An Attribute Based Access Control Framework for Healthcare System
NASA Astrophysics Data System (ADS)
Afshar, Majid; Samet, Saeed; Hu, Ting
2018-01-01
Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
A service-oriented data access control model
NASA Astrophysics Data System (ADS)
Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali
2017-01-01
The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
77 FR 551 - Privacy Act of 1974; Amended System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-05
... Act system of records entitled ``Treasury/BEP .027--Access Control and Alarm Monitoring Systems (ACAMS... .027--Access Control and Alarm Monitoring Systems (ACAMS).'' BEP proposes to amend that system of... records entitled ``BEP .027--Access Control and Alarm Monitoring Systems (ACAMS),'' as follows: Treasury...
76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Dischinger, Portia
2005-01-01
This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.
77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
DOT National Transportation Integrated Search
1974-06-01
The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...
78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Task Delegation Based Access Control Models for Workflow Systems
NASA Astrophysics Data System (ADS)
Gaaloul, Khaled; Charoy, François
e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Logical Access Control Mechanisms in Computer Systems.
ERIC Educational Resources Information Center
Hsiao, David K.
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
42 CFR 431.834 - Access to records: Claims processing assessment systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834 Access to records: Claims processing assessment systems. The agency, upon written request, must provide HHS staff with access to all records pertaining to its MQC claims processing assessment system reviews...
Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha, Fatemeh; Mu, Yi
2016-05-01
Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Securely and Flexibly Sharing a Biomedical Data Management System
Wang, Fusheng; Hussels, Phillip; Liu, Peiya
2011-01-01
Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285
Integrated semiconductor-magnetic random access memory system
NASA Technical Reports Server (NTRS)
Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)
2001-01-01
The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
CAS. Controlled Access Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martinez, B.; Pomeroy, G.
1989-12-01
The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.
Access Control Management for SCADA Systems
NASA Astrophysics Data System (ADS)
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
NASA Astrophysics Data System (ADS)
Hirono, Masahiko; Nojima, Toshio
This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.
Sucurovic, Snezana; Milutinovic, Veljko
2008-01-01
The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent
NASA Technical Reports Server (NTRS)
Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.
2013-01-01
This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.
Security middleware infrastructure for DICOM images in health information systems.
Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A
2003-12-01
In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.
DOT National Transportation Integrated Search
1974-06-01
The report synthesizes a set of satellite communications systems configurations to provide services to aircraft flying oceanic routes. These configurations are combined with access control methods to form complete systems. These systems are analyzed ...
Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel
2016-12-01
Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.
NASA Technical Reports Server (NTRS)
Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)
2000-01-01
A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.
NASA Astrophysics Data System (ADS)
Abramov, G. V.; Emeljanov, A. E.; Ivashin, A. L.
Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.
Evaluating the effectiveness of biometric access control systems
NASA Astrophysics Data System (ADS)
Lively, Valerie M.
2005-05-01
This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.
REVIEW: Widespread access to predictive models in the motor system: a short review
NASA Astrophysics Data System (ADS)
Davidson, Paul R.; Wolpert, Daniel M.
2005-09-01
Recent behavioural and computational studies suggest that access to internal predictive models of arm and object dynamics is widespread in the sensorimotor system. Several systems, including those responsible for oculomotor and skeletomotor control, perceptual processing, postural control and mental imagery, are able to access predictions of the motion of the arm. A capacity to make and use predictions of object dynamics is similarly widespread. Here, we review recent studies looking at the predictive capacity of the central nervous system which reveal pervasive access to forward models of the environment.
Access Control for Cooperation Systems Based on Group Situation
NASA Astrophysics Data System (ADS)
Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo
Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.
DOE`s nation-wide system for access control can solve problems for the federal government
DOE Office of Scientific and Technical Information (OSTI.GOV)
Callahan, S.; Tomes, D.; Davis, G.
1996-07-01
The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less
The Intersystem - Internetworking for space systems
NASA Astrophysics Data System (ADS)
Landauer, C.
This paper is a description of the Intersystem, which is a mechanism for internetworking among existing and planned military satellite communication systems. The communication systems interconnected with this mechanism are called member systems, and the interconnected set of communication systems is called the Intersystem. The Intersystem is implemented with higher layer protocols that impose a common organization on the different signaling conventions, so that end users of different systems can communicate with each other. The Intersystem provides its coordination of member system access and resource requests with Intersystem Resource Controllers (IRCs), which are processors that implement the Intersystem protocols and have interfaces to the member systems' own access and resource control mechanisms. The IRCs are connected to each other to form the IRC Subnetwork. Terminals request services from the IRC Subnetwork using the Intersystem Access Control Protocols, and the IRC Subnetwork responses to the requests are coordinated using the RCRC (Resource Controller to Resource Controller) Protocols.
42 CFR 431.834 - Access to records: Claims processing assessment systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834... to which the State has access, including information available under part 435, subpart J, of this...
42 CFR 431.834 - Access to records: Claims processing assessment systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834... to which the State has access, including information available under part 435, subpart J, of this...
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
Integrated Performance Testing Workshop, Modules 6 - 11
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leach, Janice; Torres, Teresa M.
These modules cover performance testing of: Interior Detection Systems; Access Controls; Exterior Detection Systems; Video Assessment Systems; SNM / Contraband Detection Systems; Access Delay Elements
Satellite control system nucleus for the Brazilian complete space mission
NASA Astrophysics Data System (ADS)
Yamaguti, Wilson; Decarvalhovieira, Anastacio Emanuel; Deoliveira, Julia Leocadia; Cardoso, Paulo Eduardo; Dacosta, Petronio Osorio
1990-10-01
The nucleus of the satellite control system for the Brazilian data collecting and remote sensing satellites is described. The system is based on Digital Equipment Computers and the VAX/VMS operating system. The nucleus provides the access control, the system configuration, the event management, history files management, time synchronization, wall display control, and X25 data communication network access facilities. The architecture of the nucleus and its main implementation aspects are described. The implementation experience acquired is considered.
Mandatory and Location-Aware Access Control for Relational Databases
NASA Astrophysics Data System (ADS)
Decker, Michael
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
Access control and privacy in large distributed systems
NASA Technical Reports Server (NTRS)
Leiner, B. M.; Bishop, M.
1986-01-01
Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.
Embedded controller for GEM detector readout system
NASA Astrophysics Data System (ADS)
Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek
2013-10-01
This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.
Peter, Frank J.; Dalton, Larry J.; Plummer, David W.
2002-01-01
A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.
NASA Astrophysics Data System (ADS)
Danilova, Olga; Semenova, Zinaida
2018-04-01
The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.
A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less
42 CFR 431.834 - Access to records: Claims processing assessment systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 4 2013-10-01 2013-10-01 false Access to records: Claims processing assessment systems. 431.834 Section 431.834 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834...
42 CFR 431.834 - Access to records: Claims processing assessment systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 4 2011-10-01 2011-10-01 false Access to records: Claims processing assessment systems. 431.834 Section 431.834 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834...
[Access control management in electronic health records: a systematic literature review].
Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio
2012-01-01
This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.
Data General Corporation Advanced Operating System/Virtual Storage (AOS/ VS). Revision 7.60
1989-02-22
control list for each directory and data file. An access control list includes the users who can and cannot access files as well as the access...and any required data, it can -5- February 22, 1989 Final Evaluation Report Data General AOS/VS SYSTEM OVERVIEW operate asynchronously and in parallel...memory. The IOC can perform the data transfer without further interventiin from the CPU. The I/O channels interface with the processor or system
Access control for electronic patient records.
Glagola, M J
1998-01-01
The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
Forseeable Problems in a System of Maximum Access.
ERIC Educational Resources Information Center
Pemberton, John de J., Jr.
A maximum-access cable television system will eliminate some legal and regulatory problems and introduce others. The operator of a system will no longer be responsible for and in control of what is transmitted over his system. With access unlimited and unrestricted, such regulations of content as the "fairness doctrine" and "equal…
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban
2017-01-01
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat. PMID:28758045
Method and apparatus for managing access to a memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeBenedictis, Erik
A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operationalmore » memory layout reduces an amount of energy consumed by the processor to perform the computing job.« less
Ardern-Jones, Joanne; Hughes, Donald K; Rowe, Philip H; Mottram, David R; Green, Christopher F
2009-04-01
This study assessed the attitudes of Emergency Department (ED) staff regarding the introduction of an automated stock-control system. The objectives were to determine attitudes to stock control and replenishment, speed of access to the system, ease of use and the potential for future uses of the system. The study was carried out in the Countess of Chester Hospital NHS Foundation Trust (COCH) ED, which is attended by over 65,000 patients each year. All 68 ED staff were sent pre-piloted, semi-structured questionnaires and reminders, before and after automation of medicines stock control. Pre-implementation, 35 staff (66.1% of respondents) reported that problems occurred with access to medicine storage keys 'very frequently' or 'frequently'. Twenty-eight (52.8%) respondents 'agreed' or 'strongly agreed' that medicines were quickly accessed, which rose to 41 (77%) post-automation (P < 0.001). Improvement was reported in stock replenishment and storage of stock injections and oral medicines, but there were mixed opinions regarding storage of bulk fluids and refrigerated items. Twenty-seven (51.9%) staff reported access to the system within 1 min and 17 (32.7%) staff reported access within 1-2 min. The majority of staff found the system 'easy' or 'very easy' to use and there was a non-significant relationship between previous use of information technology and acceptance of the system. From a staff satisfaction perspective, automation improved medicines storage, security and stock control, and addressed the problem of searching for keys to storage areas. Concerns over familiarity with computers, queuing, speed of access and an improved audit trail do not appear to have been issues, when compared with the previous manual storage of medicines.
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Takeda, Toshihiro; Ueda, Kanayo; Nakagawa, Akito; Manabe, Shirou; Okada, Katsuki; Mihara, Naoki; Matsumura, Yasushi
2017-01-01
Electronic health record (EHR) systems are necessary for the sharing of medical information between care delivery organizations (CDOs). We developed a document-based EHR system in which all of the PDF documents that are stored in our electronic medical record system can be disclosed to selected target CDOs. An access control list (ACL) file was designed based on the HL7 CDA header to manage the information that is disclosed.
Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.
UNificatins and Extensions of the Multiple Access Communications Problem,
1981-07-01
Control , Stability and Waiting Time in a Slotted ALOHA Random Access System ," IEEE...quceing, them, the control procedure must tolerate a larger average number of’ messages in the system if it is to limit the number of times that the system ...running fas- ter than real time to provide some flow control for that class . The virtual clocks for every other class merely act as a "gate" which
Typing for Conflict Detection in Access Control Policies
NASA Astrophysics Data System (ADS)
Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge
In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-06
... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. RM 2008-8] Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final Rule; correction. SUMMARY: The Copyright Office makes a...
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Dynamic access control model for privacy preserving personalized healthcare in cloud environment.
Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon
2015-01-01
When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.
Traffic handling capability of a broadband indoor wireless network using CDMA multiple access
NASA Astrophysics Data System (ADS)
Zhang, Chang G.; Hafez, H. M.; Falconer, David D.
1994-05-01
CDMA (code division multiple access) may be an attractive technique for wireless access to broadband services because of its multiple access simplicity and other appealing features. In order to investigate traffic handling capabilities of a future network providing a variety of integrated services, this paper presents a study of a broadband indoor wireless network supporting high-speed traffic using CDMA multiple access. The results are obtained through the simulation of an indoor environment and the traffic capabilities of the wireless access to broadband 155.5 MHz ATM-SONET networks using the mm-wave band. A distributed system architecture is employed and the system performance is measured in terms of call blocking probability and dropping probability. The impacts of the base station density, traffic load, average holding time, and variable traffic sources on the system performance are examined. The improvement of system performance by implementing various techniques such as handoff, admission control, power control and sectorization are also investigated.
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...
Urban Studies: A Study of Bibliographic Access and Control.
ERIC Educational Resources Information Center
Anderson, Barbara E.
This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…
Role-based access control permissions
Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander
2017-04-25
Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.
Access Control in Location-Based Services
NASA Astrophysics Data System (ADS)
Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.
NASA Technical Reports Server (NTRS)
Spiger, R. J.; Farrell, R. J.; Holcomb, G. A.
1982-01-01
The access schema developed to access both individual switch functions as well as automated or semiautomated procedures for the orbital maneuvering system and electrical power and distribution and control system discussed and the operation of the system is described. Feasibility tests and analyses used to define display parameters and to select applicable hardware choices for use in such a system are presented and the results are discussed.
ERIC Educational Resources Information Center
International Business Machines Corp., Gaithersburg, MD. Data Processing Div.
The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…
Ver-i-Fus: an integrated access control and information monitoring and management system
NASA Astrophysics Data System (ADS)
Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.
1997-01-01
This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.
Computer access security code system
NASA Technical Reports Server (NTRS)
Collins, Earl R., Jr. (Inventor)
1990-01-01
A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
Automatic Control and Data Acquisition System for Combustion Laboratory Applications.
1982-10-01
O VPI Access~.ion FCr- 1473 2 UNCLASSIFIED Approved for public release; distribution unlimited JAutomatic Control and Data Acquisition System for...unit. The CPU/ROK board includes a 16 bit microprocessor chip which decodes and executes all in- structions, and controls all data transfers. The 12K...in the limited memory space of 32K of the HP-85 33 ACQDTA’ 1) Controls DevicesCRAIN ,2) Acquires Photodiods Output$ 3) Stores Data o Disc 1
Access Control for Mobile Assessment Systems Using ID.
Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma
2015-01-01
The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.
Protection of electronic health records (EHRs) in cloud.
Alabdulatif, Abdulatif; Khalil, Ibrahim; Mai, Vu
2013-01-01
EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses
NASA Astrophysics Data System (ADS)
Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon
This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.
This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not tomore » unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.« less
Experience with ActiveX control for simple channel access
DOE Office of Scientific and Technical Information (OSTI.GOV)
Timossi, C.; Nishimura, H.; McDonald, J.
2003-05-15
Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.
Policy reconciliation for access control in dynamic cross-enterprise collaborations
NASA Astrophysics Data System (ADS)
Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.
2018-03-01
In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.
The Ins and Outs of Access Control.
ERIC Educational Resources Information Center
Longworth, David
1999-01-01
Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…
Session Types for Access and Information Flow Control
NASA Astrophysics Data System (ADS)
Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.
An evidential approach to problem solving when a large number of knowledge systems is available
NASA Technical Reports Server (NTRS)
Dekorvin, Andre
1989-01-01
Some recent problems are no longer formulated in terms of imprecise facts, missing data or inadequate measuring devices. Instead, questions pertaining to knowledge and information itself arise and can be phrased independently of any particular area of knowledge. The problem considered in the present work is how to model a problem solver that is trying to find the answer to some query. The problem solver has access to a large number of knowledge systems that specialize in diverse features. In this context, feature means an indicator of what the possibilities for the answer are. The knowledge systems should not be accessed more than once, in order to have truly independent sources of information. Moreover, these systems are allowed to run in parallel. Since access might be expensive, it is necessary to construct a management policy for accessing these knowledge systems. To help in the access policy, some control knowledge systems are available. Control knowledge systems have knowledge about the performance parameters status of the knowledge systems. In order to carry out the double goal of estimating what units to access and to answer the given query, diverse pieces of evidence must be fused. The Dempster-Shafer Theory of Evidence is used to pool the knowledge bases.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bouchier, F.; Ahrens, J.S.; Wells, G.
