgupta, Nabarun

    2014-01-01

    Objectives. We sought to collect and characterize all laws governing the operation of prescription monitoring programs (PMPs), state-level databases that collect patient-specific prescription information, which have been suggested as a tool for reducing prescription drug overdose fatalities. Methods. We utilized a structured legal research protocol to systematically identify, review, and code all PMP statutes and regulations effective from 1998 through 2011. These laws were then abstracted along eleven domains, including reporting provisions, data sharing, and data access. Results. PMP characteristics vary greatly among states and across time. We observed an increase in the types and frequency of data required to be reported, the types of individuals permitted to access PMP data, and the percentage of PMPs authorized to proactively identify outlier prescribers and patients. As of 2011, 10 states required PMPs to report suspicious activity to law enforcement, while only 3 required reporting to the patient’s physician. None required linkage to drug treatment or required all prescribers to review PMP data before prescribing. Few explicitly address data retention. Conclusions. State PMP laws are heterogeneous and evolving. Future studies of PMP effectiveness should take these variations into account. PMID:24922132

  3. Designing a system for patients controlling providers' access to their electronic health records: organizational and technical challenges.

    PubMed

    Leventhal, Jeremy C; Cummins, Jonathan A; Schwartz, Peter H; Martin, Douglas K; Tierney, William M

    2015-01-01

    Electronic health records (EHRs) are proliferating, and financial incentives encourage their use. Applying Fair Information Practice principles to EHRs necessitates balancing patients' rights to control their personal information with providers' data needs to deliver safe, high-quality care. We describe the technical and organizational challenges faced in capturing patients' preferences for patient-controlled EHR access and applying those preferences to an existing EHR. We established an online system for capturing patients' preferences for who could view their EHRs (listing all participating clinic providers individually and categorically-physicians, nurses, other staff) and what data to redact (none, all, or by specific categories of sensitive data or patient age). We then modified existing data-viewing software serving a state-wide health information exchange and a large urban health system and its primary care clinics to allow patients' preferences to guide data displays to providers. Patients could allow or restrict data displays to all clinicians and staff in a demonstration primary care clinic, categories of providers (physicians, nurses, others), or individual providers. They could also restrict access to all EHR data or any or all of five categories of sensitive data (mental and reproductive health, sexually transmitted diseases, HIV/AIDS, and substance abuse) and for specific patient ages. The EHR viewer displayed data via reports, data flowsheets, and coded and free text data displayed by Google-like searches. Unless patients recorded restrictions, by default all requested data were displayed to all providers. Data patients wanted restricted were not displayed, with no indication they were redacted. Technical barriers prevented redacting restricted information in free textnotes. The program allowed providers to hit a "Break the Glass" button to override patients' restrictions, recording the date, time, and next screen viewed. Establishing patient-control over EHR data displays was complex and required ethical, clinical, database, and programming expertise and difficult choices to overcome technical and health system constraints. Assessing patients' preferences for access to their EHRs and applying them in clinical practice requires wide-ranging technical, clinical, and bioethical expertise, to make tough choices to overcome significant technical and organization challenges.

  4. Threshold-Based Random Charging Scheme for Decentralized PEV Charging Operation in a Smart Grid.

    PubMed

    Kwon, Ojin; Kim, Pilkee; Yoon, Yong-Jin

    2016-12-26

    Smart grids have been introduced to replace conventional power distribution systems without real time monitoring for accommodating the future market penetration of plug-in electric vehicles (PEVs). When a large number of PEVs require simultaneous battery charging, charging coordination techniques have become one of the most critical factors to optimize the PEV charging performance and the conventional distribution system. In this case, considerable computational complexity of a central controller and exchange of real time information among PEVs may occur. To alleviate these problems, a novel threshold-based random charging (TBRC) operation for a decentralized charging system is proposed. Using PEV charging thresholds and random access rates, the PEVs themselves can participate in the charging requests. As PEVs with a high battery state do not transmit the charging requests to the central controller, the complexity of the central controller decreases due to the reduction of the charging requests. In addition, both the charging threshold and the random access rate are statistically calculated based on the average of supply power of the PEV charging system that do not require a real time update. By using the proposed TBRC with a tolerable PEV charging degradation, a 51% reduction of the PEV charging requests is achieved.

  5. Threshold-Based Random Charging Scheme for Decentralized PEV Charging Operation in a Smart Grid

    PubMed Central

    Kwon, Ojin; Kim, Pilkee; Yoon, Yong-Jin

    2016-01-01

    Smart grids have been introduced to replace conventional power distribution systems without real time monitoring for accommodating the future market penetration of plug-in electric vehicles (PEVs). When a large number of PEVs require simultaneous battery charging, charging coordination techniques have become one of the most critical factors to optimize the PEV charging performance and the conventional distribution system. In this case, considerable computational complexity of a central controller and exchange of real time information among PEVs may occur. To alleviate these problems, a novel threshold-based random charging (TBRC) operation for a decentralized charging system is proposed. Using PEV charging thresholds and random access rates, the PEVs themselves can participate in the charging requests. As PEVs with a high battery state do not transmit the charging requests to the central controller, the complexity of the central controller decreases due to the reduction of the charging requests. In addition, both the charging threshold and the random access rate are statistically calculated based on the average of supply power of the PEV charging system that do not require a real time update. By using the proposed TBRC with a tolerable PEV charging degradation, a 51% reduction of the PEV charging requests is achieved. PMID:28035963

  6. Intelligent Facial Recognition Systems: Technology advancements for security applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g.,more » fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.« less

  7. Enabling Flexible and Continuous Capability Invocation in Mobile Prosumer Environments

    PubMed Central

    Alcarria, Ramon; Robles, Tomas; Morales, Augusto; López-de-Ipiña, Diego; Aguilera, Unai

    2012-01-01

    Mobile prosumer environments require the communication with heterogeneous devices during the execution of mobile services. These environments integrate sensors, actuators and smart devices, whose availability continuously changes. The aim of this paper is to design a reference architecture for implementing a model for continuous service execution and access to capabilities, i.e., the functionalities provided by these devices. The defined architecture follows a set of software engineering patterns and includes some communication paradigms to cope with the heterogeneity of sensors, actuators, controllers and other devices in the environment. In addition, we stress the importance of the flexibility in capability invocation by allowing the communication middleware to select the access technology and change the communication paradigm when dealing with smart devices, and by describing and evaluating two algorithms for resource access management. PMID:23012526

  8. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    NASA Technical Reports Server (NTRS)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  9. Ozone monitoring at remote sites using low-power instrumentation

    Treesearch

    John L. Korfmacher; Robert C. Musselman

    2014-01-01

    Collection of non-urban ambient ozone data at regional or larger scales (for example, Peake and Fong 1990; Bytnerowicz et al. 2004) is cost- and labor-intensive. Collection efforts are often further complicated by difficulty of access to data collection sites, the need for climate-controlled facilities to house instrumentation, and a requirement for a connection to...

  10. Securing Secrets and Managing Trust in Modern Computing Applications

    ERIC Educational Resources Information Center

    Sayler, Andy

    2016-01-01

    The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…

  11. 40 CFR Table 35 to Subpart G of... - Control Requirements for Items of Equipment That Meet the Criteria of § 63.149 of Subpart G

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... floating roof that meets the equipment specifications of § 60.693 (a)(1)(i), (a)(1)(ii), (a)(2), (a)(3... and other points of access to a conveyance system. c Applies to tanks with capacities of 38 m3 or...

  12. Secure Ad Hoc Networking on an Android Platform

    DTIC Science & Technology

    2014-05-01

    Once the device is provisioned, connections can be initiated by tapping two devices together, this uses NFC to bootstrap a Bluetooth connection. Once...4 2.2 Residual Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3 Device Provisioning 5 3.1...the inclusion of SE Android’s Install-time Mandatory Access Control (MAC) feature. Some knowledge of Android is required to understand the system

  13. 76 FR 14606 - Approval and Promulgation of Implementation Plans; South Carolina; 110(a)(1) and (2...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... reward system. As discussed above, Regulation 61-62.3, Air Pollution Episodes, requires that DHEC notify... ``anonymous access'' system, which means EPA will not know your identity or contact information unless you... air quality monitoring/data system. 110(a)(2)(C): Program for enforcement of control measures.\\2\\ \\2...

  14. How can the German Electronic Health Card support patient's role in care management.

    PubMed

    Pharow, Peter; Blobel, Bernd; Hildebrand, Claudia

    2008-01-01

    All types of advanced communication, collaboration, and cooperation in healthcare require a strong involvement of all addressed parties including health professionals and patients. Modern healthcare aims at involving patients having them take over responsibility for their own health status. Allowing them to take on their changed roles as emancipated partners in advanced care management, health professionals need to be educated and patients need to be empowered. From a security viewpoint, health issues have to be communicated via trusted health networks. To provide communication and cooperation between professionals and patients as well as to guarantee the required level of involvement of patients in shared care management environments, cards are widely used as person identifiers, on the one hand, and as security tokens, on the other. Being introduced as storage media and portable personalized application system, cards enable a patient controlled access to personalized health services as well as proper use and exchange of personal health data for specific purposes such as emergency. Furthermore, cards allow access to the wider electronic patient record via pointers or tickets. Cards can empower patients. The German Electronic Health Card (eGK) shall thus support care management and specific workflow processes e.g. for prescription and disease management. Regardless whether designed as data or pointer card - international standardization is a prerequisite also for national solutions. The more information patients have regarding different procedures and processes in healthcare, the more are they able to play their dedicated role within care management. Cards can and will contribute by allowing patients to get controlled access to administrative and medical data stored either on cards or in networks. Card holders determine who has access to their health information.

  15. Fixed Access Network Sharing

    NASA Astrophysics Data System (ADS)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  16. Radial access for cerebrovascular procedures: Case report and technical note.

    PubMed

    Satti, Sudhakar R; Vance, Ansar Z; Sivapatham, Thinesh

    2016-04-01

    Advantages of radial access over brachial/axillary or femoral access have been well described for several decades and include decreased cost, patient preference, and decreased major access site complications. Despite these advantages, radial access is rarely employed or even considered for neurointerventional procedures. This attitude should be reconsidered given several recent large, randomized, controlled trials from the cardiovascular literature proving that radial access is associated with statistically lower costs, decreased incidence of myocardial infarctions, strokes, and even decreased mortality. Radial access is now considered the standard of care for percutaneous coronary interventions in most US centers. Although radial access has been described for neurovascular procedures in the past, overall experience is limited. The two major challenges are the unique anatomy required to access the cerebral vasculature given very acute angles between the arm and craniocervical vessels and limitations in available technology. We present a simplified approach to radial access for cerebrovascular procedures and provide a concise step-by-step approach for patient selection, ultrasound-guided single-wall access, recommended catheters/wires, and review of patent hemostasis. Additionally, we present a complex cerebrovascular intervention in which standard femoral access was unsuccessful, while radial access was quickly achieved to highlight the importance of familiarity with the radial approach for all neurointerventionalists. We have found that the learning curve is not too steep and that the radial access approach can be adopted smoothly for a large percentage of diagnostic and interventional neuroradiologic procedures. Radial access should be considered in all patients undergoing a cerebrovascular procedure. © The Author(s) 2015.