One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometricmore » device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-21
...., 1150 18th Street NW., Suite 910, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: The RTCA... (202) 833-9434, or Web site at http://www.rtca.org . SUPPLEMENTARY INFORMATION: Pursuant to section 10... Security System Standard for Airport Access Control, RTCA Paper No. 168-13/SC224-048 TOR Review--Status of...
Security for safety critical space borne systems
NASA Technical Reports Server (NTRS)
Legrand, Sue
1987-01-01
The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.
Health Information System Role-Based Access Control Current Security Trends and Challenges.
de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo
2018-01-01
This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
Control system for high power laser drilling workover and completion unit
Zediker, Mark S; Makki, Siamak; Faircloth, Brian O; DeWitt, Ronald A; Allen, Erik C; Underwood, Lance D
2015-05-12
A control and monitoring system controls and monitors a high power laser system for performing high power laser operations. The control and monitoring system is configured to perform high power laser operation on, and in, remote and difficult to access locations.
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
A simple, effective media access protocol system for integrated, high data rate networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.
1992-01-01
The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
... Change Relating to New Market Access Risk Management Service, EdgeRisk Controls SM June 26, 2012... access risk management service, called EdgeRisk Controls\\SM\\ (the ``Service''). II. Self-Regulatory... and maintain a system of risk management controls and supervisory procedures that are reasonably...
ERIC Educational Resources Information Center
Bergart, Jeffrey G.; And Others
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
The Information System at CeSAM
NASA Astrophysics Data System (ADS)
Agneray, F.; Gimenez, S.; Moreau, C.; Roehlly, Y.
2012-09-01
Modern large observational programmes produce important amounts of data from various origins, and need high level quality control, fast data access via easy-to-use graphic interfaces, as well as possibility to cross-correlate informations coming from different observations. The Centre de donnéeS Astrophysique de Marseille (CeSAM) offer web access to VO compliant Information Systems to access data of different projects (VVDS, HeDAM, EXODAT, HST-COSMOS,…), including ancillary data obtained outside Laboratoire d'Astrophysique de Marseille (LAM) control. The CeSAM Information Systems provides download of catalogues and some additional services like: search, extract and display imaging and spectroscopic data by multi-criteria and Cone Search interfaces.
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei
2016-05-01
This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.
NASA Technical Reports Server (NTRS)
Hagood, J. T.
1973-01-01
Acceptance tests were conducted at Kennedy Space Center of the Saturn Vehicle Workshop Spacecraft Access Arm and related equipment. The tests were conducted to prove complete system capability to operate satisfactorily under conditions required to support spacecraft operations and activities. The SVWS Access Arm, serial number AA-09-03, is a Command Module Service Arm, S/A 9, which was removed from the mobile launcher and modified to support the SVWS operations. The C/M environmental chamber was removed and a completely new chamber was installed. The retract system was redesigned to remove the automatic/remote control capability and replaced with a local manual control. The SVWS Access Arm System was successfully tested and supported spacecraft processing without major problems.
A Study on the Deriving Requirements of ARGO Operation System
NASA Astrophysics Data System (ADS)
Seo, Yoon-Kyung; Rew, Dong-Young; Lim, Hyung-Chul; Park, In-Kwan; Yim, Hong-Suh; Jo, Jung Hyun; Park, Jong-Uk
2009-12-01
Korea Astronomy and Space Science Institute (KASI) has been developing one mobile and one stationary SLR system since 2008 named as ARGO-M and ARGO-F, respectively. KASI finished the step of deriving the system requirements of ARGO. The requirements include definitions and scopes of various software and hardware components which are necessary for developing the ARGO-M operation system. And the requirements define function, performance, and interface requirements. The operation system consisting of ARGO-M site, ARGO-F site, and Remote Operation Center (ROC) inside KASI is designed for remote access and the automatic tracking and control system which are the main operation concept of ARGO system. To accomplish remote operation, we are considering remote access to ARGO-F and ARGO-M from ROC. The mobile-phone service allows us to access the ARGO-F remotely and to control the system in an emergency. To implement fully automatic tracking and control function in ARGO-F, we have investigated and described the requirements about the automatic aircraft detection system and the various meteorological sensors. This paper addresses the requirements of ARGO Operation System.
Protection - Principles and practice.
NASA Technical Reports Server (NTRS)
Graham, G. S.; Denning, P. J.
1972-01-01
The protection mechanisms of computer systems control the access to objects, especially information objects. The principles of protection system design are formalized as a model (theory) of protection. Each process has a unique identification number which is attached by the system to each access attempted by the process. Details of system implementation are discussed, taking into account the storing of the access matrix, aspects of efficiency, and the selection of subjects and objects. Two systems which have protection features incorporating all the elements of the model are described.
The assessment of exploitation process of power for access control system
NASA Astrophysics Data System (ADS)
Wiśnios, Michał; Paś, Jacek
2017-10-01
The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.
Verification of Security Policy Enforcement in Enterprise Systems
NASA Astrophysics Data System (ADS)
Gupta, Puneet; Stoller, Scott D.
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.
75 FR 69644 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
..., organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other mobile, other.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion detection and prevention systems and log monitoring. Complete access to all records is restricted to and...
Research on a dynamic workflow access control model
NASA Astrophysics Data System (ADS)
Liu, Yiliang; Deng, Jinxia
2007-12-01
In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.
Man-computer Inactive Data Access System (McIDAS). [design, development, fabrication, and testing
NASA Technical Reports Server (NTRS)
1973-01-01
A technical description is given of the effort to design, develop, fabricate, and test the two dimensional data processing system, McIDAS. The system has three basic sections: an access and data archive section, a control section, and a display section. Areas reported include hardware, system software, and applications software.
The Unicorn Collection Management System: Its Structure and Features.
ERIC Educational Resources Information Center
Young, Jacky; Veatch, James R., Jr.
1988-01-01
Discusses the design principles behind the Unicorn Collection Management System, an integrated library system which includes modules for bibliographic and inventory control, circulation, academic reserves, serials control, authority control, acquisition, electronic mail, bulletin board, and enhanced public access. The flexibility of the system is…
Newer Technologies for School Security. ERIC Digest Number 145.
ERIC Educational Resources Information Center
Schneider, Tod
This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
... Change Relating to New Market Access Risk Management Service, EdgeRisk Controls SM June 26, 2012... access risk management service, called EdgeRisk Controls SM (the ``Service''). II. Self-Regulatory..., document and maintain a system of risk management controls and supervisory procedures that are reasonably...
NASA Astrophysics Data System (ADS)
Kwon, Sung-il; Lynch, M.; Prokop, M.
2005-02-01
This paper addresses the system identification and the decoupling PI controller design for a normal conducting RF cavity. Based on the open-loop measurement data of an SNS DTL cavity, the open-loop system's bandwidths and loop time delays are estimated by using batched least square. With the identified system, a PI controller is designed in such a way that it suppresses the time varying klystron droop and decouples the In-phase and Quadrature of the cavity field. The Levenberg-Marquardt algorithm is applied for nonlinear least squares to obtain the optimal PI controller parameters. The tuned PI controller gains are downloaded to the low-level RF system by using channel access. The experiment of the closed-loop system is performed and the performance is investigated. The proposed tuning method is running automatically in real time interface between a host computer with controller hardware through ActiveX Channel Access.
An integrated set of UNIX based system tools at control room level
NASA Astrophysics Data System (ADS)
Potepan, F.; Scafuri, C.; Bortolotto, C.; Surace, G.
1994-12-01
The design effort of providing a simple point-and-click approach to the equipment access has led to the definition and realization of a modular set of software tools to be used at the ELETTRA control room level. Point-to-point equipment access requires neither programming nor specific knowledge of the control system architecture. The development and integration of communication, graphic, editing and global database modules are described in depth, followed by a report of their use in the first commissioning period.
28 CFR 16.85 - Exemption of U.S. Parole Commission-limited access.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Statistical, Educational and Developmental System (JUSTICE/PRC-006). (5) Workload Record, Decision Result, and...-limited access. 16.85 Section 16.85 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE... Scheduling and Control System (JUSTICE/PRC-001). (2) Inmate and Supervision Files System (JUSTICE/PRC-003...
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.
2009-01-01
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.
Proximity-based access control for context-sensitive information provision in SOA-based systems
NASA Astrophysics Data System (ADS)
Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew
2014-06-01
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
Wireless-PDA-controlled image workflow from PACS: the next trend in the health care enterprise?
NASA Astrophysics Data System (ADS)
Erberich, Stephan G.; Documet, Jorge; Zhou, Michael Z.; Cao, Fei; Liu, Brent J.; Mogel, Greg T.; Huang, H. K.
2003-05-01
Image workflow in today's Picture Archiving and Communication Systems (PACS) is controlled from fixed Display Workstations (DW) using proprietary control interfaces. A remote access to the Hospital Information System (HIS) and Radiology Information System (RIS) for urgent patient information retrieval does not exist or gradually become available. The lack for remote access and workflow control for HIS and RIS is especially true when it comes to medical images of a PACS on Department or Hospital level. As images become more complex and data sizes expand rapidly with new image techniques like functional MRI, Mammography or routine spiral CT to name a few, the access and manageability becomes an important issue. Long image downloads or incomplete work lists cannot be tolerated in a busy health care environment. In addition, the domain of the PACS is no longer limited to the imaging department and PACS is also being used in the ER and emergency care units. Thus a prompt and secure access and manageability not only by the radiologist, but also from the physician becomes crucial to optimally utilize the PACS in the health care enterprise of the new millennium. The purpose of this paper is to introduce a concept and its implementation of a remote access and workflow control of the PACS combining wireless, Internet and Internet2 technologies. A wireless device, the Personal Digital Assistant (PDA), is used to communicate to a PACS web server that acts as a gateway controlling the commands for which the user has access to the PACS server. The commands implemented for this test-bed are query/retrieve of the patient list and study list including modality, examination, series and image selection and pushing any list items to a selected DW on the PACS network.
Type-Based Access Control in Data-Centric Systems
NASA Astrophysics Data System (ADS)
Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio
Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.
1981-08-01
of Transactions ..... . 29 5.5.2 Attached Execution of Transactions ........ ... 29 5.5.3 The Choice of Transaction Execution for Access Control...basic access control mech- anism for statistical security and value-dependent security. In Section 5.5, * we describe the process of execution of ...the process of request execution with access control for in- sert and non-insert requests in MDBS. We recall again (see Chapter 4) that the process
Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks
2013-09-16
fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011
Privacy and Access Control for IHE-Based Systems
NASA Astrophysics Data System (ADS)
Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian
Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martinez, B.; Pomeroy, G.
1989-12-02
The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.
Intelligent Facial Recognition Systems: Technology advancements for security applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beer, C.L.
1993-07-01
Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g.,more » fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.« less
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Baldridge, Tim
2005-01-01
The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.
ERIC Educational Resources Information Center
Schneider, Tod
This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…
An Integrated Model of Cognitive Control in Task Switching
ERIC Educational Resources Information Center
Altmann, Erik M.; Gray, Wayne D.
2008-01-01
A model of cognitive control in task switching is developed in which controlled performance depends on the system maintaining access to a code in episodic memory representing the most recently cued task. The main constraint on access to the current task code is proactive interference from old task codes. This interference and the mechanisms that…
NASA Technical Reports Server (NTRS)
1993-01-01
C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pollet, J.
2006-07-01
This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less
Embedded diagnostic, prognostic, and health management system and method for a humanoid robot
NASA Technical Reports Server (NTRS)
Barajas, Leandro G. (Inventor); Strawser, Philip A (Inventor); Sanders, Adam M (Inventor); Reiland, Matthew J (Inventor)
2013-01-01
A robotic system includes a humanoid robot with multiple compliant joints, each moveable using one or more of the actuators, and having sensors for measuring control and feedback data. A distributed controller controls the joints and other integrated system components over multiple high-speed communication networks. Diagnostic, prognostic, and health management (DPHM) modules are embedded within the robot at the various control levels. Each DPHM module measures, controls, and records DPHM data for the respective control level/connected device in a location that is accessible over the networks or via an external device. A method of controlling the robot includes embedding a plurality of the DPHM modules within multiple control levels of the distributed controller, using the DPHM modules to measure DPHM data within each of the control levels, and recording the DPHM data in a location that is accessible over at least one of the high-speed communication networks.
14 CFR 417.413 - Hazard areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... controls during public access. A launch operator must establish procedural controls that prevent hazardous... that system hazard controls are in place that prevent initiation of a hazardous event. Hazard controls... devices or other restraints on system actuation switches or other controls to eliminate the possibility of...
14 CFR 417.413 - Hazard areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... controls during public access. A launch operator must establish procedural controls that prevent hazardous... that system hazard controls are in place that prevent initiation of a hazardous event. Hazard controls... devices or other restraints on system actuation switches or other controls to eliminate the possibility of...
14 CFR 417.413 - Hazard areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... controls during public access. A launch operator must establish procedural controls that prevent hazardous... that system hazard controls are in place that prevent initiation of a hazardous event. Hazard controls... devices or other restraints on system actuation switches or other controls to eliminate the possibility of...
A passive RFID-based location system for personnel and asset monitoring.
Hsiao, Rong-Shue; Kao, Chun-Hao; Chen, Tian-Xiang; Chen, Jui-Lun
2018-01-01
Typical radio frequency identification (RFID) access control system can be ineffective if an unauthorized person tailgates an authorized person through an access area. To propose a system by using indoor locating and tracking techniques address this problem, which is to prevent unauthorized Alzheimer's and dementia patients from getting lost including by tailgating. To achieve accurate target location, passive RFID deployment strategy is studied and a fingerprinting based passive RFID localization algorithm is proposed. The proposed system was evaluated in a building environment to simulate the performance of access control. RFID reader was installed on ceiling near the access area and tags were stitched on both shoulders of the experiment subject's garments. The probability of the error distance within 0.3 m achieved 97% in the warning area; the location precision achieved 97% within 0.4 m in the monitoring area. The result showed that if an unauthorized person enters the restricted area, the system can initiate an alert signal accurately. Therefore, the proposed system is very suitable to be used in nursing home or hospital to prevent unauthorized personnel and assets entering/exiting a confined location.
78 FR 68135 - Environmental Impact Statement: Los Angeles County, California
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-13
... part of 2014. FOR FURTHER INFORMATION CONTACT: Tami Podesta, California Department of Transportation... no access control. SR-138 Northwest Corridor Improvement Project proposes to improve the highway as a freeway, expressway with access control and/or traffic system/multi- modal facility. The SR-138 currently...
Defense Message System Way Ahead: Conclusions and Recommendations from the Industry Advisory Panel
2000-03-01
access terminals • Increasing requirement for authentication and data security for conducting business • Mergers and acquisitions in Internet space...market, used to carry PKI certificates for all types of security services including access control, confidentiality, integrity, and non-repudiation...Wireless access widespread § Unified messaging pervasive § Security /privacy dependent on service provider Long-term § Highly reliable systems
Cardea: Dynamic Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2004-01-01
Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.
Frequency-selective design of wireless power transfer systems for controlled access applications
NASA Astrophysics Data System (ADS)
Maschino, Tyler Stephen
Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-20
... initiated a rulemaking proceeding in accordance with provisions added by the Digital Millennium Copyright... available in digital copies. Proponent: The Open Book Alliance. 2. Literary works, distributed electronically, that: (1) Contain digital rights management and/or other access controls which either prevent the...
RBAC Driven Least Privilege Architecture For Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hull, Julie; Markham, Mark
The concept of role based access control (RBAC) within the IT environment has been studied by researchers and was supported by NIST (circa 1992). This earlier work highlighted the benefits of RBAC which include reduced administrative workload and policies which are easier to analyze and apply. The goals of this research were to expand the application of RBAC in the following ways. Apply RBAC to the control systems environment: The typical RBAC model within the IT environment is used to control a user’s access to files. Within the control system environment files are replaced with measurement (e.g., temperature) and controlmore » (e.g. valve) points organized as a hierarchy of control assets (e.g. a boiler, compressor, refinery unit). Control points have parameters (e.g., high alarm limit, set point, etc.) associated with them. The RBAC model is extended to support access to points and their parameters based upon roles while at the same time allowing permissions for the points to be defined at the asset level or point level directly. In addition, centralized policy administration with distributed access enforcement mechanisms was developed to support the distributed architecture of distributed control systems and SCADA; Extend the RBAC model to include access control for software and devices: The established RBAC approach is to assign users to roles. This work extends that notion by first breaking the control system down into three layers 1) users, 2) software and 3) devices. An RBAC model is then created for each of these three layers. The result is that RBAC can be used to define machine-to-machine policy enforced via the IP security (IPsec) protocol. This highlights the potential to use RBAC for machine-to-machine connectivity within the internet of things; and Enable dynamic policy based upon the operating mode of the system: The IT environment is generally static with respect to policy. However, large cyber physical systems such as industrial controls have various operating modes (start-up, normal operation, emergency, shut-down and maintenance are typical). The policy enforcement architecture must be able to support changes in access permissions as the mode of the control system changes. For example an operator’s role may not allow the operator to shut down a pump during “normal operation” but that same operator role may be given permission to shut down the pump if the refinery transitions to “emergency” mode. The effectiveness of the approach was validated by applying it to the Experion Process Knowledge System. This is a large commercial industrial control system often used to control oil refineries and other assets within the oil and gas sector. As a by-product, other industries using Experion (Pharmaceuticals, Specialty Chemicals, etc.) also benefit from increased security. Policies representative of those that would be used within an oil refinery were created and validated against the RBAC model as implemented in the underlying SQL database. The administration of policy is simplified which in turn makes it practical for security administrators to specify policies which enforce least privilege. The result is a qualitative reduction in risk. The benefits of the enhanced RBAC model are clear and as a result. Honeywell is incorporating portions of the RBAC research into the 2014 release of Experion.« less
77 FR 72335 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
... computer networks, systems, or databases. The records contain the individual's name; social security number... control and track access to DLA-controlled networks, computer systems, and databases. The records may also...
14 CFR Appendix D to Part 25 - Appendix D to Part 25
Code of Federal Regulations, 2014 CFR
2014-01-01
..., electronic controls, pressurization system controls, and engine controls. (2) The accessibility and... considered: (1) Flight path control. (2) Collision avoidance. (3) Navigation. (4) Communications. (5) Operation and monitoring of aircraft engines and systems. (6) Command decisions. (b) Workload factors. The...
14 CFR Appendix D to Part 25 - Appendix D to Part 25
Code of Federal Regulations, 2010 CFR
2010-01-01
..., electronic controls, pressurization system controls, and engine controls. (2) The accessibility and... considered: (1) Flight path control. (2) Collision avoidance. (3) Navigation. (4) Communications. (5) Operation and monitoring of aircraft engines and systems. (6) Command decisions. (b) Workload factors. The...
14 CFR Appendix D to Part 25 - Appendix D to Part 25
Code of Federal Regulations, 2011 CFR
2011-01-01
..., electronic controls, pressurization system controls, and engine controls. (2) The accessibility and... considered: (1) Flight path control. (2) Collision avoidance. (3) Navigation. (4) Communications. (5) Operation and monitoring of aircraft engines and systems. (6) Command decisions. (b) Workload factors. The...
14 CFR Appendix D to Part 25 - Appendix D to Part 25
Code of Federal Regulations, 2012 CFR
2012-01-01
..., electronic controls, pressurization system controls, and engine controls. (2) The accessibility and... considered: (1) Flight path control. (2) Collision avoidance. (3) Navigation. (4) Communications. (5) Operation and monitoring of aircraft engines and systems. (6) Command decisions. (b) Workload factors. The...
A Non-technical User-Oriented Display Notation for XACML Conditions
NASA Astrophysics Data System (ADS)
Stepien, Bernard; Felty, Amy; Matwin, Stan
Ideally, access control to resources in complex IT systems ought to be handled by business decision makers who own a given resource (e.g., the pay and benefits section of an organization should decide and manage the access rules to the payroll system). To make this happen, the security and database communities need to develop vendor-independent access management tools, useable by decision makers, rather than technical personnel detached from a given business function. We have developed and implemented such tool, based on XACML. The XACML is an important emerging tool for managing complex access control applications. As a formal notation, based on an XML schema representing the grammar of a given application, XACML is precise and non-ambiguous. But this very property puts it out of reach of non-technical users. We propose a new notation for displaying and editing XACML rules that is independent of XML, and we develop an editor for it. Our notation combines a tree representation of logical expressions with an accessible natural language layer. Our early experience indicates that such rules can be grasped by non-technical users wishing to develop and control rules for accessing their own resources.
Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks
NASA Astrophysics Data System (ADS)
Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan
2018-01-01
In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.
NASA Technical Reports Server (NTRS)
Rasky, Daniel J.
2004-01-01
The need for robust and reliable access from space is clearly demonstrated by the recent loss of the Space Shuttle Columbia; as well as the NASA s goals to get the Shuttle re-flying and extend its life, build new vehicles for space access, produce successful robotic landers and s a q k retrr? llisrions, and maximize the science content of ambitious outer planets missions that contain nuclear reactors which must be safe for re-entry after possible launch aborts. The technology lynch pin of access from space is hypersonic entry systems such the thermal protection system, along with navigation, guidance and control (NG&C). But it also extends to descent and landing systems such as parachutes, airbags and their control systems. Current space access technology maturation programs such as NASA s Next Generation Launch Technology (NGLT) program or the In-Space Propulsion (ISP) program focus on maturing laboratory demonstrated technologies for potential adoption by specific mission applications. A key requirement for these programs success is a suitable queue of innovative technologies and advanced concepts to mature, including mission concepts enabled by innovative, cross cutting technology advancements. When considering space access, propulsion often dominates the capability requirements, as well as the attention and resources. From the perspective of access from space some new cross cutting technology drivers come into view, along with some new capability opportunities. These include new miniature vehicles (micro, nano, and picosats), advanced automated systems (providing autonomous on-orbit inspection or landing site selection), and transformable aeroshells (to maximize capabilities and minimize weight). This paper provides an assessment of the technology drivers needed to meet future access from space mission requirements, along with the mission capabilities that can be envisioned from innovative, cross cutting access from space technology developments.
Cross-Domain Synergy: Using Artillery in the Fight for Sea Control
2017-04-28
weapon systems designed to contest operational access to joint forces have given many countries low-cost options to prevent intrusion into their...systems designed to contest operational access to joint forces have given many countries low-cost options to prevent intrusion into their...1 The concept of anti-access is not new. The Great Wall of China and Athenian walls demonstrate this strategy has existed for
33 CFR 106.265 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...
Security in the CernVM File System and the Frontier Distributed Database Caching System
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.
2014-06-01
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.
System Administrator for LCS Development Sets
NASA Technical Reports Server (NTRS)
Garcia, Aaron
2013-01-01
The Spaceport Command and Control System Project is creating a Checkout and Control System that will eventually launch the next generation of vehicles from Kennedy Space Center. KSC has a large set of Development and Operational equipment already deployed in several facilities, including the Launch Control Center, which requires support. The position of System Administrator will complete tasks across multiple platforms (Linux/Windows), many of them virtual. The Hardware Branch of the Control and Data Systems Division at the Kennedy Space Center uses system administrators for a variety of tasks. The position of system administrator comes with many responsibilities which include maintaining computer systems, repair or set up hardware, install software, create backups and recover drive images are a sample of jobs which one must complete. Other duties may include working with clients in person or over the phone and resolving their computer system needs. Training is a major part of learning how an organization functions and operates. Taking that into consideration, NASA is no exception. Training on how to better protect the NASA computer infrastructure will be a topic to learn, followed by NASA work polices. Attending meetings and discussing progress will be expected. A system administrator will have an account with root access. Root access gives a user full access to a computer system and or network. System admins can remove critical system files and recover files using a tape backup. Problem solving will be an important skill to develop in order to complete the many tasks.
Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database
NASA Astrophysics Data System (ADS)
Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin
2014-06-01
The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.
Making DidFail Succeed: Enhancing the CERT Static Taint Analyzer for Android App Sets
2015-03-01
limitations on what resources applications can use, Android allows users a large degree of control over how much trust should be given to specific...and other personal details. One of the core assumptions of the Android permission system is that an application that lacks permission to access a...the Android permission system is well suited for controlling access for applications in isolation, it can fail to protect resources on the device
ERIC Educational Resources Information Center
Marcum, Deanna; Boss, Richard
1982-01-01
Discusses four automated serials control systems which have been installed by at least six general libraries: OCLC's Serials Control Subsystem, Faxon's LINX, Ebsco's EBSCONET, and CLASS' CHECKMATE. Features of each system, accessibility, and costs are noted. (EJS)
Access Control of Web and Java Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan
2011-01-01
Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.
Defeating Insider Attacks via Autonomic Self-Protective Networks
ERIC Educational Resources Information Center
Sibai, Faisal M.
2012-01-01
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley
2010-10-01
Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-05-17
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
Trends in communicative access solutions for children with cerebral palsy.
Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom
2014-08-01
Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.
77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-17
... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...
1985-08-01
from the mainframe to the terminals is approximately 56k bits per second (21:3). Score: 8. Expandability. The number of terminals available to the 0...the systems controllers may access any files. For modem link up, a callback system is to be implemented to prevent unauthorized off post access (10:2
Accessible Microscopy Workstation for Students and Scientists with Mobility Impairments
ERIC Educational Resources Information Center
Duerstock, Bradley S.
2006-01-01
An integrated accessible microscopy workstation was designed and developed to allow persons with mobility impairments to control all aspects of light microscopy with minimal human assistance. This system, named AccessScope, is capable of performing brightfield and fluorescence microscopy, image analysis, and tissue morphometry requisite for…
InkTag: Secure Applications on an Untrusted Operating System
Hofmann, Owen S.; Kim, Sangman; Dunn, Alan M.; Lee, Michael Z.; Witchel, Emmett
2014-01-01
InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification, a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes. PMID:24429939
First Experiences Using XACML for Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit
2003-01-01
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.
InkTag: Secure Applications on an Untrusted Operating System.
Hofmann, Owen S; Kim, Sangman; Dunn, Alan M; Lee, Michael Z; Witchel, Emmett
2013-01-01
InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification , a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes.
Bubble memory module for spacecraft application
NASA Technical Reports Server (NTRS)
Hayes, P. J.; Looney, K. T.; Nichols, C. D.
1985-01-01
Bubble domain technology offers an all-solid-state alternative for data storage in onboard data systems. A versatile modular bubble memory concept was developed. The key module is the bubble memory module which contains all of the storage devices and circuitry for accessing these devices. This report documents the bubble memory module design and preliminary hardware designs aimed at memory module functional demonstration with available commercial bubble devices. The system architecture provides simultaneous operation of bubble devices to attain high data rates. Banks of bubble devices are accessed by a given bubble controller to minimize controller parts. A power strobing technique is discussed which could minimize the average system power dissipation. A fast initialization method using EEPROM (electrically erasable, programmable read-only memory) devices promotes fast access. Noise and crosstalk problems and implementations to minimize these are discussed. Flight memory systems which incorporate the concepts and techniques of this work could now be developed for applications.
Empowering citizens with access control mechanisms to their personal health resources.
Calvillo, J; Román, I; Roa, L M
2013-01-01
Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms are essential keys for this approach and they are accomplished by using semantic technologies (i.e., ontologies, rule languages, and inference engines). The results are mainly focused on the security and access control of the proposed scenario. An ontology has been designed and developed for the POVO covering the terminology of the scenario and easing the automation of administration tasks. Over that ontology, an access control mechanism based on rule languages allows specifying access control policies, and an inference engine performs the decision making process automatically. The usability of solutions to ease administration tasks to the SoC is improved by the Me-As-An-Admin (M3A) application. This guides the SoC through the specification of personal access control policies to his/her distributed resources by using semantic technologies (e.g., metamodeling, model-to-text transformations, etc.). All results are developed as services and included in an architecture in accordance with standards and principles of openness and interoperability. Current technology can bring health, social and well-being care actually centered on citizens, and granting each person the management of his/her health information. However, the application of technology without adopting methodologies or normalized guidelines will reduce the interoperability of solutions developed, failing in the development of advanced services and improved scenarios for health delivery. Standards and reference architectures can be cornerstones for future-proof and powerful developments. Finally, not only technology must follow citizen-centric approaches, but also the gaps needing legislative efforts that support these new paradigms of healthcare delivery must be identified and addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Report #09-P-0226, August 31, 2009. End users of the Permit Compliance System and Integrated Compliance Information System National Pollutant Discharge Elimination System can override the Significant Non-Compliance data field without more access controls.
33 CFR 104.270 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
... surveillance equipment and systems and their controls and lighting system controls; (3) Ventilation and air-conditioning systems and other similar spaces; (4) Spaces with access to potable water tanks, pumps, or... security and surveillance equipment and systems; and (6) Protect cargo and vessel stores from tampering. (b...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dykstra, D.; Blomer, J.
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFSmore » and Frontier.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-04
... Agencywide Documents Access and Management System (ADAMS) under Accession Number ML092670242. The proposed... and Maintenance Program'' is being proposed for Section [5.5] [``Administrative Controls--Programs and... and Management System (ADAMS): Publicly available documents created or received at the NRC are...
A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Melin, Alexander M; Ferragut, Erik M; Laska, Jason A
2013-01-01
The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the abilitymore » to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-02
... request vouchers for distribution of grant funds using the automated Voice Response System (VRS). An... Payment and Line of Credit Control System (LOCCS) Voice Response System Access Authorization AGENCY... subject proposal. Payment request vouchers for distribution of grant funds using the automated Voice...