  17. AMO EXPRESS: A Command and Control Experiment for Crew Autonomy Onboard the International Space Station

    NASA Technical Reports Server (NTRS)

    Cornelius, Randy; Frank, Jeremy; Garner, Larry; Haddock, Angie; Stetson, Howard; Wang, Lui

    2015-01-01

    The Autonomous Mission Operations project is investigating crew autonomy capabilities and tools for deep space missions. Team members at Ames Research Center, Johnson Space Center and Marshall Space Flight Center are using their experience with ISS Payload operations and TIMELINER to: move earth based command and control assets to on-board for crew access; safely merge core and payload command procedures; give the crew single action intelligent operations; and investigate crew interface requirements.

  18. Optical burst switching based satellite backbone network

    NASA Astrophysics Data System (ADS)

    Li, Tingting; Guo, Hongxiang; Wang, Cen; Wu, Jian

    2018-02-01

    We propose a novel time slot based optical burst switching (OBS) architecture for GEO/LEO based satellite backbone network. This architecture can provide high speed data transmission rate and high switching capacity . Furthermore, we design the control plane of this optical satellite backbone network. The software defined network (SDN) and network slice (NS) technologies are introduced. Under the properly designed control mechanism, this backbone network is flexible to support various services with diverse transmission requirements. Additionally, the LEO access and handoff management in this network is also discussed.

  19. Control Systems Cyber Security:Defense in Depth Strategies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecturemore » that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.« less

  20. Control Systems Cyber Security: Defense-in-Depth Strategies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecturemore » that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.« less

  1. Providing QoS guarantee in 3G wireless networks

    NASA Astrophysics Data System (ADS)

    Chuah, MooiChoo; Huang, Min; Kumar, Suresh

    2001-07-01

    The third generation networks and services present opportunities to offer multimedia applications and services that meet end-to-end quality of service requirements. In this article, we present UMTS QoS architecture and its requirements. This includes the definition of QoS parameters, traffic classes, the end-to-end data delivery model, and the mapping of end-to-end services to the services provided by the network elements of the UMTS. End-to-end QoS of a user flow is achieved by the combination of the QoS control over UMTS Domain and the IP core Network. In the Third Generation Wireless network, UMTS bearer service manager is responsible to manage radio and transport resources to QoS-enabled applications. The UMTS bearer service consists of the Radio Access Bearer Service between Mobile Terminal and SGSN and Core Network bearer service between SGSN and GGSN. The Radio Access Bearer Service is further realized by the Radio Bearer Service (mostly air interface) and Iu bearer service. For the 3G air interface, one can provide differentiated QoS via intelligent burst allocation scheme, adaptive spreading factor control and weighted fair queueing scheduling algorithms. Next, we discuss the requirements for the transport technologies in the radio access network to provide differentiated QoS to multiple classes of traffic. We discuss both ATM based and IP based transport solutions. Last but not least, we discuss how QoS mechanism is provided in the core network to ensure e2e quality of service requirements. We discuss how mobile terminals that use RSVP as QoS signaling mechanisms can be are supported in the 3G network which may implement only IETF diffserv mechanism. . We discuss how one can map UMTS QoS classes with IETF diffserv code points. We also discuss 2G/3G handover scenarios and how the 2G/3G QoS parameters can be mapped.

  2. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  3. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  4. Universal Design as a Booster for Housing Quality and Architectural Practice.

    PubMed

    Denizou, Karine

    2016-01-01

    Norwegian central government has for the last decade increasingly focused on universal design. Fundamental changes in the Norwegian building code and corresponding regulations in 2010 give an apparently clear framework for the implementation of accessibility and universal design. However, it seems that neither increased awareness of accessibility requirements and universal design, nor compliance with the building code guarantees improvement of housing quality and usability. The Norwegian regulations have gone further in the direction of performance requirements than most other countries. This applies to all types of requirements, including requirements for usability, functionality and accessibility. Hardly any specifications are to be found in the regulations. Ideally, this lack of specifications should give designers the opportunity to develop innovative answers and hence to respond to different contexts and needs. Still, many architects and builders ask for clear specifications, in order to simplify and speed up design processes and make control of solutions easier. Many architects understand guidelines as minimum requirements, and are thus reproducing the identical solutions without considering the context and the needs of the users. They see accessibility as another regulatory pressure and requirements as restrictions rather than positive incentives. However, there are examples of designers who have internalised the regulatory framework and thus are able to create and integrate inclusive design in their daily work. Based on recent research conducted by SINTEF Building and Infrastructure and financed by the Norwegian State Housing Bank, this paper presents examples of practice where dwellings have been developed within a framework of universal design. Focus of the research has been on the approach of the design team and their understanding and use of the regulatory framework in order to create better homes in dialogue with the building authorities. Main objectives are to: - Contribute to better understanding of universal design as a tool and a method to improve housing quality and usability - Investigate the conditions for developing dwellings with innovative and functional solutions in compliance with the building code - Discuss challenges in interpreting the requirements and in taking the needs of various resident groups into account.

  5. 49 CFR 655.73 - Access to facilities and records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Access to facilities and records. 655.73 Section... OPERATIONS Administrative Requirements § 655.73 Access to facilities and records. (a) Except as required by... payment for the production of those records. (c) An employer shall permit access to all facilities...

  6. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  7. 5 CFR 2606.203 - Granting access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for allowing... documentation will be required for the disclosure to the data subject of information required to be made...

  8. 32 CFR 2102.13 - Requirements for access to a record.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Requirements for access to a record. 2102.13 Section 2102.13 National Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT OF 1974 § 2102.13 Requirements for access to a record...

  9. 32 CFR 2102.13 - Requirements for access to a record.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requirements for access to a record. 2102.13 Section 2102.13 National Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT OF 1974 § 2102.13 Requirements for access to a record...

  10. 32 CFR 2102.13 - Requirements for access to a record.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requirements for access to a record. 2102.13 Section 2102.13 National Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT OF 1974 § 2102.13 Requirements for access to a record...

  11. 32 CFR 2102.13 - Requirements for access to a record.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Requirements for access to a record. 2102.13 Section 2102.13 National Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT OF 1974 § 2102.13 Requirements for access to a record...

  12. 24 CFR 8.20 - General requirement concerning program accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false General requirement concerning program accessibility. 8.20 Section 8.20 Housing and Urban Development Office of the Secretary, Department... requirement concerning program accessibility. Except as otherwise provided in §§ 8.21(c)(1), 8.24(a), 8.25...

  13. 32 CFR 2102.13 - Requirements for access to a record.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Requirements for access to a record. 2102.13 Section 2102.13 National Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT OF 1974 § 2102.13 Requirements for access to a record...

  14. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  15. Paediatric and maternal schistosomiasis: shifting the paradigms.

    PubMed

    Bustinduy, Amaya L; Stothard, J Russell; Friedman, Jennifer F

    2017-09-01

    In endemic areas, schistosomiasis causes both overt and subclinical disease in young children and their mothers, as well as in returned travellers. Key recently published literature. An action plan for paediatric schistosomiasis and female genital schistosomiasis (FGS) is needed with expanded access to praziquantel (PZQ) treatment required. Schistosomiasis-related morbidity is underappreciated. Present and future demand for PZQ treatment is bottlenecked, imbalanced and inequitable. Current dosing, treatment algorithms and access plans are suboptimal with treatment stalled during pregnancy. Raised dosing of PZQ (>40 mg/kg) is being explored in young children. Surveillance of female genital schistosomiasis FGS is increasing. Use of PZQ in pregnancy is safe and preventive chemotherapy guidelines are being revised in morbidity- and transmission-control settings. Shifting focus of population-level control to individual-case management. Detection and prevention of FGS within general health services and integration of PZQ treatment for women and children in antenatal clinics. Feasibility studies assessing alternative and expanded access to PZQ treatment to at-risk children and mothers and pregnant women. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  16. Application-Controlled Demand Paging for Out-of-Core Visualization

    NASA Technical Reports Server (NTRS)

    Cox, Michael; Ellsworth, David; Kutler, Paul (Technical Monitor)

    1997-01-01

    In the area of scientific visualization, input data sets are often very large. In visualization of Computational Fluid Dynamics (CFD) in particular, input data sets today can surpass 100 Gbytes, and are expected to scale with the ability of supercomputers to generate them. Some visualization tools already partition large data sets into segments, and load appropriate segments as they are needed. However, this does not remove the problem for two reasons: 1) there are data sets for which even the individual segments are too large for the largest graphics workstations, 2) many practitioners do not have access to workstations with the memory capacity required to load even a segment, especially since the state-of-the-art visualization tools tend to be developed by researchers with much more powerful machines. When the size of the data that must be accessed is larger than the size of memory, some form of virtual memory is simply required. This may be by segmentation, paging, or by paged segments. In this paper we demonstrate that complete reliance on operating system virtual memory for out-of-core visualization leads to poor performance. We then describe a paged segment system that we have implemented, and explore the principles of memory management that can be employed by the application for out-of-core visualization. We show that application control over some of these can significantly improve performance. We show that sparse traversal can be exploited by loading only those data actually required. We show also that application control over data loading can be exploited by 1) loading data from alternative storage format (in particular 3-dimensional data stored in sub-cubes), 2) controlling the page size. Both of these techniques effectively reduce the total memory required by visualization at run-time. We also describe experiments we have done on remote out-of-core visualization (when pages are read by demand from remote disk) whose results are promising.

  17. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  18. Ethernet access network based on free-space optic deployment technology

    NASA Astrophysics Data System (ADS)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  19. Towards agreement on best practice for publishing raw clinical trial data.

    PubMed

    Hrynaszkiewicz, Iain; Altman, Douglas G

    2009-03-18

    Many research-funding agencies now require open access to the results of research they have funded, and some also require that researchers make available the raw data generated from that research. Similarly, the journal Trials aims to address inadequate reporting in randomised controlled trials, and in order to fulfil this objective, the journal is working with the scientific and publishing communities to try to establish best practice for publishing raw data from clinical trials in peer-reviewed biomedical journals. Common issues encountered when considering raw data for publication include patient privacy - unless explicit consent for publication is obtained - and ownership, but agreed-upon policies for tackling these concerns do not appear to be addressed in the guidance or mandates currently established. Potential next steps for journal editors and publishers, ethics committees, research-funding agencies, and researchers are proposed, and alternatives to journal publication, such as restricted access repositories, are outlined.

  20. Restricted Authentication and Encryption for Cyber-physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kirkpatrick, Michael S; Bertino, Elisa; Sheldon, Frederick T

    2009-01-01

    Cyber-physical systems (CPS) are characterized by the close linkage of computational resources and physical devices. These systems can be deployed in a number of critical infrastructure settings. As a result, the security requirements of CPS are different than traditional computing architectures. For example, critical functions must be identified and isolated from interference by other functions. Similarly, lightweight schemes may be required, as CPS can include devices with limited computing power. One approach that offers promise for CPS security is the use of lightweight, hardware-based authentication. Specifically, we consider the use of Physically Unclonable Functions (PUFs) to bind an access requestmore » to specific hardware with device-specific keys. PUFs are implemented in hardware, such as SRAM, and can be used to uniquely identify the device. This technology could be used in CPS to ensure location-based access control and encryption, both of which would be desirable for CPS implementations.« less

  1. [Accession to the PIC/S and pharmaceutical quality system in Japan].