The equipment access software for a distributed UNIX-based accelerator control system
NASA Astrophysics Data System (ADS)
Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé
1994-12-01
This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
... applicable in connection with market access.\\9\\ The required financial risk management controls and... Act of 1934 August 15, 2011. I. Introduction Pursuant to Rule 15c3-5(f) under the Securities Exchange... maintain a system of risk management controls and supervisory procedures that, among other things, is...
Multiple access techniques and spectrum utilization of the GLOBALSTAR mobile satellite system
NASA Astrophysics Data System (ADS)
Louie, Ming; Cohen, Michel; Rouffet, Denis; Gilhousen, Klein S.
The GLOBALSTAR System is a Low Earth Orbit (LEO) satellite-based mobile communications system that is interoperable with the current and future Public Land Mobile Network (PLMN). The GLOBALSTAR System concept is based upon technological advancement in two key areas: (1) the advancement in LEO satellite technology; (2) the advancement in cellular telephone technology, including the commercial applications of Code Division Multiple Access (CDMA) technologies, and of the most recent progress in Time Division Multiple Access technologies. The GLOBALSTAR System uses elements of CDMA, Frequency Division Multiple Access (FDMA), and Time Division Multiple Access (TDMA) technology, combining with satellite Multiple Beam Antenna (MBA) technology, to arrive at one of the most efficient modulation and multiple access system ever proposed for a satellite communications system. The technology used in GLOBALSTAR exploits the following techniques in obtaining high spectral efficiency and affordable cost per channel, with minimum coordination among different systems: power control, in open and closed loops, voice activation, spot beam satellite antenna for frequency reuse, weighted satellite antenna gain, multiple satellite coverage, and handoff between satellites. The GLOBALSTAR system design will use the following frequency bands: 1610-1626.5 MHz for up-link and 2483.5-2500 MHz for down-link.
Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access
NASA Technical Reports Server (NTRS)
Stephan, Ryan A.
2011-01-01
NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.
Patients' experiences of an open access follow up arrangement in managing inflammatory bowel disease
Rogers, A; Kennedy, A; Nelson, E; Robinson, A
2004-01-01
Background: Improving access is a key policy issue in improving quality of care and extending patient choice and participation. People's experience of changing from fixed outpatient appointments to more flexible direct access arrangements for chronic disease has been underexplored. Objectives: To examine patients' views on using an open system of access compared with fixed outpatient appointments as part of a guided self-management intervention for inflammatory bowel disease (IBD). Design: Embedded qualitative study undertaken alongside a randomised controlled trial. Semi-structured interviews were undertaken to obtain an in depth understanding of patients' experience of the change in access arrangements. Participants: A purposive sample (n = 30) was drawn from the intervention group (n = 700) according to a range of responses to the trial baseline and follow up quantitative measures. Results: 28 interviews were included in the analysis. Compared with the previous system of fixed appointments, preference for the new open access system was based on enhanced personal control in contacting services and the view that it fitted better with everyday routine management and the requirement for urgent medical contact when symptoms fail to respond to medication. Preference for retaining fixed appointments was based on a sense of security from gaining access which did not require the individual to initiate the request for medical help. Conclusions: Open access may fit better with patients' self-management of their condition and everyday routines, roles and responsibilities. Ensuring that outpatient organisational arrangements and personnel are responsive to patient initiated requests for appointments is likely to impact on the acceptability of this type of access arrangement. Some people may continue to prefer the fixed appointment system which should be retained if patient choice is to be respected. PMID:15465941
Designing of smart home automation system based on Raspberry Pi
NASA Astrophysics Data System (ADS)
Saini, Ravi Prakash; Singh, Bhanu Pratap; Sharma, Mahesh Kumar; Wattanawisuth, Nattapol; Leeprechanon, Nopbhorn
2016-03-01
Locally networked or remotely controlled home automation system becomes a popular paradigm because of the numerous advantages and is suitable for academic research. This paper proposes a method for an implementation of Raspberry Pi based home automation system presented with an android phone access interface. The power consumption profile across the connected load is measured accurately through programming. Users can access the graph of total power consumption with respect to time worldwide using their Dropbox account. An android application has been developed to channelize the monitoring and controlling operation of home appliances remotely. This application facilitates controlling of operating pins of Raspberry Pi by pressing the corresponding key for turning "on" and "off" of any desired appliance. Systems can range from the simple room lighting control to smart microcontroller based hybrid systems incorporating several other additional features. Smart home automation systems are being adopted to achieve flexibility, scalability, security in the sense of data protection through the cloud-based data storage protocol, reliability, energy efficiency, etc.
Designing of smart home automation system based on Raspberry Pi
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saini, Ravi Prakash; Singh, Bhanu Pratap; Sharma, Mahesh Kumar
Locally networked or remotely controlled home automation system becomes a popular paradigm because of the numerous advantages and is suitable for academic research. This paper proposes a method for an implementation of Raspberry Pi based home automation system presented with an android phone access interface. The power consumption profile across the connected load is measured accurately through programming. Users can access the graph of total power consumption with respect to time worldwide using their Dropbox account. An android application has been developed to channelize the monitoring and controlling operation of home appliances remotely. This application facilitates controlling of operating pinsmore » of Raspberry Pi by pressing the corresponding key for turning “on” and “off” of any desired appliance. Systems can range from the simple room lighting control to smart microcontroller based hybrid systems incorporating several other additional features. Smart home automation systems are being adopted to achieve flexibility, scalability, security in the sense of data protection through the cloud-based data storage protocol, reliability, energy efficiency, etc.« less
Step 1: Human System Integration Simulation and Flight Test Progress Report
NASA Technical Reports Server (NTRS)
2005-01-01
The Access 5 Human Systems Integration Work Package produced simulation and flight demonstration planning products for use throughout the program. These included: Test Objectives for Command, Control, Communications; Pilot Questionnaire for Command, Control, Communications; Air Traffic Controller Questionnaire for Command, Control, Communications; Test Objectives for Collision Avoidance; Pilot Questionnaire for Collision Avoidance; Plans for Unmanned Aircraft Systems Control Station Simulations Flight Requirements for the Airspace Operations Demonstration
47 CFR 90.475 - Operation of internal transmitter control systems in specially equipped systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... systems involving fixed systems whose base stations are controlled by such systems may automatically access these base stations through the microwave or operational fixed systems from positions in the PSTN, so long as the base stations and mobile units meet the requirements of § 90.483 and if a separate...
ERIC Educational Resources Information Center
Ya-chun, Lian
An automated minicomputer-based library management system is being developed at the Swedish Royal Institute of Technology Library (RITL). RAMAS (the RITL Automated Management System) currently deals with periodical check-in, claiming, index-handling, and binding control. A RAMAS bibliographic record can be accessed from eight different points…
RBAC-Matrix-based EMR right management system to improve HIPAA compliance.
Lee, Hung-Chang; Chang, Shih-Hsin
2012-10-01
Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.
Efficient accesses of data structures using processing near memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jayasena, Nuwan S.; Zhang, Dong Ping; Diez, Paula Aguilera
Systems, apparatuses, and methods for implementing efficient queues and other data structures. A queue may be shared among multiple processors and/or threads without using explicit software atomic instructions to coordinate access to the queue. System software may allocate an atomic queue and corresponding queue metadata in system memory and return, to the requesting thread, a handle referencing the queue metadata. Any number of threads may utilize the handle for accessing the atomic queue. The logic for ensuring the atomicity of accesses to the atomic queue may reside in a management unit in the memory controller coupled to the memory wheremore » the atomic queue is allocated.« less
McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng
2013-01-01
Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580
Operating systems. [of computers
NASA Technical Reports Server (NTRS)
Denning, P. J.; Brown, R. L.
1984-01-01
A counter operating system creates a hierarchy of levels of abstraction, so that at a given level all details concerning lower levels can be ignored. This hierarchical structure separates functions according to their complexity, characteristic time scale, and level of abstraction. The lowest levels include the system's hardware; concepts associated explicitly with the coordination of multiple tasks appear at intermediate levels, which conduct 'primitive processes'. Software semaphore is the mechanism controlling primitive processes that must be synchronized. At higher levels lie, in rising order, the access to the secondary storage devices of a particular machine, a 'virtual memory' scheme for managing the main and secondary memories, communication between processes by way of a mechanism called a 'pipe', access to external input and output devices, and a hierarchy of directories cataloguing the hardware and software objects to which access must be controlled.
Code of Federal Regulations, 2013 CFR
2013-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
Code of Federal Regulations, 2014 CFR
2014-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
Code of Federal Regulations, 2012 CFR
2012-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
SAFE: SPARQL Federation over RDF Data Cubes with Access Control.
Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh
2017-02-01
Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as well as legacy linked datasets. We show that SAFE enables granular graph-level access control over distributed clinical RDF data cubes and efficiently reduces the source selection and overall query execution time when compared with general-purpose SPARQL query federation engines in the targeted setting.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-01-01
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Programmable Direct-Memory-Access Controller
NASA Technical Reports Server (NTRS)
Hendry, David F.
1990-01-01
Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.
Spatiotemporal access model based on reputation for the sensing layer of the IoT.
Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.
76 FR 82079 - AP1000 Design Certification Amendment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-30
... reference Revision 15 of the design control document (DCD) (ADAMS Accession No. ML053460400), which... to DAC in the areas of piping design (Chapter 3), instrumentation and control (I&C) systems (Chapter... Systems Manual, as described in the AP1000 Design Control Document, Revision 17, meets the criteria of...
75 FR 24928 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
... reportable suicide and self-harm behaviors will exist as a de-identified control group, and are not... reportable suicide and self-harm behaviors will exist as a control group. Records are integrated from... periodically. Control group data is not retrievable. All personnel with authorized access to the system must...
A CDMA system implementation with dimming control for visible light communication
NASA Astrophysics Data System (ADS)
Chen, Danyang; Wang, Jianping; Jin, Jianli; Lu, Huimin; Feng, Lifang
2018-04-01
Visible light communication (VLC), using solid-state lightings to transmit information, has become a complement technology to wireless radio communication. As a realistic multiple access scheme for VLC system, code division multiple access (CDMA) has attracted more and more attentions in recent years. In this paper, we address and implement an improved CDMA scheme for VLC system. The simulation results reveal that the improved CDMA scheme not only supports multi-users' transmission but also maintains dimming value at about 50% and enhances the system efficiency. It can also realize the flexible dimming control by adjusting some parameters of system structure, which rarely affects the system BER performance. A real-time experimental VLC system with improved CDMA scheme is performed based on field programmable gate array (FPGA), reaching a good BER performance.
76 FR 54190 - Proposed Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-31
... decentralized, with each mission area and agency managing its respective FOIA programs. At the end of each year...-know basis. Role-based access controls are used, and FX is only accessible via the Internet using USDA...
Systems and methods for dismantling a nuclear reactor
Heim, Robert R; Adams, Scott Ryan; Cole, Matthew Denver; Kirby, William E; Linnebur, Paul Damon
2014-10-28
Systems and methods for dismantling a nuclear reactor are described. In one aspect the system includes a remotely controlled heavy manipulator ("manipulator") operatively coupled to a support structure, and a control station in a non-contaminated portion of a workspace. The support structure provides the manipulator with top down access into a bioshield of a nuclear reactor. At least one computing device in the control station provides remote control to perform operations including: (a) dismantling, using the manipulator, a graphite moderator, concrete walls, and a ceiling of the bioshield, the manipulator being provided with automated access to all internal portions of the bioshield; (b) loading, using the manipulator, contaminated graphite blocks from the graphite core and other components from the bioshield into one or more waste containers; and (c) dispersing, using the manipulator, dust suppression and contamination fixing spray to contaminated matter.
2012-01-19
time , i.e., the state of the system is the input delayed by one time unit. In contrast with classical approaches, here the control action must be a...Transactions on Automatic Control , Vol. 56, No. 9, September 2011, Pages 2013-2025 Consider a first order linear time -invariant discrete time system driven by...1, January 2010, Pages 175-179 Consider a discrete- time networked control system , in which the controller has direct access to noisy
Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck
NASA Astrophysics Data System (ADS)
Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.
2013-12-01
Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.
Cost comparison of competing local distribution systems for communication satellite traffic
NASA Technical Reports Server (NTRS)
Dopfel, F. E.
1979-01-01
The boundaries of market areas which favor various means for distributing communications satellite traffic are considered. The distribution methods considered are: control Earth station with cable access, rooftop Earth stations, Earth station with radio access, and various combinations of these methods. The least cost system for a hypothetical region described by number of users and the average cable access mileage is discussed. The region is characterized by a function which expresses the distribution of users. The results indicate that the least cost distribution is central Earth station with cable access for medium to high density areas of a region combined with rooftop Earth stations or (for higher volumes) radio access for remote users.
Design analysis tracking and data relay satellite simulation system
NASA Technical Reports Server (NTRS)
1974-01-01
The design and development of the equipment necessary to simulate the S-band multiple access link between user spacecraft, the Tracking and Data Relay Satellite, and a ground control terminal are discussed. The core of the S-band multiple access concept is the use of an Adaptive Ground Implemented Phased Array. The array contains thirty channels and provides the multiplexing and demultiplexing equipment required to demonstrate the ground implemented beam forming feature. The system provided will make it possible to demonstrate the performance of a desired user and ten interfering sources attempting to pass data through the multiple access system.
Real-time pair-feeding of animals
NASA Technical Reports Server (NTRS)
Leon, H. A.; Connolly, J. P.; Hitchman, M. J.; Humbert, J. E.
1972-01-01
Automatic pair-feeding system was developed which immediately dispenses same amount of food to control animal as has been consumed by experimental animal that has free access to food. System consists of: master feeding system; slave feeding station; and control mechanism. Technique performs real time pair-feeding without attendant time lag.
New ergonomic headset for Tongue-Drive System with wireless smartphone interface.
Park, Hangue; Kim, Jeonghee; Huo, Xueliang; Hwang, In-O; Ghovanloo, Maysam
2011-01-01
Tongue Drive System (TDS) is a wireless tongue-operated assistive technology (AT), developed for people with severe physical disabilities to control their environment using their tongue motion. We have developed a new ergonomic headset for the TDS with a user-friendly smartphone interface, through which users will be able to wirelessly control various devices, access computers, and drive wheelchairs. This headset design is expected to act as a flexible and multifunctional communication interface for the TDS and improve its usability, accessibility, aesthetics, and convenience for the end users.
A development framework for artificial intelligence based distributed operations support systems
NASA Technical Reports Server (NTRS)
Adler, Richard M.; Cottman, Bruce H.
1990-01-01
Advanced automation is required to reduce costly human operations support requirements for complex space-based and ground control systems. Existing knowledge based technologies have been used successfully to automate individual operations tasks. Considerably less progress has been made in integrating and coordinating multiple operations applications for unified intelligent support systems. To fill this gap, SOCIAL, a tool set for developing Distributed Artificial Intelligence (DAI) systems is being constructed. SOCIAL consists of three primary language based components defining: models of interprocess communication across heterogeneous platforms; models for interprocess coordination, concurrency control, and fault management; and for accessing heterogeneous information resources. DAI applications subsystems, either new or existing, will access these distributed services non-intrusively, via high-level message-based protocols. SOCIAL will reduce the complexity of distributed communications, control, and integration, enabling developers to concentrate on the design and functionality of the target DAI system itself.
Advanced systems engineering and network planning support
NASA Technical Reports Server (NTRS)
Walters, David H.; Barrett, Larry K.; Boyd, Ronald; Bazaj, Suresh; Mitchell, Lionel; Brosi, Fred
1990-01-01
The objective of this task was to take a fresh look at the NASA Space Network Control (SNC) element for the Advanced Tracking and Data Relay Satellite System (ATDRSS) such that it can be made more efficient and responsive to the user by introducing new concepts and technologies appropriate for the 1997 timeframe. In particular, it was desired to investigate the technologies and concepts employed in similar systems that may be applicable to the SNC. The recommendations resulting from this study include resource partitioning, on-line access to subsets of the SN schedule, fluid scheduling, increased use of demand access on the MA service, automating Inter-System Control functions using monitor by exception, increase automation for distributed data management and distributed work management, viewing SN operational control in terms of the OSI Management framework, and the introduction of automated interface management.
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
NASA Astrophysics Data System (ADS)
Sánchez-Artigas, Marc; García-López, Pedro
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade
NASA Astrophysics Data System (ADS)
Graça, S.; Santos, J.; Manso, M. E.
2004-10-01
The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
Passive serialization in a multitasking environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hennessey, J.P.; Osisek, D.L.; Seigh, J.W. II
1989-02-28
In a multiprocessing system having a control program in which data objects are shared among processes, this patent describes a method for serializing references to a data object by the processes so as to prevent invalid references to the data object by any process when an operation requiring exclusive access is performed by another process, comprising the steps of: permitting the processes to reference data objects on a shared access basis without obtaining a shared lock; monitoring a point of execution of the control program which is common to all processes in the system, which occurs regularly in the process'more » execution and across which no references to any data object can be maintained by any process, except references using locks; establishing a system reference point which occurs after each process in the system has passed the point of execution at least once since the last such system reference point; requesting an operation requiring exclusive access on a selected data object; preventing subsequent references by other processes to the selected data object; waiting until two of the system references points have occurred; and then performing the requested operation.« less
RFID - based Staff Control System (SCS) in Kazakhstan
NASA Astrophysics Data System (ADS)
Saparkhojayev, N.
2015-06-01
RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.
Deladoëy, Johnny; Henderson, Mélanie; Geoffroy, Louis
2013-05-01
In health care systems with a user fee, the impact of socioeconomic factors on pediatric insulin-dependent diabetes mellitus (IDDM) control could be due to the cost of accessing care. There is a linear association between household income and the average glycosylated hemoglobin (HbA1c) of children and adolescents with IDDM despite free access to health care. We used a linear regression model to examine the association between normalized average HbA1c of 1766 diabetic children (diagnosed at our institution from 1980 to 2011 before 17 years of age) and the median household income of their neighborhoods (obtained from Statistics Canada, 2006 Census data). We found a negative linear association (P < .001; r = -0.2) between the level of income and metabolic control assessed by HbA1c after controlling for sex, age at diagnosis, duration of diabetes, ethnicity, geographical factors, frequency of visits, current age (as a proxy for change in practice over time), and change of measurement methods of HbA1c across time. For every increase of $15,000 in annual income, HbA1c decreased by 0.1%. We report a linear association of household income with metabolic control of IDDM in childhood. Given that Canada has a system of free universal access to health care, confounding by access to care is unlikely. Considering the impact of poorly controlled IDDM in childhood on the development of long-term complications, our findings suggest that the higher complication rate found in adults of low socioeconomic status might originate from the poor control that they experienced in childhood. Support for the care of IDDM children from low-income neighborhoods should be increased.
Integration of LDSE and LTVS logs with HIPAA compliant auditing system (HCAS)
NASA Astrophysics Data System (ADS)
Zhou, Zheng; Liu, Brent J.; Huang, H. K.; Guo, Bing; Documet, Jorge; King, Nelson
2006-03-01
The deadline of HIPAA (Health Insurance Portability and Accountability Act) Security Rules has passed on February 2005; therefore being HIPAA compliant becomes extremely critical to healthcare providers. HIPAA mandates healthcare providers to protect the privacy and integrity of the health data and have the ability to demonstrate examples of mechanisms that can be used to accomplish this task. It is also required that a healthcare institution must be able to provide audit trails on image data access on demand for a specific patient. For these reasons, we have developed a HIPAA compliant auditing system (HCAS) for image data security in a PACS by auditing every image data access. The HCAS was presented in 2005 SPIE. This year, two new components, LDSE (Lossless Digital Signature Embedding) and LTVS (Patient Location Tracking and Verification System) logs, have been added to the HCAS. The LDSE can assure medical image integrity in a PACS, while the LTVS can provide access control for a PACS by creating a security zone in the clinical environment. By integrating the LDSE and LTVS logs with the HCAS, the privacy and integrity of image data can be audited as well. Thus, a PACS with the HCAS installed can become HIPAA compliant in image data privacy and integrity, access control, and audit control.
Research in Computer Forensics
2002-06-01
systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to
An SSH key management system: easing the pain of managing key/user/account associations
NASA Astrophysics Data System (ADS)
Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.
2008-07-01
Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.
NASA Technical Reports Server (NTRS)
2001-01-01
REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.
ERIC Educational Resources Information Center
Kim, Paul; Olaciregui, Claudia
2008-01-01
An electronic portfolio system, designed to serve as a resource-based learning space, was tested in a fifth-grade science class. The control-group students accessed a traditional folder-based information display in the system and the experimental-group students accessed a concept map-based information display to review a science portfolio. The…
Windows NT Attacks for the Evaluation of Intrusion Detection Systems
2000-06-01
their passwords never expire. Their privileges allow telnet access and FTP access to the system, but do not allow local logins . Each user can...default: • Administrator: This root account allows remote and local logins and full control of system software. • Guest: This default account, setup by...realizing that the Netbus server was installed. The attack also edits the Windows NT Registry so the Netbus server restarts at every login . This
Clustering execution in a processing system to increase power savings
Bose, Pradip; Buyuktosunoglu, Alper; Jacobson, Hans M.; Vega, Augusto J.
2018-03-20
Embodiments relate to clustering execution in a processing system. An aspect includes accessing a control flow graph that defines a data dependency and an execution sequence of a plurality of tasks of an application that executes on a plurality of system components. The execution sequence of the tasks in the control flow graph is modified as a clustered control flow graph that clusters active and idle phases of a system component while maintaining the data dependency. The clustered control flow graph is sent to an operating system, where the operating system utilizes the clustered control flow graph for scheduling the tasks.
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Accounting and Information Management Div.
This report presents an evaluation of the general controls over the Federal Family Education Loan Program (FFELP) information system maintained and operated by a contractor for the U.S. Department of Education (ED), which administers FFELP. The evaluation found that ED's general controls over the FFELP information system did not adequately protect…
2011-06-01
event simulation is used to model three alternatives to the ECP system. The baseline system which contains two manned kiosks, a fully automated system...experience is traffic delays in the morning for government employees accessing the bases. If one or two lanes were dedicated to 3 completely or even semi...purpose of clarity, the figure below displays only the two lowest levels of functions. This final functional decomposition identifies the sub functions
Propulsive Reaction Control System Model
NASA Technical Reports Server (NTRS)
Brugarolas, Paul; Phan, Linh H.; Serricchio, Frederick; San Martin, Alejandro M.
2011-01-01
This software models a propulsive reaction control system (RCS) for guidance, navigation, and control simulation purposes. The model includes the drive electronics, the electromechanical valve dynamics, the combustion dynamics, and thrust. This innovation follows the Mars Science Laboratory entry reaction control system design, and has been created to meet the Mars Science Laboratory (MSL) entry, descent, and landing simulation needs. It has been built to be plug-and-play on multiple MSL testbeds [analysis, Monte Carlo, flight software development, hardware-in-the-loop, and ATLO (assembly, test and launch operations) testbeds]. This RCS model is a C language program. It contains two main functions: the RCS electronics model function that models the RCS FPGA (field-programmable-gate-array) processing and commanding of the RCS valve, and the RCS dynamic model function that models the valve and combustion dynamics. In addition, this software provides support functions to initialize the model states, set parameters, access model telemetry, and access calculated thruster forces.
Arrays of individually controlled ions suitable for two-dimensional quantum simulations
Mielenz, Manuel; Kalis, Henning; Wittemer, Matthias; Hakelberg, Frederick; Warring, Ulrich; Schmied, Roman; Blain, Matthew; Maunz, Peter; Moehring, David L.; Leibfried, Dietrich; Schaetz, Tobias
2016-01-01
A precisely controlled quantum system may reveal a fundamental understanding of another, less accessible system of interest. A universal quantum computer is currently out of reach, but an analogue quantum simulator that makes relevant observables, interactions and states of a quantum model accessible could permit insight into complex dynamics. Several platforms have been suggested and proof-of-principle experiments have been conducted. Here, we operate two-dimensional arrays of three trapped ions in individually controlled harmonic wells forming equilateral triangles with side lengths 40 and 80 μm. In our approach, which is scalable to arbitrary two-dimensional lattices, we demonstrate individual control of the electronic and motional degrees of freedom, preparation of a fiducial initial state with ion motion close to the ground state, as well as a tuning of couplings between ions within experimental sequences. Our work paves the way towards a quantum simulator of two-dimensional systems designed at will. PMID:27291425
Financial management systems under decentralization and their effect on malaria control in Uganda.
Kivumbi, George W; Nangendo, Florence; Ndyabahika, Boniface Rutagira
2004-01-01
A descriptive case study with multiple sites and a single level of analysis was carried out in four purposefully selected administrative districts of Uganda to investigate the effect of financial management systems under decentralization on malaria control. Data were primarily collected from 36 interviews with district managers, staff at health units and local leaders. A review of records and documents related to decentralization at the central and district level was also used to generate data for the study. We found that a long, tedious, and bureaucratic process combined with lack of knowledge in working with new financial systems by several actors characterized financial flow under decentralization. This affected the timely use of financial resources for malaria control in that there were funds in the system that could not be accessed for use. We were also told that sometimes these funds were returned to the central government because of non-use due to difficulties in accessing them and/or stringent conditions not to divert them to other uses. Our data showed that a cocktail of bureaucratic control systems, corruption and incompetence make the financial management system under decentralization counter-productive for malaria control. The main conclusion is that good governance through appropriate and efficient financial management systems is very important for effective malaria control under decentralization.
Health information security: a case study of three selected medical centers in iran.
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-03-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.
KAPSE (Kernel ADA Programming Support Environment) Interface Team Public Report. Volume 5.
1985-08-01
Computer Nons , April 1964. e The K Ma policy statent mde the Language Control Fcility Newsletter for the Ada Jovial Wmkng Group. e There will be a CRIS...cre-ed, the initial access control inA-mIion my be splied by the ACCSS parmeter. If non -nll, this parumter speci fi the initia access tolicontr olti...assigned, or controlled by the operating system to &,.sure consistent and non -conflicting usage by programs under execution. Examples of resources
Deji, Shizuhiko; Ito, Shigeki; Ariga, Eiji; Mori, Kazuyuki; Hirota, Masahiro; Saze, Takuya; Nishizawa, Kunihide
2006-08-01
High frequency electromagnetic fields in the 120 kHz band emitted from card readers for access control systems in radiation control areas cause abnormally high and erroneous indicated dose readings on semiconductor-type electronic personal dosimeters (SEPDs). All SEPDs malfunctioned but recovered their normal performance by resetting after the exposure ceased. The minimum distances required to prevent electromagnetic interference varied from 5.0 to 38.0 cm. The electric and magnetic immunity levels ranged from 35.1 to 267.6 V m(-1) and from 1.0 to 16.6 A m(-1), respectively. Electromagnetic immunity levels of SEPDs should be strengthened from the standpoint of radiation protection.
Off-the-shelf Control of Data Analysis Software
NASA Astrophysics Data System (ADS)
Wampler, S.
The Gemini Project must provide convenient access to data analysis facilities to a wide user community. The international nature of this community makes the selection of data analysis software particularly interesting, with staunch advocates of systems such as ADAM and IRAF among the users. Additionally, the continuing trends towards increased use of networked systems and distributed processing impose additional complexity. To meet these needs, the Gemini Project is proposing the novel approach of using low-cost, off-the-shelf software to abstract out both the control and distribution of data analysis from the functionality of the data analysis software. For example, the orthogonal nature of control versus function means that users might select analysis routines from both ADAM and IRAF as appropriate, distributing these routines across a network of machines. It is the belief of the Gemini Project that this approach results in a system that is highly flexible, maintainable, and inexpensive to develop. The Khoros visualization system is presented as an example of control software that is currently available for providing the control and distribution within a data analysis system. The visual programming environment provided with Khoros is also discussed as a means to providing convenient access to this control.
Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT
Guo, Yunchuan; Yin, Lihua; Li, Chao
2014-01-01
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731
ERIC Educational Resources Information Center
Bolch, Matt
2009-01-01
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Authomatization of Digital Collection Access Using Mobile and Wireless Data Terminals
NASA Astrophysics Data System (ADS)
Leontiev, I. V.
Information technologies become vital due to information processing needs, database access, data analysis and decision support. Currently, a lot of scientific projects are oriented on database integration of heterogeneous systems. The problem of on-line and rapid access to large integrated systems of digital collections is also very important. Usually users move between different locations, either at work or at home. In most cases users need an efficient and remote access to information, stored in integrated data collections. Desktop computers are unable to fulfill the needs, so mobile and wireless devices become helpful. Handhelds and data terminals are nessessary in medical assistance (they store detailed information about each patient, and helpful for nurses), immediate access to data collections is used in a Highway patrol services (databanks of cars, owners, driver licences). Using mobile access, warehouse operations can be validated. Library and museum items cyclecounting will speed up using online barcode-scanning and central database access. That's why mobile devices - cell phones, PDA, handheld computers with wireless access, WindowsCE and PalmOS terminals become popular. Generally, mobile devices have a relatively slow processor, and limited display capabilities, but they are effective for storing and displaying textual data, recognize user hand-writing with stylus, support GUI. Users can perform operations on handheld terminal, and exchange data with the main system (using immediate radio access, or offline access during syncronization process) for update. In our report, we give an approach for mobile access to data collections, which raises an efficiency of data processing in a book library, helps to control available books, books in stock, validate service charges, eliminate staff mistakes, generate requests for book delivery. Our system uses mobile devices Symbol RF (with radio-channel access), and data terminals Symbol Palm Terminal for batch-processing and synchronization with remote library databases. We discuss the use of PalmOS-compatible devices, and WindowsCE terminals. Our software system is based on modular, scalable three-tier architecture. Additional functionality can be easily customized. Scalability is also supplied by Internet / Intranet technologies, and radio-access points. The base module of the system supports generic warehouse operations: cyclecounting with handheld barcode-scanners, efficient items delivery and issue, item movement, reserving, report generating on finished and in-process operations. Movements are optimized using worker's current location, operations are sorted in a priority order and transmitted to mobile and wireless worker's terminals. Mobile terminals improve of tasks processing control, eliminate staff mistakes, display actual information about main processes, provide data for online-reports, and significantly raise the efficiency of data exchange.