    PubMed

    Katori, Noriko

    2014-01-01

    In March, 2012, Japan made the application for membership of the Pharmaceutical Inspection convention and Pharmaceutical Inspection Co-operation scheme (PIC/S) which is an international body of a GMP inspection. The globalization of pharmaceutical manufacturing and sales has been a driving force behind the decision to become a PIC/S member. For the application for membership, Japan's GMP inspectorate needs to fulfill PIC/S requirements, for example, the inspection organization has to have a quality system as a global standard. One of the other requirements is that the GMP inspectorate can access Official Medicines Control Laboratories (OMCL) having high analytical skills and also have a quality system based on ISO 17025. I would like to describe the process to make up a quality system in the National Institute of Health Sciences and also the circumstances around the PIC/S application in Japan.

  2. Data Storage and sharing for the long tail of science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, B.; Pouchard, L.; Smith, P. M.

    Research data infrastructure such as storage must now accommodate new requirements resulting from trends in research data management that require researchers to store their data for the long term and make it available to other researchers. We propose Data Depot, a system and service that provides capabilities for shared space within a group, shared applications, flexible access patterns and ease of transfer at Purdue University. We evaluate Depot as a solution for storing and sharing multiterabytes of data produced in the long tail of science with a use case in soundscape ecology studies from the Human- Environment Modeling and Analysismore » Laboratory. We observe that with the capabilities enabled by Data Depot, researchers can easily deploy fine-grained data access control, manage data transfer and sharing, as well as integrate their workflows into a High Performance Computing environment.« less

  3. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    PubMed Central

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  4. Providing end-to-end QoS for multimedia applications in 3G wireless networks

    NASA Astrophysics Data System (ADS)

    Guo, Katherine; Rangarajan, Samapth; Siddiqui, M. A.; Paul, Sanjoy

    2003-11-01

    As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio Access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.

  5. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC. These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.

  6. Regional consolidation of orthopedic surgery: impacts on hip fracture surgery access and outcomes.

    PubMed

    Kreindler, Sara A; Siragusa, Lanette; Bohm, Eric; Rudnick, Wendy; Metge, Colleen J

    2017-09-01

    Timely access to orthopedic trauma surgery is essential for optimal outcomes. Regionalization of some types of surgery has shown positive effects on access, timeliness and outcomes. We investigated how the consolidation of orthopedic surgery in 1 Canadian health region affected patients requiring hip fracture surgery. We retrieved administrative data on all regional emergency department visits for lower-extremity injury and all linked inpatient stays from January 2010 through March 2013, identifying 1885 hip-fracture surgeries. Statistical process control and interrupted time series analysis controlling for demographics and comorbidities were used to assess impacts on access (receipt of surgery within 48-h benchmark) and surgical outcomes (complications, in-hospital/30-d mortality, length of stay). There was a significant increase in the proportion of patients receiving surgery within the benchmark. Complication rates did not change, but there appeared to be some decrease in mortality (significant at 6 mo). Length of stay increased at a hospital that experienced a major increase in patient volume, perhaps reflecting challenges associated with patient flow. Regionalization appeared to improve the timeliness of surgery and may have reduced mortality. The specific features of the present consolidation (including pre-existing interhospital performance variation and the introduction of daytime slates at the referral hospital) should be considered when interpreting the findings.

  7. Regional consolidation of orthopedic surgery: impacts on hip fracture surgery access and outcomes

    PubMed Central

    Kreindler, Sara A.; Siragusa, Lanette; Bohm, Eric; Rudnick, Wendy; Metge, Colleen J.

    2017-01-01

    Background Timely access to orthopedic trauma surgery is essential for optimal outcomes. Regionalization of some types of surgery has shown positive effects on access, timeliness and outcomes. We investigated how the consolidation of orthopedic surgery in 1 Canadian health region affected patients requiring hip fracture surgery. Methods We retrieved administrative data on all regional emergency department visits for lower-extremity injury and all linked inpatient stays from January 2010 through March 2013, identifying 1885 hip-fracture surgeries. Statistical process control and interrupted time series analysis controlling for demographics and comorbidities were used to assess impacts on access (receipt of surgery within 48-h benchmark) and surgical outcomes (complications, in-hospital/30-d mortality, length of stay). Results There was a significant increase in the proportion of patients receiving surgery within the benchmark. Complication rates did not change, but there appeared to be some decrease in mortality (significant at 6 mo). Length of stay increased at a hospital that experienced a major increase in patient volume, perhaps reflecting challenges associated with patient flow. Conclusion Regionalization appeared to improve the timeliness of surgery and may have reduced mortality. The specific features of the present consolidation (including pre-existing interhospital performance variation and the introduction of daytime slates at the referral hospital) should be considered when interpreting the findings. PMID:28930037

  8. Seed development and viviparous germination in one accession of a tomato rin mutant

    PubMed Central

    Wang, Xu; Zhang, Lili; Xu, Xiaochun; Qu, Wei; Li, Jingfu; Xu, Xiangyang; Wang, Aoxue

    2016-01-01

    In an experimental field, seed vivipary occurred in one accession of tomato rin mutant fruit at approximately 45–50 days after pollination (DAP). In this study, the possible contributory factors to this viviparous germination were investigated. Firstly, developing seeds were freshly excised from the fruit tissue every 5 days from 25–60 DAP. Germination occurred when isolated seeds were incubated on water, but was inhibited when they remained ex situ in fruit mucilage gel. The effect of abscisic acid (ABA) and osmoticum, separate and together, on germination of developing seeds was investigated. Additionally, ABA content in the seed and mucilage gel, as well as fruit osmolality were measured. The results showed that ABA concentrations in seeds were low during early development and increased later, peaking at about 50 DAP. ABA concentrations in rin accession were similar to those of the control cultivar and thus are not directly associated with the occurrence of vivipary. Developing seeds of rin accession are more sensitive than control seeds to all inhibitory compounds. However, osmolality in rin fruit at later developmental stages becomes less negative that is required to permit germination of developing seeds. Hence, hypo-osmolality in rin fruit may be an important factor in permitting limited viviparous germination. PMID:27436947

  9. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model.

  10. Reviewing the literature on access to prompt and effective malaria treatment in Kenya: implications for meeting the Abuja targets

    PubMed Central

    Chuma, Jane; Abuya, Timothy; Memusi, Dorothy; Juma, Elizabeth; Akhwale, Willis; Ntwiga, Janet; Nyandigisi, Andrew; Tetteh, Gladys; Shretta, Rima; Amin, Abdinasir

    2009-01-01

    Background Effective case management is central to reducing malaria mortality and morbidity worldwide, but only a minority of those affected by malaria, have access to prompt effective treatment. In Kenya, the Division of Malaria Control is committed to ensuring that 80 percent of childhood fevers are treated with effective anti-malarial medicines within 24 hours of fever onset, but this target is largely unmet. This review aimed to document evidence on access to effective malaria treatment in Kenya, identify factors that influence access, and make recommendations on how to improve prompt access to effective malaria treatment. Since treatment-seeking patterns for malaria are similar in many settings in sub-Saharan Africa, the findings presented in this review have important lessons for other malaria endemic countries. Methods Internet searches were conducted in PUBMED (MEDLINE) and HINARI databases using specific search terms and strategies. Grey literature was obtained by soliciting reports from individual researchers working in the treatment-seeking field, from websites of major organizations involved in malaria control and from international reports. Results The review indicated that malaria treatment-seeking occurs mostly in the informal sector; that most fevers are treated, but treatment is often ineffective. Irrational drug use was identified as a problem in most studies, but determinants of this behaviour were not documented. Availability of non-recommended medicines over-the-counter and the presence of substandard anti-malarials in the market are well documented. Demand side determinants of access include perception of illness causes, severity and timing of treatment, perceptions of treatment efficacy, simplicity of regimens and ability to pay. Supply side determinants include distance to health facilities, availability of medicines, prescribing and dispensing practices and quality of medicines. Policy level factors are around the complexity and unclear messages regarding drug policy changes. Conclusion Kenya, like many other African countries, is still far from achieving the Abuja targets. The government, with support from donors, should invest adequately in mechanisms that promote access to effective treatment. Such approaches should focus on factors influencing multiple dimensions of access and will require the cooperation of all stakeholders working in malaria control. PMID:19863788

  11. Synthesis from Design Requirements of a Hybrid System for Transport Aircraft Longitudinal Control. Volume 1

    NASA Technical Reports Server (NTRS)

    Hynes, Charles S.; Hardy, Gordon H.; Sherry, Lance

    2007-01-01

    Volume I of this report presents a new method for synthesizing hybrid systems directly from design requirements, and applies the method to design of a hybrid system for longitudinal control of transport aircraft. The resulting system satisfies general requirement for safety and effectiveness specified a priori, enabling formal validation to be achieved. Volume II contains seven appendices intended to make the report accessible to readers with backgrounds in human factors, fli ght dynamics and control. and formal logic. Major design goals are (1) system desi g n integrity based on proof of correctness at the design level, (2), significant simplification and cost reduction in system development and certification, and (3) improved operational efficiency, with significant alleviation of human-factors problems encountered by pilots in current transport aircraft. This report provides for the first time a firm technical basis for criteria governing design and certification of avionic systems for transport aircraft. It should be of primary interest to designers of next-generation avionic systems.

  12. Synthesis from Design Requirements of a Hybrid System for Transport Aircraft Longitudinal Control. Volume 2

    NASA Technical Reports Server (NTRS)

    Hynes, Charles S.; Hardy, Gordon H.; Sherry, Lance

    2007-01-01

    Volume I of this report presents a new method for synthesizing hybrid systems directly from desi gn requirements, and applies the method to design of a hybrid system for longitudinal control of transport aircraft. The resulting system satisfies general requirement for safety and effectiveness specified a priori, enabling formal validation to be achieved. Volume II contains seven appendices intended to make the report accessible to readers with backgrounds in human factors, flight dynamics and control, and formal logic. Major design goals are (1) system design integrity based on proof of correctness at the design level, (2) significant simplification and cost reduction in system development and certification, and (3) improved operational efficiency, with significant alleviation of human-factors problems encountered by pilots in current transport aircraft. This report provides for the first time a firm technical basis for criteria governing design and certification of avionic systems for transport aircraft. It should be of primary interest to designers of next-generation avionic systems.

  13. Computer numeric control generation of toric surfaces

    NASA Astrophysics Data System (ADS)

    Bradley, Norman D.; Ball, Gary A.; Keller, John R.