32 CFR 2001.45 - Information controls.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Information controls. 2001.45 Section 2001.45....45 Information controls. (a) General. Agency heads shall establish a system of control measures which assure that access to classified information is provided to authorized persons. The control measures...
32 CFR 2001.45 - Information controls.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Information controls. 2001.45 Section 2001.45....45 Information controls. (a) General. Agency heads shall establish a system of control measures which assure that access to classified information is provided to authorized persons. The control measures...
32 CFR 2001.45 - Information controls.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Information controls. 2001.45 Section 2001.45....45 Information controls. (a) General. Agency heads shall establish a system of control measures which assure that access to classified information is provided to authorized persons. The control measures...
Application of total distributed control system in car-body inspection
NASA Astrophysics Data System (ADS)
Yang, Xueyou; Ren, Dahai; Wang, Zhong; Ye, Shenghua; Lu, Hongbo; Duan, Jilin
1996-08-01
An application of distributed control system in Autocar-body Visual Inspection Station is presented in the paper, a distributed control system using PC as the host processor and single-chip microcomputer as the slave controller is proposed. In this paper, the physical interface of the control network and the relevant hardware are introduced. Meanwhile, a minute research on data communication is performed, relevant protocols on data framing, instruction codes and channel access methods have been laid down and part of related software is presented.
Rosenheck, R; Morrissey, J; Lam, J; Calloway, M; Johnsen, M; Goldman, H; Randolph, F; Blasinsky, M; Fontana, A; Calsyn, R; Teague, G
1998-11-01
This study evaluated the hypothesis that greater integration and coordination between agencies within service systems is associated with greater accessibility of services and improved client housing outcomes. As part of the Access to Community Care and Effective Services and Supports program, data were obtained on baseline client characteristics, service use, and 3-month and 12-month outcomes from 1832 clients seen at 18 sites during the first year of program operation. Data on interorganizational relationships were obtained from structured interviews with key informants from relevant organizations in each community (n = 32-82 at each site). Complete follow-up data were obtained from 1340 clients (73%). After control for baseline characteristics, service system integration was associated with superior housing outcomes at 12 months, and this relationship was mediated through greater access to housing agencies. Service system integration is related to improved access to housing services and better housing outcomes among homeless people with mental illness.
Secure access control and large scale robust representation for online multimedia event detection.
Liu, Changyu; Lu, Bin; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.
Fine-Grained Access Control for Electronic Health Record Systems
NASA Astrophysics Data System (ADS)
Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh
There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.
Essential Medicines: An Indian Perspective
Maiti, Rituparna; Bhatia, Vikas; Padhy, Biswa Mohan; Hota, Debasish
2015-01-01
The concept of defining essential medicines and establishing a list of them was aimed to improve the availability of affordable medicines for the world's poor. Access to essential medicines is a major determinant of health outcomes. Several countries have made substantial progress towards increasing access to essential medicines, but access to essential medicines in developing countries like India is not adequate. In this review we have tried to present the Indian scenario in respect to availability and accessibility of essential medicines over last one decade. To enhance the credibility of Indian healthcare system, procurement and delivery systems of essential medicines have to be strengthened through government commitment, careful selection, adequate public sector financing, efficient distribution systems, control on taxes and duties, and inculcating a culture of rational use of medicines in current and future prescribers. PMID:26435594
Integration of the Peruvian Air Force Information Systems through an Integrated LAN/WAN
1991-03-01
telecommunication systems are virtually indistinguishable from computer systems. These two technologies meet to work together. 3. Types of Telecommunications...information are virtually out of control. What limits on access exist tend to be the result of habit and tradition, as well as of the sheer difficulty...organization cannot be related to one another, it is virtually impossible for information to be shared or accessed in a timely manner. D. PZRUVIAN AIR FORCE
An Artificial Neural Network Control System for Spacecraft Attitude Stabilization
1990-06-01
NAVAL POSTGRADUATE SCHOOL Monterey, California ’-DTIC 0 ELECT f NMARO 5 191 N S, U, THESIS B . AN ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR...NO. NO. NO ACCESSION NO 11. TITLE (Include Security Classification) AN ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR SPACECRAFT ATTITUDE STABILIZATION...obsolete a U.S. G v pi.. iim n P.. oiice! toog-eo.5s43 i Approved for public release; distribution is unlimited. AN ARTIFICIAL NEURAL NETWORK CONTROL
Accessibility Is the Mother of Invention: When It Comes to an Innovative Hand Control System
ERIC Educational Resources Information Center
Exceptional Parent, 2007
2007-01-01
This article features Sure Grip hand control, an innovative hand control system created by Keith Howell, the President and founder of Howell Ventures LTD. Howell was in his early teens when he experienced an accident that resulted in his quadriplegia. From that point on, Howell set about to manufacture a set of controls that would emulate the…
The evolution of the ISOLDE control system
NASA Astrophysics Data System (ADS)
Jonsson, O. C.; Catherall, R.; Deloose, I.; Drumm, P.; Evensen, A. H. M.; Gase, K.; Focker, G. J.; Fowler, A.; Kugler, E.; Lettry, J.; Olesen, G.; Ravn, H. L.; Isolde Collaboration
The ISOLDE on-line mass separator facility is operating on a Personal Computer based control system since spring 1992. Front End Computers accessing the hardware are controlled from consoles running Microsoft Windows ™ through a Novell NetWare4 ™ local area network. The control system is transparently integrated in the CERN wide office network and makes heavy use of the CERN standard office application programs to control and to document the running of the ISOLDE isotope separators. This paper recalls the architecture of the control system, shows its recent developments and gives some examples of its graphical user interface.
The evolution of the ISOLDE control system
NASA Astrophysics Data System (ADS)
Jonsson, O. C.; Catherall, R.; Deloose, I.; Evensen, A. H. M.; Gase, K.; Focker, G. J.; Fowler, A.; Kugler, E.; Lettry, J.; Olesen, G.; Ravn, H. L.; Drumm, P.
1996-04-01
The ISOLDE on-line mass separator facility is operating on a Personal Computer based control system since spring 1992. Front End Computers accessing the hardware are controlled from consoles running Microsoft Windows® through a Novell NetWare4® local area network. The control system is transparently integrated in the CERN wide office network and makes heavy use of the CERN standard office application programs to control and to document the running of the ISOLDE isotope separators. This paper recalls the architecture of the control system, shows its recent developments and gives some examples of its graphical user interface.
Current Hale ROA Voice and Control Communication Practices and Performance: White Paper
NASA Technical Reports Server (NTRS)
2007-01-01
The objective of this white paper is to help achieve the ACCESS 5 goal by sharing the UNITE members knowledge of current HALE ROA communication systems with other ACCESS 5 participants so that all interested parties start from a common understanding as we begin the clarification of requirements for voice and C2 communication. This white paper is also intended to describe the point of departure for any future developments that need to be realized to achieve the long term ACCESS 5 goal. Although this white paper describes the current systems, the functional and performance requirements that are also being developed under ACCESS 5 may not require the same levels of functionality and performance as currently exist. The paper addresses the following: 1) A description of a typical current HALE ROA communications system, 2) HALE ROA communications systems performance metrics, 3) HALE ROA communications systems performance, and 5) A comparison of current HALE ROA communications systems with current regulations.
2014-05-01
The basic systems of any society rarely can operate independently. Instead, they are dependent and often interdependent upon other entities. Such entities control the resources within their respective systems. Thus, coordination and control agencies require contracts or memoranda of understanding with these entities in order to assure access to the resources required during a crisis. These administrative structures include: (1) governmental institutions and agencies, including the military; (2) intergovernmental organisations; (3) nongovernmental organisations; (4) commercial private sector organisations; and (5) academic institutions. These dependencies create potential barriers to the provision of coordination and control including: (1) the complexity of the administrative structures with which coordination and control must interact; (2) the location of resources; (3) finding responsible person(s); (4) the competence and compatibility; (5) methods of access; (6) payment; (7) contracts and memoranda of understanding; (8) inventories of accessible resources; (9) competition for the mandate, power, and resources; and (10) jealousy. The need for potential interactions between administrative structures requires that agreements for the sharing of resources during crises be reached as part of planning and preparedness. Gaining an understanding of these relationships is an important area for research.
Innovative Airbreathing Propulsion Concepts for Access to Space
NASA Technical Reports Server (NTRS)
Whitlow, Jr., Woodrow; Blech, Richard A.; Blankson, Isaiah M.
2001-01-01
This paper will present technologies and concepts for novel aeropropulsion systems. These technologies will enhance the safety of operations, reduce life cycle costs, and contribute to reduced costs of air travel and access to space. One of the goals of the NASA program is to reduce the carbon-dioxide emissions of aircraft engines. Engine concepts that use highly efficient fuel cell/electric drive technologies in hydrogen-fueled engines will be presented in the proposed paper. Carbon-dioxide emissions will be eliminated by replacing hydrocarbon fuel with hydrogen, and reduce NOx emissions through better combustion process control. A revolutionary exoskeletal engine concept, in which the engine drum is rotated, will be shown. This concept has the potential to allow a propulsion system that can be used for subsonic through hypersonic flight. Dual fan concepts that have ultra-high bypass ratios, low noise, and low drag will be presented. Flow-controlled turbofans and control-configured turbofans also will be discussed. To increase efficiency, a system of microengines distributed along lifting surfaces and on the fuselage is being investigated. This concept will be presented in the paper. Small propulsion systems for affordable, safe personal transportation vehicles will be discussed. These low-oil/oilless systems use technologies that enable significant cost and weight reductions. Pulse detonation engine-based hybrid-cycle and combined-cycle propulsion systems for aviation and space access will be presented.
The EPICS-based remote control system for muon beam line devices at J-PARC MUSE
NASA Astrophysics Data System (ADS)
Ito, T. U.; Nakahara, K.; Kawase, M.; Fujimori, H.; Kobayashi, Y.; Higemoto, W.; Miyake, Y.
2010-04-01
The remote control system for muon beam line devices of J-PARC MUSE has been developed with the Experimental Physics and Industrial Control System (EPICS). The EPICS input/output controller was installed in standard Linux PCs for slow control of the devices. Power supplies for 21 magnetic elements and four slit controllers for the decay-surface muon beam line in the Materials and Life Science Experimental Facility are now accessible via Ethernet from a graphical user interface which has been composed using the Motif Editor and Display Manger.
NASA Astrophysics Data System (ADS)
Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko
We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.
Blaya, Joaquín A; Shin, Sonya; Contreras, Carmen; Yale, Gloria; Suarez, Carmen; Asencios, Luis; Kim, Jihoon; Rodriguez, Pablo; Cegielski, Peter; Fraser, Hamish S F
2011-01-01
To evaluate the time to communicate laboratory results to health centers (HCs) between the e-Chasqui web-based information system and the pre-existing paper-based system. Cluster randomized controlled trial in 78 HCs in Peru. In the intervention group, 12 HCs had web access to results via e-Chasqui (point-of-care HCs) and forwarded results to 17 peripheral HCs. In the control group, 22 point-of-care HCs received paper results directly and forwarded them to 27 peripheral HCs. Baseline data were collected for 15 months. Post-randomization data were collected for at least 2 years. Comparisons were made between intervention and control groups, stratified by point-of-care versus peripheral HCs. For point-of-care HCs, the intervention group took less time to receive drug susceptibility tests (DSTs) (median 9 vs 16 days, p<0.001) and culture results (4 vs 8 days, p<0.001) and had a lower proportion of 'late' DSTs taking >60 days to arrive (p<0.001) than the control. For peripheral HCs, the intervention group had similar communication times for DST (median 22 vs 19 days, p=0.30) and culture (10 vs 9 days, p=0.10) results, as well as proportion of 'late' DSTs (p=0.57) compared with the control. Only point-of-care HCs with direct access to the e-Chasqui information system had reduced communication times and fewer results with delays of >2 months. Peripheral HCs had no benefits from the system. This suggests that health establishments should have point-of-care access to reap the benefits of electronic laboratory reporting.
Shin, Sonya; Contreras, Carmen; Yale, Gloria; Suarez, Carmen; Asencios, Luis; Kim, Jihoon; Rodriguez, Pablo; Cegielski, Peter; Fraser, Hamish S F
2010-01-01
Objective To evaluate the time to communicate laboratory results to health centers (HCs) between the e-Chasqui web-based information system and the pre-existing paper-based system. Methods Cluster randomized controlled trial in 78 HCs in Peru. In the intervention group, 12 HCs had web access to results via e-Chasqui (point-of-care HCs) and forwarded results to 17 peripheral HCs. In the control group, 22 point-of-care HCs received paper results directly and forwarded them to 27 peripheral HCs. Baseline data were collected for 15 months. Post-randomization data were collected for at least 2 years. Comparisons were made between intervention and control groups, stratified by point-of-care versus peripheral HCs. Results For point-of-care HCs, the intervention group took less time to receive drug susceptibility tests (DSTs) (median 9 vs 16 days, p<0.001) and culture results (4 vs 8 days, p<0.001) and had a lower proportion of ‘late’ DSTs taking >60 days to arrive (p<0.001) than the control. For peripheral HCs, the intervention group had similar communication times for DST (median 22 vs 19 days, p=0.30) and culture (10 vs 9 days, p=0.10) results, as well as proportion of ‘late’ DSTs (p=0.57) compared with the control. Conclusions Only point-of-care HCs with direct access to the e-Chasqui information system had reduced communication times and fewer results with delays of >2 months. Peripheral HCs had no benefits from the system. This suggests that health establishments should have point-of-care access to reap the benefits of electronic laboratory reporting. PMID:21113076
Clustering execution in a processing system to increase power savings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bose, Pradip; Buyuktosunoglu, Alper; Jacobson, Hans M.
Embodiments relate to clustering execution in a processing system. An aspect includes accessing a control flow graph that defines a data dependency and an execution sequence of a plurality of tasks of an application that executes on a plurality of system components. The execution sequence of the tasks in the control flow graph is modified as a clustered control flow graph that clusters active and idle phases of a system component while maintaining the data dependency. The clustered control flow graph is sent to an operating system, where the operating system utilizes the clustered control flow graph for scheduling themore » tasks.« less
Frequency control of wind turbine in power system
NASA Astrophysics Data System (ADS)
Xu, Huawei
2018-06-01
In order to improve the stability of the overall frequency of the power system, automatic power generation control and secondary frequency adjustment were applied. Automatic power generation control was introduced into power generation planning. A dual-fed wind generator power regulation model suitable for secondary frequency regulation was established. The results showed that this method satisfied the basic requirements of frequency regulation control of large-scale wind power access power systems and improved the stability and reliability of power system operation. Therefore, this system frequency control method and strategy is relatively simple. The effect is significant. The system frequency can quickly reach a steady state. It is worth applying and promoting.