    1994-05-01

    Until recently, the manufacture of toric ophthalmic lenses relied largely upon expensive, manual techniques for generation and polishing. Recent gains in computer numeric control (CNC) technology and tooling enable lens designers to employ single- point diamond, fly-cutting methods in the production of torics. Fly-cutting methods continue to improve, significantly expanding lens design possibilities while lowering production costs. Advantages of CNC fly cutting include precise control of surface geometry, rapid production with high throughput, and high-quality lens surface finishes requiring minimal polishing. As accessibility and affordability increase within the ophthalmic market, torics promise to dramatically expand lens design choices available to consumers.

  14. 76 FR 25401 - Petition Under Section 302 on Access to the German Bar Aptitude Examination; Decision Not To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE Petition Under Section 302 on Access to the... with requirements for access to the German bar aptitude examination. DATES: Effective Date: April 28..., and practices of the Government of Germany regarding requirements for access to the German bar...

  15. 78 FR 77074 - Accessibility of User Interfaces, and Video Programming Guides and Menus; Accessible Emergency...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-20

    ... Apparatus Requirements for Emergency Information and Video Description: Implementation of the Twenty- First... of apparatus covered by the CVAA to provide access to the secondary audio stream used for audible... availability of accessible equipment and, if so, what those notification requirements should be. The Commission...

  16. Feasibility of Smartphone Based Photogrammetric Point Clouds for the Generation of Accessibility Maps

    NASA Astrophysics Data System (ADS)

    Angelats, E.; Parés, M. E.; Kumar, P.

    2018-05-01

    Accessible cities with accessible services are an old claim of people with reduced mobility. But this demand is still far away of becoming a reality as lot of work is required to be done yet. First step towards accessible cities is to know about real situation of the cities and its pavement infrastructure. Detailed maps or databases on street slopes, access to sidewalks, mobility in public parks and gardens, etc. are required. In this paper, we propose to use smartphone based photogrammetric point clouds, as a starting point to create accessible maps or databases. This paper analyses the performance of these point clouds and the complexity of the image acquisition procedure required to obtain them. The paper proves, through two test cases, that smartphone technology is an economical and feasible solution to get the required information, which is quite often seek by city planners to generate accessible maps. The proposed approach paves the way to generate, in a near term, accessibility maps through the use of point clouds derived from crowdsourced smartphone imagery.

  17. Structure and management of tuberculosis control programs in fragile states--Afghanistan, DR Congo, Haiti, Somalia.

    PubMed

    Mauch, Verena; Weil, Diana; Munim, Aayid; Boillot, Francois; Coninx, Rudi; Huseynova, Sevil; Powell, Clydette; Seita, Akihiro; Wembanyama, Henriette; van den Hof, Susan

    2010-07-01

    Health care delivery is particularly problematic in fragile states often connected with increased incidence of communicable diseases, among them tuberculosis. This article draws upon experiences in tuberculosis control in four fragile states from which four lessons learned were derived. A structured inventory to extract common themes specific for TB control in fragile states was conducted among twelve providers of technical assistance who have worked in fragile states. The themes were applied to the TB control programs of Afghanistan, DR Congo, Haiti and Somalia during the years 2000-2006. Case notifications and treatment outcomes have increased in all four countries since 2003 (treatment success rates 81-90%). Access to care and case detection however have remained insufficient (case detection rates 39-62%); There are four lessons learned: 1. TB control programs can function in fragile states. 2. National program leadership and stewardship are essential for quality and sustained TB control. 3. Partnerships with non-governmental providers are vital for continuous service delivery; 4. TB control programs in fragile states require consistent donor support. Despite challenges in management, coordination, security, logistics and funding, TB control programs can function in fragile states, but face considerable problems in access to diagnosis and treatment and therefore case detection. Copyright (c) 2010 Elsevier Ireland Ltd. All rights reserved.

  18. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  19. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  20. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  1. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  2. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  3. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  4. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  5. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  6. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE... BASIS OF DISABILITY IN AIR TRAVEL Accessibility of Airport Facilities § 382.51 What requirements must...

  7. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE... BASIS OF DISABILITY IN AIR TRAVEL Accessibility of Airport Facilities § 382.51 What requirements must...

  8. Power System Implementation and Demonstration at Camp Katuu, Palau

    DTIC Science & Technology

    2011-05-11

    Horizontal Rows 3 Vertical Rows 3 Vertical Rows with Center Walkway 6 Vertical Rows 1 Amount of rail mounting (lf) 1440’ 1800’ 1800’ 1440’ 2 Ease of rail...installation some rail cutting required to clear walkway requires two level rail mounting system requires two level rail mounting system no rail...Maintenance access 21" horizontal & vertical walkway , does not have direct access to all panels Accessible with 15" walkways Direct access to each panel and

  9. Using a screening tool to evaluate potential use of e-health services for older people with and without cognitive impairment.

    PubMed

    Malinowsky, Camilla; Nygård, Louise; Kottorp, Anders

    2014-01-01

    E-health services are increasingly offered to provide clients with information and a link to healthcare services. The aim of this study is to investigate the perceived access to and the potential to use technologies important for e-health services among older adults with mild cognitive impairment (MCI) or mild Alzheimer's disease (AD) and controls. The perceived access to and perception of difficulty in the use of everyday technology (such as cell phones, coffee machines, computers) was investigated in a sample of older adults (n = 118) comprising three subsamples: adults with MCI (n = 37), with mild AD (n = 37), and controls (n = 44) using the Everyday Technology Use Questionnaire (ETUQ). The use of seven technologies important for e-health services was specifically examined for each subsample and compared between the subsamples. The findings demonstrated that the older adults in all subsamples perceive access to e-health technologies and potentially would use them competently in several e-health services. However, among persons with AD a lower proportion of perceived access to the technology was described, as well as for persons with MCI. To make the benefits of e-health services available and used by all clients, it is important to consider access to the technology required in e-health services and also to support the clients' capabilities to understand and use the technologies. Also, the potential use of the ETUQ to explore the perceived access to and competence in using e-health technologies is a vital issue in the use of e-health services.

  10. The Global Opioid Policy Initiative: a wealth of information, but what is next?

    PubMed

    Scholten, Willem

    2014-03-01

    Recently, the outcomes were published of the Global Opioid Policy Initiative, evaluating the availability, cost of opioid medicines and the regulatory barriers that are possibly impeding access for the management of cancer pain in developing countries. Other studies have shown that the vast majority of the world population has no access to opioid analgesics. This study shows by country which opioid medicines are available, what they cost to the patient, and investigates the presence of barriers for access to these medicines. Data from the project will be an important resource for those who advocate for improved access to opioid analgesics. Yet, like so often, many more aspects of inadequate opioid analgesic consumption require exploration and reporting, including legislative barriers. The last publication on the project is a "What's next?" that is over focusing on palliative care, forgetting that outside palliative care is also a huge need for opioid analgesics in moderate and severe pain. While promoting access to palliative care and pain management, their recognition as a human right by UN bodies would be of great help. Moreover, WHO's Access to Controlled Medicines Programme, could be an important programme to support the countries in making these improvements.

  11. Design of a memory-access controller with 3.71-times-enhanced energy efficiency for Internet-of-Things-oriented nonvolatile microcontroller unit

    NASA Astrophysics Data System (ADS)

    Natsui, Masanori; Hanyu, Takahiro

    2018-04-01

    In realizing a nonvolatile microcontroller unit (MCU) for sensor nodes in Internet-of-Things (IoT) applications, it is important to solve the data-transfer bottleneck between the central processing unit (CPU) and the nonvolatile memory constituting the MCU. As one circuit-oriented approach to solving this problem, we propose a memory access minimization technique for magnetoresistive-random-access-memory (MRAM)-embedded nonvolatile MCUs. In addition to multiplexing and prefetching of memory access, the proposed technique realizes efficient instruction fetch by eliminating redundant memory access while considering the code length of the instruction to be fetched and the transition of the memory address to be accessed. As a result, the performance of the MCU can be improved while relaxing the performance requirement for the embedded MRAM, and compact and low-power implementation can be performed as compared with the conventional cache-based one. Through the evaluation using a system consisting of a general purpose 32-bit CPU and embedded MRAM, it is demonstrated that the proposed technique increases the peak efficiency of the system up to 3.71 times, while a 2.29-fold area reduction is achieved compared with the cache-based one.

  12. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    NASA Astrophysics Data System (ADS)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  13. Basrah Children’s Hospital, Basrah, Iraq

    DTIC Science & Technology

    2009-07-28

    that 97% of urban and 79% of rural populations had access to health care, which included public health programs for malaria and tuberculosis control...construct the medical logistics warehouses landscaping install kitchen and laundry equipment medical equipment (medical waste autoclave, oxygen...addition, the SOW required the construction of supporting facilities to include the following: cafeteria and associated facilities (i.e. kitchen

  14. Mobile radio alternative systems study traffic model

    NASA Astrophysics Data System (ADS)

    Tucker, W. T.; Anderson, R. E.

    1983-06-01

    The markets for mobile radio services in non-urban areas of the United States are examined for the years 1985-2000. Three market categories are identified. New Services are defined as those for which there are different expressed ideas but which are not now met by any application of available technology. The complete fulfillment of the needs requires nationwide radio access to vehicles without knowledge of vehicle location, wideband data transmission from remote sites, one- and two way exchange of short data and control messages between vehicles and dispatch or control centers, and automatic vehicle location (surveillance). The commercial and public services market of interest to the study is drawn from existing users of mobile radio in non-urban areas who are dissatisfied with the geographical range or coverage of their systems. The mobile radio telephone market comprises potential users who require access to the public switched telephone network in areas that are not likely to be served by the traditional growth patterns of terrestrial mobile telephone services. Conservative, likely, and optimistic estimates of the markets are presented in terms of numbers of vehicles that will be served and the radio traffic they will generate.

  15. Mobile radio alternative systems study. Volume 1: Traffic model

    NASA Technical Reports Server (NTRS)

    Tucker, W. T.; Anderson, R. E.

    1983-01-01

    The markets for mobile radio services in non-urban areas of the United States are examined for the years 1985-2000. Three market categories are identified. New Services are defined as those for which there are different expressed ideas but which are not now met by any application of available technology. The complete fulfillment of the needs requires nationwide radio access to vehicles without knowledge of vehicle location, wideband data transmission from remote sites, one- and two way exchange of short data and control messages between vehicles and dispatch or control centers, and automatic vehicle location (surveillance). The commercial and public services market of interest to the study is drawn from existing users of mobile radio in non-urban areas who are dissatisfied with the geographical range or coverage of their systems. The mobile radio telephone market comprises potential users who require access to the public switched telephone network in areas that are not likely to be served by the traditional growth patterns of terrestrial mobile telephone services. Conservative, likely, and optimistic estimates of the markets are presented in terms of numbers of vehicles that will be served and the radio traffic they will generate.

  16. A systematic literature review on security and privacy of electronic health record systems: technical perspectives.

    PubMed

    Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy

    Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.

  17. Information and communication technology needs for distributed communication and coordination during expedition-class spaceflight.

    PubMed

    Caldwell, B S

    2000-09-01

    AO-lU. Expedition-class missions are distinct from historical human presence in space in ways that significantly affect information flow and information technology designs for such missions. The centrality of Mission Control in these missions is challenged by the distances, associated communication delays, and durations of expeditions, all of which require crews to have more local resources available to manage on-board situations. The author's current research investigates how ground controllers effectively allocate communications bandwidth, cognitive resources, and knowledge sharing skills during time critical routine and non-routine situations. The research focus is on team-based information and communication technology (ICT) use to provide recommendations for improvements to support adaptive bandwidth allocations and improved sharing of data and knowledge in Mission Control contexts. In order to further improve communication and coordination between controllers and crew, additional ICT support resources will be needed to provide shared context knowledge and dynamic assessment of costs and benefits for accessing local information vs. remote expertise. Crew members will have critical needs to understand the goals, intentions, and situational constraints associated with mission information resources in order to use them most effectively in conditions where ground-based expertise is insufficient or requires more time to access and coordinate than local task demands permit. Results of this research will serve to improve the design and implementation of ICT systems to improve human performance capabilities and system operating tolerances for exploration missions. (Specific research data were not available at the time of publication.)

  18. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  19. Privacy aware access controls for medical data disclosure on European healthgrids.

    PubMed

    Rahmouni, Hanene Boussi; Solomonides, Tony; Mont, Marco Casassa; Shiu, Simon

    2010-01-01

    To be processed within a healthgrid environment, medical data goes through a complete lifecycle and several stages until it is finally used for the primary reason it has been collected for. This stage is not always the final occurrence of when the data would have been manipulated. The data could rather continue to be needed for secondary purposes of legitimate or non legitimate nature. Although other privacy issues are related to the processing of patient data while it is residing on a healthgrid environment, the control of data disclosure is our primary interest. When sharing medical data between different Healthcare and biomedical research organizations in Europe, it is important that the different parties involved in the sharing handle the data in the same way indicated by the legislation of the member state where the data was originally collected as the requirements might differ from one state to another. Privacy requirements, such as patient consent, may be subject to conflicting conditions between different national frameworks as well as between different legal and ethical frameworks within a single member state. These circumstances have made the compliance management process in European healthgrid very challenging. In this paper we are presenting an approach to tackle these issues by relying on several technologies contained in the semantic web stack. Our work suggests a direct mapping from high level legislation on privacy and data protection to operational level privacy aware controls. Additionally we suggest an architecture for the enforcement of these controls on access control models adopted by healthgrids security infrastructures.

  20. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  1. (Video Assisted) thoracoscopic surgery: Getting started

    PubMed Central

    Molnar, Tamas F

    2007-01-01

    Thoracoscopic surgery without or with video assistance (VATS) is simpler and easier to learn as it seems to be. Potential benefits of the procedure in rural surgical environment are outlined while basic requirements and limitations are listed. Thoracoscopy kit, thoracotomy tray at hand, patient monitoring, proper drainage system, pain control and access to chest physiotherapy are the basic requirements. Having headlight, bronchoscope, Ligasure and mechanical staplers offer clear advantages but they are not indispensable. Exploration and evacuation of pleural space, pleurodesis, surgery for Stage I and II thoracic empyema are evidenced fields of VATS procedures. Some of the cases can be performed under controlled local anesthesia. Acute chest trauma cannot be recommended for VATS treatment. Lung cancer is out of the scope of rural surgery. PMID:19789679

  2. Effective Sharing of Health Records, Maintaining Privacy: A Practical Schema

    PubMed Central

    Neame, Roderick

    2013-01-01

    A principal goal of computerisation of medical records is to join up care services for patients, so that their records can follow them wherever they go and thereby reduce delays, duplications, risks and errors, and costs. Healthcare records are increasingly being stored electronically, which has created the necessary conditions for them to be readily sharable. However simply driving the implementation of electronic medical records is not sufficient, as recent developments have demonstrated (1): there remain significant obstacles. The three main obstacles relate to (a) record accessibility (knowing where event records are and being able to access them), (b) maintaining privacy (ensuring that only those authorised by the patient can access and extract meaning from the records) and (c) assuring the functionality of the shared information (ensuring that the records can be shared non-proprietorially across platforms without loss of meaning, and that their authenticity and trustworthiness are demonstrable). These constitute a set of issues that need new thinking, since existing systems are struggling to deliver them. The solution to this puzzle lies in three main parts. Clearly there is only one environment suited to such widespread sharing, which is the World Wide Web, so this is the communications basis. Part one requires that a sharable synoptic record is created for each care event and stored in standard web-format and in readily accessible locations, on ‘the web’ or in ‘the cloud’. To maintain privacy these publicly-accessible records must be suitably protected either stripped of identifiers (names, addresses, dates, places etc.) and/or encrypted: either way the record must be tagged with a tag that means nothing to anyone, but serves to identify and authenticate a specific record when retrieved. For ease of retrieval patients must hold an index of care events, records and web locations (plus any associated information for each such as encryption keys, context etc.). For added security, as well as for trustworthiness, a method of verifying authenticity, integrity and authorship is required, which can be provided using a public key infrastructure (PKI) for cryptography (2). The second part of the solution is to give control over record access and sharing to the patient (or their identified representative), enabling them to authorise access by providing the index and access keys to their records. This can be done using a token (fe.g. smart card) or a secure online index which holds these details: this serves to relieve the formal record keeper of responsibility for external access control and privacy (internal access control and privacy can remain an institutional responsibility). The third part of the solution is to process the content of the stored records such that there is a ‘plain English’ copy, as well as an electronic copy which is coded and marked up using XML tags for each data element to signify ‘type’ (e.g. administrative, financial, operational, clinical etc.) and sub-types (e.g. diagnosis, medication, procedure, investigation result etc.). This ensures that the recipient can always read the data using a basic browser, but can readily manipulate and re-arrange the data for display and storage if they have a more sophisticated installation. PMID:23923101

  3. Effective sharing of health records, maintaining privacy: a practical schema.

    PubMed

    Neame, Roderick

    2013-01-01

    A principal goal of computerisation of medical records is to join up care services for patients, so that their records can follow them wherever they go and thereby reduce delays, duplications, risks and errors, and costs. Healthcare records are increasingly being stored electronically, which has created the necessary conditions for them to be readily sharable. However simply driving the implementation of electronic medical records is not sufficient, as recent developments have demonstrated (1): there remain significant obstacles. The three main obstacles relate to (a) record accessibility (knowing where event records are and being able to access them), (b) maintaining privacy (ensuring that only those authorised by the patient can access and extract meaning from the records) and (c) assuring the functionality of the shared information (ensuring that the records can be shared non-proprietorially across platforms without loss of meaning, and that their authenticity and trustworthiness are demonstrable). These constitute a set of issues that need new thinking, since existing systems are struggling to deliver them. The solution to this puzzle lies in three main parts. Clearly there is only one environment suited to such widespread sharing, which is the World Wide Web, so this is the communications basis. Part one requires that a sharable synoptic record is created for each care event and stored in standard web-format and in readily accessible locations, on 'the web' or in 'the cloud'. To maintain privacy these publicly-accessible records must be suitably protected either stripped of identifiers (names, addresses, dates, places etc.) and/or encrypted: either way the record must be tagged with a tag that means nothing to anyone, but serves to identify and authenticate a specific record when retrieved. For ease of retrieval patients must hold an index of care events, records and web locations (plus any associated information for each such as encryption keys, context etc.). For added security, as well as for trustworthiness, a method of verifying authenticity, integrity and authorship is required, which can be provided using a public key infrastructure (PKI) for cryptography (2). The second part of the solution is to give control over record access and sharing to the patient (or their identified representative), enabling them to authorise access by providing the index and access keys to their records. This can be done using a token (fe.g. smart card) or a secure online index which holds these details: this serves to relieve the formal record keeper of responsibility for external access control and privacy (internal access control and privacy can remain an institutional responsibility). The third part of the solution is to process the content of the stored records such that there is a 'plain English' copy, as well as an electronic copy which is coded and marked up using XML tags for each data element to signify 'type' (e.g. administrative, financial, operational, clinical etc.) and sub-types (e.g. diagnosis, medication, procedure, investigation result etc.). This ensures that the recipient can always read the data using a basic browser, but can readily manipulate and re-arrange the data for display and storage if they have a more sophisticated installation.

  4. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  5. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  6. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  7. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  8. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  9. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  10. 36 CFR 1192.125 - Mobility aid accessibility.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Intercity Rail Cars and Systems § 1192.125 Mobility aid accessibility. (a)(1) General. All intercity rail cars, other than level entry cars, required to be accessible by § 1192.111 (a) and (e) of this subpart...(d) are provided, at stations or stops required to be accessible by 49 CFR part 37, the car is not...

  11. 36 CFR 1192.125 - Mobility aid accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Intercity Rail Cars and Systems § 1192.125 Mobility aid accessibility. (a)(1) General. All intercity rail cars, other than level entry cars, required to be accessible by § 1192.111 (a) and (e) of this subpart...(d) are provided, at stations or stops required to be accessible by 49 CFR part 37, the car is not...

  12. 36 CFR 1192.125 - Mobility aid accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Intercity Rail Cars and Systems § 1192.125 Mobility aid accessibility. (a)(1) General. All intercity rail cars, other than level entry cars, required to be accessible by § 1192.111 (a) and (e) of this subpart...(d) are provided, at stations or stops required to be accessible by 49 CFR part 37, the car is not...

  13. 36 CFR 1192.125 - Mobility aid accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Intercity Rail Cars and Systems § 1192.125 Mobility aid accessibility. (a)(1) General. All intercity rail cars, other than level entry cars, required to be accessible by § 1192.111 (a) and (e) of this subpart...(d) are provided, at stations or stops required to be accessible by 49 CFR part 37, the car is not...

  14. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... jeopardizing network security. The potential for excessive bandwidth demand alone shall not constitute grounds... 47 Telecommunication 2 2013-10-01 2013-10-01 false Network access requirements for Block C in the... § 27.16 Network access requirements for Block C in the 746-757 and 776-787 MHz bands. (a) Applicability...

  15. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... jeopardizing network security. The potential for excessive bandwidth demand alone shall not constitute grounds... 47 Telecommunication 2 2014-10-01 2014-10-01 false Network access requirements for Block C in the... § 27.16 Network access requirements for Block C in the 746-757 and 776-787 MHz bands. (a) Applicability...

  16. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... jeopardizing network security. The potential for excessive bandwidth demand alone shall not constitute grounds... 47 Telecommunication 2 2012-10-01 2012-10-01 false Network access requirements for Block C in the... § 27.16 Network access requirements for Block C in the 746-757 and 776-787 MHz bands. (a) Applicability...

  17. Evolution of area access safety training required for gaining access to Space Shuttle launch and landing facilities

    NASA Technical Reports Server (NTRS)

    Willams, M. C.

    1985-01-01

    Assuring personnel and equipment are fully protected during the Space Shuttle launch and landing operations has been a primary concern of NASA and its associated contractors since the inception of the program. A key factor in support of this policy has been the area access safety training requirements for badging of employees assigned to work on Space Shuttle Launch and Facilities. This requirement was targeted for possible cost savings and the transition of physical on-site walkdowns to the use of television tapes has realized program cost savings while continuing to fully satisfy the area access safety training requirements.