NASA Astrophysics Data System (ADS)
Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen
2010-05-01
CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand of the development efforts within CEDA has been the NDG (NERC Datagrid) Security system. This system has been extended to interoperate with ESG, greatly assisted by the standards based approach adopted for the ESG security architecture. Drawing from experience from previous projects the decision was taken to refactor the NDG Security software into a component based architecture to enable a separation of concerns between access control and the functionality of a given application being protected. Such an approach is only possible through a generic interface. At CEDA, this has been realised in the Python programming language using the WSGI (Web Server Gateway Interface) specification. A parallel Java filter based implementation is also under development with our US partners for use with the THREDDS Data Server. Using such technologies applications and middleware can be assembled into custom configurations to meet different requirements. In the case of access control, NDG Security middleware can be layered over the top of existing applications without the need to modify them. A RESTful approach to the application of authorisation policy has been key in this approach. We explore the practical implementation of such a scheme alongside the application of the ESG security architecture to CEDA's OGC web services implementation COWS.
An approach to access control in electronic health record.
Sucurovic, Snezana
2010-08-01
OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.
Thompson, Hannah E; Jefferies, Elizabeth
2013-08-01
Research suggests that semantic memory deficits can occur in at least three ways. Patients can (1) show amodal degradation of concepts within the semantic store itself, such as in semantic dementia (SD), (2) have difficulty in controlling activation within the semantic system and accessing appropriate knowledge in line with current goals or context, as in semantic aphasia (SA) and (3) experience a semantic deficit in only one modality following degraded input from sensory cortex. Patients with SA show deficits of semantic control and access across word and picture tasks, consistent with the view that their problems arise from impaired modality-general control processes. However, there are a few reports in the literature of patients with semantic access problems restricted to auditory-verbal materials, who show decreasing ability to retrieve concepts from words when they are presented repeatedly with closely related distractors. These patients challenge the notion that semantic control processes are modality-general and suggest instead a separation of 'access' to auditory-verbal and non-verbal semantic systems. We had the rare opportunity to study such a case in detail. Our aims were to examine the effect of manipulations of control demands in auditory-verbal semantic, non-verbal semantic and non-semantic tasks, allowing us to assess whether such cases always show semantic control/access impairments that follow a modality-specific pattern, or whether there are alternative explanations. Our findings revealed: (1) deficits on executive tasks, unrelated to semantic demands, which were more evident in the auditory modality than the visual modality; (2) deficits in executively-demanding semantic tasks which were accentuated in the auditory-verbal domain compared with the visual modality, but still present on non-verbal tasks, and (3) a coupling between comprehension and executive control requirements, in that mild impairment on single word comprehension was greatly increased on more demanding, associative judgements across modalities. This pattern of results suggests that mild executive-semantic impairment, paired with disrupted connectivity from auditory input, may give rise to semantic 'access' deficits affecting only the auditory modality. Copyright © 2013 Elsevier Ltd. All rights reserved.
This system collects submission data from the Toxic Substances Control Act (TSCA) and contact information for EPA contractors and employees who are CBI cleared. Learn how this data is collected, how it will be used, and the purpose of data collection.
48 CFR 235.071 - Export-controlled items.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Export-controlled items..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 235.071 Export-controlled items. For requirements regarding access to export-controlled items, see Subpart 204.73. [73 FR...
Design of the frame structure for a multiservice interactive system using ATM-PON
NASA Astrophysics Data System (ADS)
Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae
1998-10-01
The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.
Multiple-User, Multitasking, Virtual-Memory Computer System
NASA Technical Reports Server (NTRS)
Generazio, Edward R.; Roth, Don J.; Stang, David B.
1993-01-01
Computer system designed and programmed to serve multiple users in research laboratory. Provides for computer control and monitoring of laboratory instruments, acquisition and anlaysis of data from those instruments, and interaction with users via remote terminals. System provides fast access to shared central processing units and associated large (from megabytes to gigabytes) memories. Underlying concept of system also applicable to monitoring and control of industrial processes.
Context-aware access control for pervasive access to process-based healthcare systems.
Koufi, Vassiliki; Vassilacopoulos, George
2008-01-01
Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.
UNIX security in a supercomputing environment
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
The author critiques some security mechanisms in most versions of the Unix operating system and suggests more effective tools that either have working prototypes or have been implemented, for example in secure Unix systems. Although no computer (not even a secure one) is impenetrable, breaking into systems with these alternate mechanisms will cost more, require more skill, and be more easily detected than penetrations of systems without these mechanisms. The mechanisms described fall into four classes (with considerable overlap). User authentication at the local host affirms the identity of the person using the computer. The principle of least privilege dictates that properly authenticated users should have rights precisely sufficient to perform their tasks, and system administration functions should be compartmentalized; to this end, access control lists or capabilities should either replace or augment the default Unix protection system, and mandatory access controls implementing multilevel security models and integrity mechanisms should be available. Since most users access supercomputing environments using networks, the third class of mechanisms augments authentication (where feasible). As no security is perfect, the fourth class of mechanism logs events that may indicate possible security violations; this will allow the reconstruction of a successful penetration (if discovered), or possibly the detection of an attempted penetration.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
1996-12-31
There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems;more » (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.« less
NASA Astrophysics Data System (ADS)
Arenaccio, S.; Vernucci, A.; Padovani, R.; Arcidiacono, A.
Results of a detailed comparative performance assessment between two candidate access solutions for the provision of land-mobile services, i.e., FDMA and CDMA, for the European Land-Mobile Satellite Services (LMSS) provision are presented. The design of the CDMA access system and the network architecture, system procedures, network control, operation in fading environments, and implementation aspects of the system are described. The CDMA system is shown to yield superior traffic capability, despite the absence of polarization reuse due to payload design, especially in the second-generation era (multiple spot-beams). In this case, the advantage was found to be largely dependent on the traffic distribution across spot beams. Power control techniques are proposed to cope with the geographical disadvantage suffered by mobile stations located at the beam borders to compensate for fadings.
Tuffner, Francis K [Richland, WA; Kintner-Meyer, Michael C. W. [Richland, WA; Hammerstrom, Donald J [West Richland, WA; Pratt, Richard M [Richland, WA
2012-05-22
Battery charging control methods, electric vehicle charging methods, battery charging apparatuses and rechargeable battery systems. According to one aspect, a battery charging control method includes accessing information regarding a presence of at least one of a surplus and a deficiency of electrical energy upon an electrical power distribution system at a plurality of different moments in time, and using the information, controlling an adjustment of an amount of the electrical energy provided from the electrical power distribution system to a rechargeable battery to charge the rechargeable battery.
OASIS: A Data Fusion System Optimized for Access to Distributed Archives
NASA Astrophysics Data System (ADS)
Berriman, G. B.; Kong, M.; Good, J. C.
2002-05-01
The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.
Urban search mobile platform modeling in hindered access conditions
NASA Astrophysics Data System (ADS)
Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.
2018-05-01
The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.
Target Acquisition Performance of a Satellite Based Multiple Access Surveillance System
DOT National Transportation Integrated Search
1975-03-01
A quantitative description of the detection performance of a satellite-based surveillance system is presented. This system is one which has been proposed for CONUS coverage in an advanced air traffic control system. In addition, the computer program ...
SPI/U3.2. Security Profile Inspector for UNIX Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, A.
1994-08-01
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
Learning Relational Policies from Electronic Health Record Access Logs
Malin, Bradley; Nyemba, Steve; Paulett, John
2011-01-01
Modern healthcare organizations (HCOs) are composed of complex dynamic teams to ensure clinical operations are executed in a quick and competent manner. At the same time, the fluid nature of such environments hinders administrators' efforts to define access control policies that appropriately balance patient privacy and healthcare functions. Manual efforts to define these policies are labor-intensive and error-prone, often resulting in systems that endow certain care providers with overly broad access to patients' medical records while restricting other providers from legitimate and timely use. In this work, we propose an alternative method to generate these policies by automatically mining usage patterns from electronic health record (EHR) systems. EHR systems are increasingly being integrated into clinical environments and our approach is designed to be generalizable across HCOs, thus assisting in the design and evaluation of local access control policies. Our technique, which is grounded in data mining and social network analysis theory, extracts a statistical model of the organization from the access logs of its EHRs. In doing so, our approach enables the review of predefined policies, as well as the discovery of unknown behaviors. We evaluate our approach with five months of access logs from the Vanderbilt University Medical Center and confirm the existence of stable social structures and intuitive business operations. Additionally, we demonstrate that there is significant turnover in the interactions between users in the HCO and that policies learned at the department level afford greater stability over time. PMID:21277996
A personally controlled electronic health record for Australia
Pearce, Christopher; Bainbridge, Michael
2014-01-01
Objective On July 1, 2012 Australia launched a personally controlled electronic health record (PCEHR) designed around the needs of consumers. Using a distributed model and leveraging key component national eHealth infrastructure, the PCEHR is designed to enable sharing of any health information about a patient with them and any other health practitioner involved in their care to whom the patient allows access. This paper discusses the consumer-facing part of the program. Method Design of the system was through stakeholder consultation and the development of detailed requirements, followed by clinical design assurance. Results Patients are able to access any posted information through a web-accessible ‘consumer portal.’ Within the portal they are able to assert access controls on all or part of their record. The portal includes areas for consumers to record their own personal information. Discussion The PCEHR has the potential to transform the ability of patients to actively engage in their own healthcare, and to enable the emerging partnership model of health and healthcare in medicine. The ability to access health information traditionally kept within the closed walls of institutions also raises challenges for the profession, both in the language clinicians choose and the ethical issues raised by the changed roles and responsibilities. Conclusions The PCEHR is aimed at connecting all participants and their interventions, and is intended to become a system-wide activity. PMID:24650635
Failure detection and identification for a reconfigurable flight control system
NASA Technical Reports Server (NTRS)
Dallery, Francois
1987-01-01
Failure detection and identification logic for a fault-tolerant longitudinal control system were investigated. Aircraft dynamics were based upon the cruise condition for a hypothetical transonic business jet transport configuration. The fault-tolerant control system consists of conventional control and estimation plus a new outer loop containing failure detection, identification, and reconfiguration (FDIR) logic. It is assumed that the additional logic has access to all measurements, as well as to the outputs of the control and estimation logic. The pilot may also command the FDIR logic to perform special tests.
Thermal energy storage apparatus, controllers and thermal energy storage control methods
Hammerstrom, Donald J.
2016-05-03
Thermal energy storage apparatus, controllers and thermal energy storage control methods are described. According to one aspect, a thermal energy storage apparatus controller includes processing circuitry configured to access first information which is indicative of surpluses and deficiencies of electrical energy upon an electrical power system at a plurality of moments in time, access second information which is indicative of temperature of a thermal energy storage medium at a plurality of moments in time, and use the first and second information to control an amount of electrical energy which is utilized by a heating element to heat the thermal energy storage medium at a plurality of moments in time.
Management of Information Technology Access Controls
1991-01-01
Management Information Systems , (New York: American Elsevier Publishing Company, 1968), 8. 2. Webster’s Third New International Dictionary, Unabridged... Management Information Systems (New York: American Elsevier Publishing company, 1968), 37. 5. Ibid. 6. Ibid. 7. Gerald M. Ward and Jonathan D. Harris, "Data...Controls: A Visual Approach Through Integrated Management Information Systems . New York: American Elsevier Publishing Company, 1968. Brancheau, James C
Care for the chronically ill: Nursing home incentive payment experiment
Weissert, William G.; Scanlon, William J.; Wan, Thomas T. H.; Skinner, Douglas E.
1983-01-01
Nursing home reinbursement systems which do not adjust payment levels to patient care needs lead to access problems for heavy-care patients. Unnecessarily long and costly hospital stays may result. A patient-based nursing home incentive reimbursement system has been designed and is being evaluated in a controlled field experiment in 36 California skilled nursing facilities. Incentives are paid for admitting heavy-care patients, meeting outcome goals on some patients, and discharging and maintaining some patients in the community. This article describes a nursing home reimbursement system which is intended to simultaneously mitigate problems of restricted access, inefficient use of beds, and nonoptimal care. It also discusses the approach to evaluating this broad social intervention by application of a controlled experimental design. PMID:10310528
2012-08-14
Improvement Act requirements and secure access to two payroll offices at Indianapolis, Indiana, that process sensitive payroll information. We...Without adequate controls over physical access, individuals could gain unauthorized access to computers and sensitive payroll data contained in online...and resolved. 2 Personnel and payroll data transmitted to and from interfacing systems were transferred completely, accurately, and timely
2002-09-01
Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet
D'Arcy, Christina; Luevano, Joe E; Miranda-Arango, Manuel; Pipkin, Joseph A; Jackson, Jonathan A; Castañeda, Eddie; Gosselink, Kristin L; O'Dell, Laura E
2016-01-01
Previous studies have demonstrated that there are persistent changes in dopamine systems following withdrawal from methamphetamine (METH). This study examined changes in striatal dopamine transporter (DAT), tyrosine hydroxylase (TH) and dopamine receptor 2 (D2) 72 h after withdrawal from METH intravenous self- administration (IVSA). Rats were given limited (1h) or extended (6h) access to METH IVSA (0.05 mg/kg/0.1 ml infusion) for 22 days. Controls did not receive METH IVSA. The rats given extended access to IVSA displayed higher METH intake during the first hour of drug access compared to rats given limited access. Extended access to METH also produced a concomitant increase in striatal DAT levels relative to drug-naïve controls. There were no changes in TH or D2 levels across groups. Previous studies have reported a decrease in striatal DAT levels during protracted periods (>7 days) of withdrawal from METH IVSA. This study extends previous work by showing an increase in striatal DAT protein expression during an earlier time point of withdrawal from this drug. These results are an important step toward understanding the dynamic changes in dopamine systems that occur during different time points of withdrawal from METH IVSA. Copyright © 2015 Elsevier B.V. All rights reserved.
Traditional and emerging forms of dental practice. Cost, accessibility, and quality factors.
Rovin, S; Nash, J
1982-01-01
The traditional and predominant manner of delivering dental care is through a fee-for-service, private practice system. A number of alternative dental care delivery systems have emerged and are being tested, and others are just emerging. These systems include department store practices, hospital dental services, health maintenance organizations, the independent practice of dental hygiene, and denturism. Although it is too soon to draw final conclusions about the efficacy and effectiveness of these systems, we examine them for their potential to compete with and change the way dental care is currently delivered. Using the parameters of cost, accessibility, and quality, we compare these systems to traditional dental practice. Some of these emerging forms clearly have the potential to complete favorably with traditional practice. Other seem less likely to alter the existing system substantially. The system which can best control costs, increase accessibility, and enhance quality will gain the competitive edge. PMID:7091453
Securing TCP/IP and Dial-up Access to Administrative Data.
ERIC Educational Resources Information Center
Conrad, L. Dean
1992-01-01
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…
Technical Standards for Command and Control Information Systems (CCISs)
1992-01-01
initiation, Conformance Testing 149 management, scheduling, resource allocation , logical and IEEE P1 003 146 physical device access, interrupt handling...70 5.2.3 Remote Data Access (RDA) ........................................... 72 5.2.4 Information Resource Dictionary...146 7.2.1.2 POSIX Conformance Testing .............................. 149 7.2.2 Consortia Recommendations
Remote Authentication: The Obvia Solution.