  18. Effectiveness of the new 'Mobile AED Map' to find and retrieve an AED: A randomised controlled trial.

    PubMed

    Sakai, Tomohiko; Iwami, Taku; Kitamura, Tetsuhisa; Nishiyama, Chika; Kawamura, Takashi; Kajino, Kentaro; Tanaka, Hiroshi; Marukawa, Seishiro; Tasaki, Osamu; Shiozaki, Tadahiko; Ogura, Hiroshi; Kuwagata, Yasuyuki; Shimazu, Takeshi

    2011-01-01

    Although early shock with an automated external defibrillator (AED) is one of the several key elements to save out-of-hospital cardiac arrest (OHCA) victims, it is not always easy to find and retrieve a nearby AED in emergency settings. We developed a cell phone web system, the Mobile AED Map, displaying nearby AEDs located anywhere. The simulation trial in the present study aims to compare the time and travel distance required to access an AED and retrieve it with and without the Mobile AED Map. Randomised controlled trial. Two fields where it was estimated to take 2min (120-170m) to access the nearest AED. Participants were randomly assigned to either the Mobile AED Map group or the control group. We provided each participant in both groups with an OHCA scenario, and measured the time and travel distance to find and retrieve a nearby AED. Forty-three volunteers were enrolled and completed the protocol. The time to access and retrieve an AED was not significantly different between the Mobile AED Map group (400±238s) and the control group (407±256s, p=0.92). The travel distance was significantly shorter in the Mobile AED Map group (606m vs. 891m, p=0.019). Trial field conditions affected the results differently. Although the new Mobile AED Map reduced the travel distance to access and retrieve the AED, it failed to shorten the time. Further technological improvements of the system are needed to increase its usefulness in emergency settings (UMIN000002043). Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  19. A novel PON-based mobile distributed cluster of antennas approach to provide impartial and broadband services to end users

    NASA Astrophysics Data System (ADS)

    Sana, Ajaz; Saddawi, Samir; Moghaddassi, Jalil; Hussain, Shahab; Zaidi, Syed R.

    2010-01-01

    In this research paper we propose a novel Passive Optical Network (PON) based Mobile Worldwide Interoperability for Microwave Access (WiMAX) access network architecture to provide high capacity and performance multimedia services to mobile WiMAX users. Passive Optical Networks (PON) networks do not require powered equipment; hence they cost lower and need less network management. WiMAX technology emerges as a viable candidate for the last mile solution. In the conventional WiMAX access networks, the base stations and Multiple Input Multiple Output (MIMO) antennas are connected by point to point lines. Ideally in theory, the Maximum WiMAX bandwidth is assumed to be 70 Mbit/s over 31 miles. In reality, WiMAX can only provide one or the other as when operating over maximum range, bit error rate increases and therefore it is required to use lower bit rate. Lowering the range allows a device to operate at higher bit rates. Our focus in this research paper is to increase both range and bit rate by utilizing distributed cluster of MIMO antennas connected to WiMAX base stations with PON based topologies. A novel quality of service (QoS) algorithm is also proposed to provide admission control and scheduling to serve classified traffic. The proposed architecture presents flexible and scalable system design with different performance requirements and complexity.

  20. Software Support during a Control Room Upgrade

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michele Joyce; Michael Spata; Thomas Oren

    2005-09-21

    In 2004, after 14 years of accelerator operations and commissioning, Jefferson Lab renovated its main control room. Changes in technology and lessons learned during those 14 years drove the control room redesign in a new direction, one that optimizes workflow and makes critical information and controls available to everyone in the control room. Fundamental changes in a variety of software applications were required to facilitate the new operating paradigm. A critical component of the new control room design is a large-format video wall that is used to make a variety of operating information available to everyone in the room. Analogmore » devices such as oscilloscopes and function generators are now displayed on the video wall through two crosspoint switchers: one for analog signals and another for video signals. A new software GUI replaces manual configuration of the oscilloscopes and function generators and helps automate setup. Monitoring screens, customized for the video wall, now make important operating information visible to everyone, not just a single operator. New alarm handler software gives any operator, on any workstation, access to all alarm handler functionality, and multiple users can now contribute to a single electronic logbook entry. To further support the shift to distributed access and control, many applications have been redesigned to run on servers instead of on individual workstations.« less

  1. Advanced visualization platform for surgical operating room coordination: distributed video board system.

    PubMed

    Hu, Peter F; Xiao, Yan; Ho, Danny; Mackenzie, Colin F; Hu, Hao; Voigt, Roger; Martz, Douglas

    2006-06-01

    One of the major challenges for day-of-surgery operating room coordination is accurate and timely situation awareness. Distributed and secure real-time status information is key to addressing these challenges. This article reports on the design and implementation of a passive status monitoring system in a 19-room surgical suite of a major academic medical center. Key design requirements considered included integrated real-time operating room status display, access control, security, and network impact. The system used live operating room video images and patient vital signs obtained through monitors to automatically update events and operating room status. Images were presented on a "need-to-know" basis, and access was controlled by identification badge authorization. The system delivered reliable real-time operating room images and status with acceptable network impact. Operating room status was visualized at 4 separate locations and was used continuously by clinicians and operating room service providers to coordinate operating room activities.

  2. Access Protocol For An Industrial Optical Fibre LAN

    NASA Astrophysics Data System (ADS)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  3. Model-Driven Configuration of SELinux Policies

    NASA Astrophysics Data System (ADS)

    Agreiter, Berthold; Breu, Ruth

    The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.

  4. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    PubMed Central

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  5. Developing an Ontology for Ocean Biogeochemistry Data

    NASA Astrophysics Data System (ADS)

    Chandler, C. L.; Allison, M. D.; Groman, R. C.; West, P.; Zednik, S.; Maffei, A. R.

    2010-12-01

    Semantic Web technologies offer great promise for enabling new and better scientific research. However, significant challenges must be met before the promise of the Semantic Web can be realized for a discipline as diverse as oceanography. Evolving expectations for open access to research data combined with the complexity of global ecosystem science research themes present a significant challenge, and one that is best met through an informatics approach. The Biological and Chemical Oceanography Data Management Office (BCO-DMO) is funded by the National Science Foundation Division of Ocean Sciences to work with ocean biogeochemistry researchers to improve access to data resulting from their respective programs. In an effort to improve data access, BCO-DMO staff members are collaborating with researchers from the Tetherless World Constellation (Rensselaer Polytechnic Institute) to develop an ontology that formally describes the concepts and relationships in the data managed by the BCO-DMO. The project required transforming a legacy system of human-readable, flat files of metadata to well-ordered controlled vocabularies to a fully developed ontology. To improve semantic interoperability, terms from the BCO-DMO controlled vocabularies are being mapped to controlled vocabulary terms adopted by other oceanographic data management organizations. While the entire process has proven to be difficult, time-consuming and labor-intensive, the work has been rewarding and is a necessary prerequisite for the eventual incorporation of Semantic Web tools. From the beginning of the project, development of the ontology has been guided by a use case based approach. The use cases were derived from data access related requests received from members of the research community served by the BCO-DMO. The resultant ontology satisfies the requirements of the use cases and reflects the information stored in the metadata database. The BCO-DMO metadata database currently contains information that powers several different user and machine-to-machine interfaces to the BCO-DMO data repositories. One goal of the ontology development project is to enable subsequent development of semantically-enabled components (e.g. faceted search) to enhance the power of those interfaces. Addition of semantic capabilities to the existing data interfaces will improve data access through enhanced data discovery. In addition to sharing the ontology, we will describe the challenges encountered thus far in the project, the technologies currently being used, and the strategies associated with the use case based informatics approach.

  6. Using ESB and BPEL for Evolving Healthcare Systems Towards Pervasive, Grid-Enabled SOA

    NASA Astrophysics Data System (ADS)

    Koufi, V.; Malamateniou, F.; Papakonstantinou, D.; Vassilacopoulos, G.

    Healthcare organizations often face the challenge of integrating diverse and geographically disparate information technology systems to respond to changing requirements and to exploit the capabilities of modern technologies. Hence, systems evolution, through modification and extension of the existing information technology infrastructure, becomes a necessity. Moreover, the availability of these systems at the point of care when needed is a vital issue for the quality of healthcare provided to patients. This chapter takes a process perspective of healthcare delivery within and across organizational boundaries and presents a disciplined approach for evolving healthcare systems towards a pervasive, grid-enabled service-oriented architecture using the enterprise system bus middleware technology for resolving integration issues, the business process execution language for supporting collaboration requirements and grid middleware technology for both addressing common SOA scalability requirements and complementing existing system functionality. In such an environment, appropriate security mechanisms must ensure authorized access to integrated healthcare services and data. To this end, a security framework addressing security aspects such as authorization and access control is also presented.

  7. 10 CFR 4.126 - General requirement concerning accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false General requirement concerning accessibility. 4.126 Section 4.126 Energy NUCLEAR REGULATORY COMMISSION NONDISCRIMINATION IN FEDERALLY ASSISTED PROGRAMS OR... concerning accessibility. No qualified handicapped person shall, because a recipient's facilities are...

  8. Characterizing Types of Human Mobility to Inform Differential and Targeted Malaria Elimination Strategies in Northeast Cambodia

    PubMed Central

    Peeters Grietens, Koen; Gryseels, Charlotte; Dierickx, Susan; Bannister-Tyrrell, Melanie; Trienekens, Suzan; Uk, Sambunny; Phoeuk, Pisen; Suon, Sokha; Set, Srun; Gerrets, René; Hoibak, Sarah; Muela Ribera, Joan; Hausmann-Muela, Susanna; Tho, Sochantha; Durnez, Lies; Sluydts, Vincent; d’Alessandro, Umberto; Coosemans, Marc; Erhart, Annette

    2015-01-01

    Human population movements currently challenge malaria elimination in low transmission foci in the Greater Mekong Subregion. Using a mixed-methods design, combining ethnography (n = 410 interviews), malariometric data (n = 4996) and population surveys (n = 824 indigenous populations; n = 704 Khmer migrants) malaria vulnerability among different types of mobile populations was researched in the remote province of Ratanakiri, Cambodia. Different structural types of human mobility were identified, showing differential risk and vulnerability. Among local indigenous populations, access to malaria testing and treatment through the VMW-system and LLIN coverage was high but control strategies failed to account for forest farmers’ prolonged stays at forest farms/fields (61% during rainy season), increasing their exposure (p = 0.002). The Khmer migrants, with low acquired immunity, active on plantations and mines, represented a fundamentally different group not reached by LLIN-distribution campaigns since they were largely unregistered (79%) and unaware of the local VMW-system (95%) due to poor social integration. Khmer migrants therefore require control strategies including active detection, registration and immediate access to malaria prevention and control tools from which they are currently excluded. In conclusion, different types of mobility require different malaria elimination strategies. Targeting mobility without an in-depth understanding of malaria risk in each group challenges further progress towards elimination. PMID:26593245

  9. The impact of threshold language assistance programming on the accessibility of mental health services for persons with limited English proficiency in the Medi-Cal setting.

    PubMed

    McClellan, Sean R; Wu, Frances M; Snowden, Lonnie R

    2012-06-01

    Title VI of the 1964 Civil Rights Act prohibits federal funds recipients from providing care to limited English proficiency (LEP) persons more limited in scope or lower in quality than care provided to others. In 1999, the California Department of Mental Health implemented a "threshold language access policy" to meet its Title VI obligations. Under this policy, Medi-Cal agencies must provide language assistance programming in a non-English language where a county's Medical population contains either 3000 residents or 5% speakers of that language. We examine the impact of threshold language policy-required language assistance programming on LEP persons' access to mental health services by analyzing the county-level penetration rate of services for Russian, Spanish, and Vietnamese speakers across 34 California counties, over 10 years of quarterly data. Exploiting a time series with nonequivalent control group study design, we studied this phenomena using linear regression with random county effects to account for trends over time. Threshold language policy-required assistance programming led to an immediate and significant increase in the penetration rate of mental health services for Russian (8.2, P < 0.01) and Vietnamese (3.3, P < 0.01) language speaking persons. Threshold language assistance programming was effective in increasing mental health access for Russian and Vietnamese, but not for Spanish-speaking LEP persons.

  10. Device Oriented Project Controller

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dalesio, Leo; Kraimer, Martin

    2013-11-20

    This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions havemore » been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.« less

  11. Why build limited access highways?.

    DOT National Transportation Integrated Search

    1991-01-01

    This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...

  12. Adaptive Stress Testing of Airborne Collision Avoidance Systems

    NASA Technical Reports Server (NTRS)

    Lee, Ritchie; Kochenderfer, Mykel J.; Mengshoel, Ole J.; Brat, Guillaume P.; Owen, Michael P.

    2015-01-01

    This paper presents a scalable method to efficiently search for the most likely state trajectory leading to an event given only a simulator of a system. Our approach uses a reinforcement learning formulation and solves it using Monte Carlo Tree Search (MCTS). The approach places very few requirements on the underlying system, requiring only that the simulator provide some basic controls, the ability to evaluate certain conditions, and a mechanism to control the stochasticity in the system. Access to the system state is not required, allowing the method to support systems with hidden state. The method is applied to stress test a prototype aircraft collision avoidance system to identify trajectories that are likely to lead to near mid-air collisions. We present results for both single and multi-threat encounters and discuss their relevance. Compared with direct Monte Carlo search, this MCTS method performs significantly better both in finding events and in maximizing their likelihood.

  13. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  14. Effect of Information and Telephone-Guided Access to Community Support for People with Chronic Kidney Disease: Randomised Controlled Trial

    PubMed Central

    Blakeman, Tom; Blickem, Christian; Kennedy, Anne; Reeves, David; Bower, Peter; Gaffney, Hannah; Gardner, Caroline; Lee, Victoria; Jariwala, Praksha; Dawson, Shoba; Mossabir, Rahena; Brooks, Helen; Richardson, Gerry; Spackman, Eldon; Vassilev, Ivaylo; Chew-Graham, Carolyn; Rogers, Anne

    2014-01-01

    Background Implementation of self-management support in traditional primary care settings has proved difficult, encouraging the development of alternative models which actively link to community resources. Chronic kidney disease (CKD) is a common condition usually diagnosed in the presence of other co-morbidities. This trial aimed to determine the effectiveness of an intervention to provide information and telephone-guided access to community support versus usual care for patients with stage 3 CKD. Methods and Findings In a pragmatic, two-arm, patient level randomised controlled trial 436 patients with a diagnosis of stage 3 CKD were recruited from 24 general practices in Greater Manchester. Patients were randomised to intervention (215) or usual care (221). Primary outcome measures were health related quality of life (EQ-5D health questionnaire), blood pressure control, and positive and active engagement in life (heiQ) at 6 months. At 6 months, mean health related quality of life was significantly higher for the intervention group (adjusted mean difference = 0.05; 95% CI = 0.01, 0.08) and blood pressure was controlled for a significantly greater proportion of patients in the intervention group (adjusted odds-ratio = 1.85; 95% CI = 1.25, 2.72). Patients did not differ significantly in positive and active engagement in life. The intervention group reported a reduction in costs compared with control. Conclusions An intervention to provide tailored information and telephone-guided access to community resources was associated with modest but significant improvements in health related quality of life and better maintenance of blood pressure control for patients with stage 3 CKD compared with usual care. However, further research is required to identify the mechanisms of action of the intervention. Trial Registration Controlled-Trials.com ISRCTN45433299 PMID:25330169

  15. Cancer control in developing countries: using health data and health services research to measure and improve access, quality and efficiency.

    PubMed

    Hanna, Timothy P; Kangolle, Alfred C T

    2010-10-13

    Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) PROCESS: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) OUTCOME: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international collaboration as well as political leadership. Horizontal integration with programs for other diseases will be important.

  16. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-03

    ... 5 U.S.C. 552a(c)(3) and (d), when access to accounting disclosures and access to or amendment of...: (i) From subsection (c)(3), as to grant access to an accounting of disclosures as required by the... U.S.C. 552a(c)(3), because to grant access to the accounting for each disclosure as required by the...

  17. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  18. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  19. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  20. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  1. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  2. 32 CFR 37.920 - What requirement for access to a nonprofit participant's records do I include in a TIA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What requirement for access to a nonprofit participant's records do I include in a TIA? 37.920 Section 37.920 National Defense Department of Defense... What requirement for access to a nonprofit participant's records do I include in a TIA? Your TIA must...

  3. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network access requirements for Block C in the... § 27.16 Network access requirements for Block C in the 746-757 and 776-787 MHz bands. (a) Applicability... the devices and applications of their choice on the licensee's C Block network, except: (1) Insofar as...

  4. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Network access requirements for Block C in the... § 27.16 Network access requirements for Block C in the 746-757 and 776-787 MHz bands. (a) Applicability... the devices and applications of their choice on the licensee's C Block network, except: (1) Insofar as...

  5. MO-FG-BRB-02: Uniform Access to Radiation Therapy by 2035: Global Task Force on Radiotherapy for Cancer Control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jaffray, D.

    The global burden of cancer is growing rapidly with an estimated 15 million new cases per year worldwide in 2015, growing to 19 million by 2025 and 24 million by 2035. The largest component of this growth will occur in low-to-middle income countries (LMICs). About half of these cases will require radiation treatment. The gap for available cancer treatment, including radiation therapy, between high-income countries (HICs) and LMICs is enormous. Accurate data and quantitative models to project the needs and the benefits of cancer treatment are a critical first step in closing the large cancer divide between LMICs and HICs.more » In this context, the Union for International Cancer Control (UICC) has developed a Global Task Force on Radiotherapy for Cancer Control (GTFRCC) with a charge to answer the question as to what it will take to close the gap between what exists today and reasonable access to radiation therapy globally by 2035 and what the potential clinical and economic benefits are for doing this. The Task Force has determined the projections of cancer incidence and the infrastructure required to provide access to radiation therapy globally. Furthermore it has shown that appropriate investment not only yields improved clinical outcomes for millions of patients but that it also provides an overall economic gain throughout all the income settings where this investment is made. This symposium will summarize the facets associated with this global cancer challenge by reviewing the cancer burden, looking at the requirements for radiation therapy, reviewing the benefits of providing such therapy both from a clinical and economic perspective and finally by looking at what approaches can be used to aid in the alleviation of this global cancer challenge. The speakers are world renowned experts in global public health issues (R. Atun), medical physics (D. Jaffray) and radiation oncology (N. Coleman). Learning Objectives: To describe the global cancer challenge and the corresponding potential benefits of addressing this challenge. To describe what radiation therapy infrastructure, in terms of facilities, equipment and personnel, will be required to address this challenge. To describe models of addressing personnel and infrastructure mobilization and capacity building within regions where significant cancer treatment disparities exist.« less

  6. NIF ICCS network design and loading analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tietbohl, G; Bryant, R

    The National Ignition Facility (NIF) is housed within a large facility about the size of two football fields. The Integrated Computer Control System (ICCS) is distributed throughout this facility and requires the integration of about 40,000 control points and over 500 video sources. This integration is provided by approximately 700 control computers distributed throughout the NIF facility and a network that provides the communication infrastructure. A main control room houses a set of seven computer consoles providing operator access and control of the various distributed front-end processors (FEPs). There are also remote workstations distributed within the facility that allow providemore » operator console functions while personnel are testing and troubleshooting throughout the facility. The operator workstations communicate with the FEPs which implement the localized control and monitoring functions. There are different types of FEPs for the various subsystems being controlled. This report describes the design of the NIF ICCS network and how it meets the traffic loads that will are expected and the requirements of the Sub-System Design Requirements (SSDR's). This document supersedes the earlier reports entitled Analysis of the National Ignition Facility Network, dated November 6, 1996 and The National Ignition Facility Digital Video and Control Network, dated July 9, 1996. For an overview of the ICCS, refer to the document NIF Integrated Computer Controls System Description (NIF-3738).« less

  7. Development of Integrated Programs for Aerospace-vehicle design (IPAD): Integrated information processing requirements

    NASA Technical Reports Server (NTRS)

    Southall, J. W.

    1979-01-01

    The engineering-specified requirements for integrated information processing by means of the Integrated Programs for Aerospace-Vehicle Design (IPAD) system are presented. A data model is described and is based on the design process of a typical aerospace vehicle. General data management requirements are specified for data storage, retrieval, generation, communication, and maintenance. Information management requirements are specified for a two-component data model. In the general portion, data sets are managed as entities, and in the specific portion, data elements and the relationships between elements are managed by the system, allowing user access to individual elements for the purpose of query. Computer program management requirements are specified for support of a computer program library, control of computer programs, and installation of computer programs into IPAD.

  8. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat. PMID:28758045

  9. Stratospheric Balloon Platforms for Near Space Access

    NASA Astrophysics Data System (ADS)

    Dewey, R. G.

    2012-12-01

    For over five decades, high altitude aerospace balloon platforms have provided a unique vantage point for space and geophysical research by exposing scientific instrument packages and experiments to space-like conditions above 99% of Earth's atmosphere. Reaching altitudes in excess of 30 km for durations ranging from hours to weeks, high altitude balloons offer longer flight durations than both traditional sounding rockets and emerging suborbital reusable launch vehicles. For instruments and experiments requiring access to high altitudes, engineered balloon systems provide a timely, responsive, flexible, and cost-effective vehicle for reaching near space conditions. Moreover, high altitude balloon platforms serve as an early means of testing and validating hardware bound for suborbital or orbital space without imposing space vehicle qualifications and certification requirements on hardware in development. From float altitudes above 30 km visible obscuration of the sky is greatly reduced and telescopes and other sensors function in an orbit-like environment, but in 1g. Down-facing sensors can take long-exposure atmospheric measurements and images of Earth's surface from oblique and nadir perspectives. Payload support subsystems such as telemetry equipment and command, control, and communication (C3) interfaces can also be tested and operationally verified in this space-analog environment. For scientific payloads requiring over-flight of specific areas of interests, such as an active volcano or forest region, advanced mission planning software allows flight trajectories to be accurately modeled. Using both line-of-sight and satellite-based communication systems, payloads can be tracked and controlled throughout the entire mission duration. Under NASA's Flight Opportunities Program, NSC can provide a range of high altitude flight options to support space and geophysical research: High Altitude Shuttle System (HASS) - A balloon-borne semi-autonomous glider carries payloads to high altitude and returns them safely to pre-selected landing sites, supporting quick recovery, refurbishment, and re-flight. Small Balloon System (SBS) - Controls payload interfaces via a standardized avionics system. Using a parachute for recovery, the SBS is well suited for small satellite and spacecraft subsystem developers wanting to raise their Technology Readiness Level (TRL) in an operationally relevant environment. Provides flexibility for scientific payloads requiring externally mounted equipment, such as telescopes and antennas. Nano Balloon System (NBS) - For smaller payloads (~CubeSats) with minimal C3 requirements, the Nano Balloon System (NBS) operates under less restrictive flight regulations with increased operational flexibility. The NBS is well suited for payload providers seeking a quick, simple, and cost effective solution for operating small ~passive payloads in near space. High altitude balloon systems offer the payload provider and experimenter a unique and flexible platform for geophysical and space research. Though new launch vehicles continue to expand access to suborbital and orbital space, recent improvements in high altitude balloon technology and operations provide a cost effective alternative to access space-like conditions.

  10. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... products and services with peripheral devices or specialized customer premise equipment commonly used by... the telephone or services that such manufacturer or provider offers is accessible to and usable by... requires certain Internet browsers used for advanced communications services to be accessible to people...

  11. Sub-Network Access Control Technology Demonstrator: Software Design of the Network Management System

    DTIC Science & Technology

    2002-08-01

    Canadian Operational Fleet. Requirements The proposed network management solution must provide the normal monitoring and configuration mechanisms generally...Joint Warrior Inter- operability Demonstrations (JWID) m and the Communication System Network Inter- Operability (CSNI) Navy Network Trials. In short...management functional area normally includes two main functions: fault isolation and diagnosis, and restoration of the system . In short, an operator

  12. Network Control Center User Planning System (NCC UPS)

    NASA Astrophysics Data System (ADS)

    Dealy, Brian

    1991-09-01

    NCC UPS is presented in the form of the viewgraphs. The following subject areas are covered: UPS overview; NCC UPS role; major NCC UPS functional requirements; interactive user access levels; UPS interfaces; interactive user subsystem; interface navigation; scheduling screen hierarchy; interactive scheduling input panels; autogenerated schedule request panel; schedule data tabular display panel; schedule data graphic display panel; graphic scheduling aid design; and schedule data graphic display.

  13. Network Control Center User Planning System (NCC UPS)

    NASA Technical Reports Server (NTRS)

    Dealy, Brian

    1991-01-01

    NCC UPS is presented in the form of the viewgraphs. The following subject areas are covered: UPS overview; NCC UPS role; major NCC UPS functional requirements; interactive user access levels; UPS interfaces; interactive user subsystem; interface navigation; scheduling screen hierarchy; interactive scheduling input panels; autogenerated schedule request panel; schedule data tabular display panel; schedule data graphic display panel; graphic scheduling aid design; and schedule data graphic display.

  14. Techniques for the Detection of Faulty Packet Header Modifications

    DTIC Science & Technology

    2014-03-12

    layer approaches to check if packets are being altered by middleboxes and were primarily developed as network neutrality analysis tools. Switzerland works...local and metropolitan area networks –specific requirements part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications...policy or position of the Department of Defense or the U.S. Government. Understanding, measuring, and debugging IP networks , particularly across

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lukhanin, Gennadiy; Biery, Kurt; Foulkes, Stephen

    In the NO A experiment, the Detector Controls System (DCS) provides a method for controlling and monitoring important detector hardware and environmental parameters. It is essential for operating the detector and is required to have access to roughly 370,000 independent programmable channels via more than 11,600 physical devices. In this paper, we demonstrate an application of Control System Studio (CSS), developed by Oak Ridge National Laboratory, for the NO A experiment. The application of CSS for the DCS of the NO A experiment has been divided into three phases: (1) user requirements and concept prototype on a test-stand, (2) smallmore » scale deployment at the prototype Near Detector on the Surface, and (3) a larger scale deployment at the Far Detector. We also give an outline of the CSS integration with the NO A online software and the alarm handling logic for the Front-End electronics.« less

  16. Thermal Control Subsystem Design for the Avionics of a Space Station Payload

    NASA Technical Reports Server (NTRS)

    Moran, Matthew E.

    1996-01-01

    A case study of the thermal control subsystem development for a space based payload is presented from the concept stage through preliminary design. This payload, the Space Acceleration Measurement System 2 (SAMS-2), will measure the acceleration environment at select locations within the International Space Station. Its thermal control subsystem must maintain component temperatures within an acceptable range over a 10 year life span, while restricting accessible surfaces to touch temperature limits and insuring fail safe conditions in the event of loss of cooling. In addition to these primary design objectives, system level requirements and constraints are imposed on the payload, many of which are driven by multidisciplinary issues. Blending these issues into the overall system design required concurrent design sessions with the project team, iterative conceptual design layouts, thermal analysis and modeling, and hardware testing. Multiple tradeoff studies were also performed to investigate the many options which surfaced during the development cycle.

  17. MIL-STD-1553 dynamic bus controller/remote terminal hybrid set

    NASA Astrophysics Data System (ADS)

    Friedman, S. N.

    This paper describes the performance, physical and electrical requirements of a Dual Redundant BUS Interface Unit (BIU) acting as a BUS Controller Interface Unit (BCIU) or Remote Terminal Unit (RTU) between a Motorola 68000 VME BUS and MIL-STD-1553B Multiplex Data Bus. A discussion of how the BIU Hybrid set is programmed, and operates as a BCIU or RTU, will be included. This paper will review Dynamic Bus Control and other Mode Code capabilities. The BIU Hybrid Set interfaces to a 68000 Microprocessor with a VME Bus using programmed I/O transfers. This special interface will be discussed along with the internal Dual Access Memory (4K x 16) used to support the data exchanges between the CPU and the BIU Hybrid Set. The hybrid set's physical size and power requirements will be covered. This includes the present Double Eurocard the BIU function is presently being offered on.

  18. To Demonstrate an Integrated Solution for Plasma-Material Interfaces Compatible with an Optimized Core Plasma

    NASA Astrophysics Data System (ADS)

    Goldston, Robert; Brooks, Jeffrey; Hubbard, Amanda; Leonard, Anthony; Lipschultz, Bruce; Maingi, Rajesh; Ulrickson, Michael; Whyte, Dennis

    2009-11-01

    The plasma facing components in a Demo reactor will face much more extreme boundary plasma conditions and operating requirements than any present or planned experiment. These include 1) Power density a factor of four or more greater than in ITER, 2) Continuous operation resulting in annual energy and particle throughput 100-200 times larger than ITER, 3) Elevated surface operating temperature for efficient electricity production, 4) Tritium fuel cycle control for safety and breeding requirements, and 5) Steady state plasma confinement and control. Consistent with ReNeW Thrust 12, design options are being explored for a new moderate-scale facility to assess core-edge interaction issues and solutions. Key desired features include high power density, sufficient pulse length and duty cycle, elevated wall temperature, steady-state control of an optimized core plasma, and flexibility in changing boundary components as well as access for comprehensive measurements.

  19. Ethical and legal implications of whole genome and whole exome sequencing in African populations.

    PubMed

    Wright, Galen E B; Koornhof, Pieter G J; Adeyemo, Adebowale A; Tiffin, Nicki

    2013-05-28

    Rapid advances in high throughput genomic technologies and next generation sequencing are making medical genomic research more readily accessible and affordable, including the sequencing of patient and control whole genomes and exomes in order to elucidate genetic factors underlying disease. Over the next five years, the Human Heredity and Health in Africa (H3Africa) Initiative, funded by the Wellcome Trust (United Kingdom) and the National Institutes of Health (United States of America), will contribute greatly towards sequencing of numerous African samples for biomedical research. Funding agencies and journals often require submission of genomic data from research participants to databases that allow open or controlled data access for all investigators. Access to such genotype-phenotype and pedigree data, however, needs careful control in order to prevent identification of individuals or families. This is particularly the case in Africa, where many researchers and their patients are inexperienced in the ethical issues accompanying whole genome and exome research; and where an historical unidirectional flow of samples and data out of Africa has created a sense of exploitation and distrust. In the current study, we analysed the implications of the anticipated surge of next generation sequencing data in Africa and the subsequent data sharing concepts on the protection of privacy of research subjects. We performed a retrospective analysis of the informed consent process for the continent and the rest-of-the-world and examined relevant legislation, both current and proposed. We investigated the following issues: (i) informed consent, including guidelines for performing culturally-sensitive next generation sequencing research in Africa and availability of suitable informed consent documents; (ii) data security and subject privacy whilst practicing data sharing; (iii) conveying the implications of such concepts to research participants in resource limited settings. We conclude that, in order to meet the unique requirements of performing next generation sequencing-related research in African populations, novel approaches to the informed consent process are required. This will help to avoid infringement of privacy of individual subjects as well as to ensure that informed consent adheres to acceptable data protection levels with regard to use and transfer of such information.

  20. Ethical and legal implications of whole genome and whole exome sequencing in African populations

    PubMed Central

    2013-01-01

    Background Rapid advances in high throughput genomic technologies and next generation sequencing are making medical genomic research more readily accessible and affordable, including the sequencing of patient and control whole genomes and exomes in order to elucidate genetic factors underlying disease. Over the next five years, the Human Heredity and Health in Africa (H3Africa) Initiative, funded by the Wellcome Trust (United Kingdom) and the National Institutes of Health (United States of America), will contribute greatly towards sequencing of numerous African samples for biomedical research. Discussion Funding agencies and journals often require submission of genomic data from research participants to databases that allow open or controlled data access for all investigators. Access to such genotype-phenotype and pedigree data, however, needs careful control in order to prevent identification of individuals or families. This is particularly the case in Africa, where many researchers and their patients are inexperienced in the ethical issues accompanying whole genome and exome research; and where an historical unidirectional flow of samples and data out of Africa has created a sense of exploitation and distrust. In the current study, we analysed the implications of the anticipated surge of next generation sequencing data in Africa and the subsequent data sharing concepts on the protection of privacy of research subjects. We performed a retrospective analysis of the informed consent process for the continent and the rest-of-the-world and examined relevant legislation, both current and proposed. We investigated the following issues: (i) informed consent, including guidelines for performing culturally-sensitive next generation sequencing research in Africa and availability of suitable informed consent documents; (ii) data security and subject privacy whilst practicing data sharing; (iii) conveying the implications of such concepts to research participants in resource limited settings. Summary We conclude that, in order to meet the unique requirements of performing next generation sequencing-related research in African populations, novel approaches to the informed consent process are required. This will help to avoid infringement of privacy of individual subjects as well as to ensure that informed consent adheres to acceptable data protection levels with regard to use and transfer of such information. PMID:23714101

Top