ERIC Educational Resources Information Center
Eckley, Tami-Jo
1999-01-01
This article focuses on Obvia Corporation, a New York-based company that offers remote data access (RDA) through a server software system allowing for an easy, controllable, cost-effective management solution to the remote access problem. Using Obvia's RDA service, librarians can focus on administrative and professional decisions and spend more…
10 CFR 9.65 - Access determinations; appeals.
Code of Federal Regulations, 2010 CFR
2010-01-01
... NUCLEAR REGULATORY COMMISSION PUBLIC RECORDS Privacy Act Regulations Determinations and Appeals § 9.65... access to the record is available under the Privacy Act. For all other agency records, the Freedom of Information Act and Privacy Act Officer with the advice of the system manager having control of the record to...
Under Lock and Key: Preventing Campus Theft of Electronic Equipment.
ERIC Educational Resources Information Center
Harrison, J. Phil
1996-01-01
A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
User-friendly cognitive training for the elderly: a technical report.
Boquete, Luciano; Rodríguez-Ascariz, José Manuel; Amo-Usanos, Carlos; Martínez-Arribas, Alejandro; Amo-Usanos, Javier; Otón, Salvador
2011-01-01
This article presents a system that implements a cognitive training program in users' homes. The system comprises various applications designed to create a daily brain-fitness regime. The proposed mental training system uses television and a remote control specially designed for the elderly. This system integrates Java applications to promote brain-fitness training in three areas: arithmetic, memory, and idea association. The system comprises the following: Standard television set, simplified wireless remote control, black box (system's core hardware and software), brain-fitness games (language Java), and Wi-Fi-enabled Internet-connected router. All data from the user training sessions are monitored through a control center. This control center analyzes the evolution of the user and the proper performance of the system during the test. The implemented system has been tested by six healthy volunteers. The results for this user group demonstrated the accessibility and usability of the system in a controlled real environment. The impressions of the users were very favorable, and they reported high adaptability to the system. The mean score for usability and accessibility assigned by the users was 3.56 out of 5 points. The operation stress test (over 200 h) was successful. The proposed system was used to implement a cognitive training program in users' homes, which was developed to be a low-cost tool with a high degree of user interactivity. The results of this preliminary study indicate that this user-friendly system could be adopted as a form of cognitive training for the elderly.
Arrays of individually controlled ions suitable for two-dimensional quantum simulations
Mielenz, Manuel; Kalis, Henning; Wittemer, Matthias; ...
2016-06-13
A precisely controlled quantum system may reveal a fundamental understanding of another, less accessible system of interest. A universal quantum computer is currently out of reach, but an analogue quantum simulator that makes relevant observables, interactions and states of a quantum model accessible could permit insight into complex dynamics. Several platforms have been suggested and proof-of-principle experiments have been conducted. Here, we operate two-dimensional arrays of three trapped ions in individually controlled harmonic wells forming equilateral triangles with side lengths 40 and 80 μm. In our approach, which is scalable to arbitrary two-dimensional lattices, we demonstrate individual control of themore » electronic and motional degrees of freedom, preparation of a fiducial initial state with ion motion close to the ground state, as well as a tuning of couplings between ions within experimental sequences. Lastly, our work paves the way towards a quantum simulator of two-dimensional systems designed at will.« less
Integrating Software Modules For Robot Control
NASA Technical Reports Server (NTRS)
Volpe, Richard A.; Khosla, Pradeep; Stewart, David B.
1993-01-01
Reconfigurable, sensor-based control system uses state variables in systematic integration of reusable control modules. Designed for open-architecture hardware including many general-purpose microprocessors, each having own local memory plus access to global shared memory. Implemented in software as extension of Chimera II real-time operating system. Provides transparent computing mechanism for intertask communication between control modules and generic process-module architecture for multiprocessor realtime computation. Used to control robot arm. Proves useful in variety of other control and robotic applications.
Plant Growth Module (PGM) conceptual design
NASA Technical Reports Server (NTRS)
Schwartzkopf, Steven H.; Rasmussen, Daryl
1987-01-01
The Plant Growth Module for the Controlled Ecological Life Support System (CELSS), designed to answer basic science questions related to growing plants in closed systems, is described functionally with artist's conception drawings. Subsystems are also described, including enclosure and access; data acquisition and control; gas monitor and control; heating, ventilation, and air conditioning; air delivery; nutrient monitor and control; microbial monitoring and control; plant support and nutrient delivery; illumination; and internal operations. The hardware development plan is outlined.
NASA Technical Reports Server (NTRS)
Trauger, John
2008-01-01
Topics include and overview, science objectives, study objectives, coronagraph types, metrics, ACCESS observatory, laboratory validations, and summary. Individual slides examine ACCESS engineering approach, ACCESS gamut of coronagraph types, coronagraph metrics, ACCESS Discovery Space, coronagraph optical layout, wavefront control on the "level playing field", deformable mirror development for HCIT, laboratory testbed demonstrations, high contract imaging with the HCIT, laboratory coronagraph contrast and stability, model validation and performance predictions, HCIT coronagraph optical layout, Lyot coronagraph on the HCIT, pupil mapping (PIAA), shaped pupils, and vortex phase mask experiments on the HCIT.
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-12-31
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General`s Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-01-01
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General's Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
Addressing the Tension Between Strong Perimeter Control an Usability
NASA Technical Reports Server (NTRS)
Hinke, Thomas H.; Kolano, Paul Z.; Keller, Chris
2006-01-01
This paper describes a strong perimeter control system for a general purpose processing system, with the perimeter control system taking significant steps to address usability issues, thus mitigating the tension between strong perimeter protection and usability. A secure front end enforces two-factor authentication for all interactive access to an enclave that contains a large supercomputer and various associated systems, with each requiring their own authentication. Usability is addressed through a design in which the user has to perform two-factor authentication at the secure front end in order to gain access to the enclave, while an agent transparently performs public key authentication as needed to authenticate to specific systems within the enclave. The paper then describes a proxy system that allows users to transfer files into the enclave under script control, when the user is not present to perform two-factor authentication. This uses a pre-authorization approach based on public key technology, which is still strongly tied to both two-factor authentication and strict control over where files can be transferred on the target system. Finally the paper describes an approach to support network applications and systems such as grids or parallel file transfer protocols that require the use of many ports through the perimeter. The paper describes a least privilege approach that dynamically opens ports on a host-specific, if-authorized, as-needed, just-in-time basis.
Feasibility Study of a Vision-Based Landing System for Unmanned Fixed-Wing Aircraft
2017-06-01
International Journal of Computer Science and Network Security 7 no. 3: 112–117. Accessed April 7, 2017. http://www.sciencedirect.com/science/ article /pii...the feasibility of applying computer vision techniques and visual feedback in the control loop for an autonomous system. This thesis examines the...integration into an autonomous aircraft control system. 14. SUBJECT TERMS autonomous systems, auto-land, computer vision, image processing
Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection
Liu, Changyu; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840
Providing security for automated process control systems at hydropower engineering facilities
NASA Astrophysics Data System (ADS)
Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.
2016-12-01
This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
12 CFR 1204.8 - How are records secured?
Code of Federal Regulations, 2010 CFR
2010-01-01
... § 1204.8 How are records secured? (a) What controls must FHFA have in place? Each FHFA office must establish administrative and physical controls to prevent unauthorized access to its systems of records... stringency of these controls should correspond to the sensitivity of the records that the controls protect...
The U. S. Congress--On Line Users as Policymakers.
ERIC Educational Resources Information Center
Gregory, N.
1979-01-01
Online information systems used by congressional legislators for administrative support, correspondence control, information retrieval, and electronc voting are presented. Expansion of these systems to permit public access is discussed. (RAA)
Deployable Command and Control System for Over the Horizon Small Boat Operations
2006-09-01
the HP iPAQ Navigation System bundle. There is no programmable Application Programming Interface (API), nor otherwise accessible methods to ...High Point Software which comes complete with a C# library to allow customized programs to access Bluetooth enabled GPS devices. GPSAccess...data could be displayed along with ownship’s positional data, but the program was designed to only work with the Ross radios and the MS Windows XP
Borysov, Sergiy; Bryant, Victoria L; Alexandrow, Mark G
2015-01-01
Of critical importance to many of the events underlying transcriptional control of gene expression are modifications to core and linker histones that regulate the accessibility of trans-acting factors to the DNA substrate within the context of chromatin. Likewise, control over the initiation of DNA replication, as well as the ability of the replication machinery to proceed during elongation through the multiple levels of chromatin condensation that are likely to be encountered, is known to involve the creation of chromatin accessibility. In the latter case, chromatin access will likely need to be a transient event so as to prevent total genomic unraveling of the chromatin that would be deleterious to cells. While there are many molecular and biochemical approaches in use to study histone changes and their relationship to transcription and chromatin accessibility, few techniques exist that allow a molecular dissection of the events underlying DNA replication control as it pertains to chromatin changes and accessibility. Here, we outline a novel experimental strategy for addressing the ability of specific proteins to induce large-scale chromatin unfolding (decondensation) in vivo upon site-specific targeting to an engineered locus. Our laboratory has used this powerful system in novel ways to directly address the ability of DNA replication proteins to create chromatin accessibility, and have incorporated modifications to the basic approach that allow for a molecular genetic analysis of the mechanisms and associated factors involved in causing chromatin decondensation by a protein of interest. Alternative approaches involving co-expression of other proteins (competitors or stimulators), concurrent drug treatments, and analysis of co-localizing histone modifications are also addressed, all of which are illustrative of the utility of this experimental system for extending basic findings to physiologically relevant mechanisms. Although used by our group to analyze mechanisms underlying DNA replication associated chromatin accessibility, this unique and powerful experimental system has the propensity to be a valuable tool for understanding chromatin remodeling mechanisms orchestrated by other cellular processes such as DNA repair, recombination, mitotic chromosome condensation, or other chromosome dynamics involving chromatin alterations and accessibility.
NASA Astrophysics Data System (ADS)
Schaller, S. C.; Bjorklund, E. A.; Carr, G. P.; Faucett, J. A.; Oothoudt, M. A.
1997-05-01
The Los Alamos Neutron Scattering Center (LANSCE) Proton Storage Ring (PSR) control system upgrade was completed in 1996. In previous work, much of a PDP-11-based control system was replaced with Experimental Physics and Industrial Control System (EPICS) controls. Several parts of the old control system which used a VAX for operator displays and direct access to a CAMAC serial highway still remained. The old system was preserved as a "fallback" if the new EPICS-based system had problems. The control system upgrade completion included conversion of several application programs to EPICS-based operator interfaces, moving some data acquisition hardware to EPICS Input-Output Controllers (IOCs), and the implementation of new gateway software to complete the overall control system interoperability. Many operator interface (OPI) screens, written by LANSCE operators, have been incorporated in the new system. The old PSR control system hardware was removed. The robustness and reliability of the new controls obviated the need for a fallback capability.
Fuller, Daniel; Gauvin, Lise; Kestens, Yan
2013-02-01
Few studies have examined potential disparities in access to transportation infrastructures, an important determinant of population health. To examine individual- and area-level disparities in access to the road network, public transportation system, and a public bicycle share program in Montreal, Canada. Examining associations between sociodemographic variables and access to the road network, public transportation system, and a public bicycle share program, 6,495 adult respondents (mean age, 48.7 years; 59.0 % female) nested in 33 areas were included in a multilevel analysis. Individuals with lower incomes lived significantly closer to public transportation and the bicycle share program. At the area level, the interaction between low-education and low-income neighborhoods showed that these areas were significantly closer to public transportation and the bicycle share program controlling for individual and urbanicity variables. More deprived areas of the Island of Montreal have better access to transportation infrastructure than less-deprived areas.
Paver automation for road surfacing
NASA Astrophysics Data System (ADS)
Tihonov, A.; Velichkin, V.
2017-10-01
The paper discusses factors that bear on the quality of motor road pavement as access roads and highways are built and used. A block diagram is proposed to organize elements of the automatic control system to control the asphalt paver’s mechanisms; the system is based on a microprocessor onboard controller to maintain preset elevation of the finishing plate; description of its operation principle is offered. The paper names primary converters to control the finishing plate elevation. A new control method is described to control the machine’s straight-line movement with GLONASS Satellite Positioning System (SPS) during operation.
NASA Technical Reports Server (NTRS)
Degaudenzi, R.; Elia, C.; Viola, R.
1990-01-01
Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.
Simple, Script-Based Science Processing Archive
NASA Technical Reports Server (NTRS)
Lynnes, Christopher; Hegde, Mahabaleshwara; Barth, C. Wrandle
2007-01-01
The Simple, Scalable, Script-based Science Processing (S4P) Archive (S4PA) is a disk-based archival system for remote sensing data. It is based on the data-driven framework of S4P and is used for data transfer, data preprocessing, metadata generation, data archive, and data distribution. New data are automatically detected by the system. S4P provides services such as data access control, data subscription, metadata publication, data replication, and data recovery. It comprises scripts that control the data flow. The system detects the availability of data on an FTP (file transfer protocol) server, initiates data transfer, preprocesses data if necessary, and archives it on readily available disk drives with FTP and HTTP (Hypertext Transfer Protocol) access, allowing instantaneous data access. There are options for plug-ins for data preprocessing before storage. Publication of metadata to external applications such as the Earth Observing System Clearinghouse (ECHO) is also supported. S4PA includes a graphical user interface for monitoring the system operation and a tool for deploying the system. To ensure reliability, S4P continuously checks stored data for integrity, Further reliability is provided by tape backups of disks made once a disk partition is full and closed. The system is designed for low maintenance, requiring minimal operator oversight.
Access and privacy rights using web security standards to increase patient empowerment.
Falcão-Reis, Filipa; Costa-Pereira, Altamiro; Correia, Manuel E
2008-01-01
Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an EHR should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself. Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer such principles into national laws. A perspective is given on the state of the art concerning web security standards, which can be used to easily engineer health information systems complying with the patient empowering goals. In conclusion health systems with the characteristics thus described are technically feasible and should be generally implemented and deployed.
NASA Astrophysics Data System (ADS)
Zhang, De-gan; Zhang, Xiao-dan
2012-11-01
With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, T.
SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, Tony
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
Cardea: Providing Support for Dynamic Resource Access in a Distributed Computing Environment
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2003-01-01
The environment framing the modem authorization process span domains of administration, relies on many different authentication sources, and manages complex attributes as part of the authorization process. Cardea facilitates dynamic access control within this environment as a central function of an inter-operable authorization framework. The system departs from the traditional authorization model by separating the authentication and authorization processes, distributing the responsibility for authorization data and allowing collaborating domains to retain control over their implementation mechanisms. Critical features of the system architecture and its handling of the authorization process differentiate the system from existing authorization components by addressing common needs not adequately addressed by existing systems. Continuing system research seeks to enhance the implementation of the current authorization model employed in Cardea, increase the robustness of current features, further the framework for establishing trust and promote interoperability with existing security mechanisms.
Use of CDMA access technology in mobile satellite systems
NASA Technical Reports Server (NTRS)
Ramasastry, Jay; Wiedeman, Bob
1995-01-01
Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.
Model-Driven Configuration of SELinux Policies
NASA Astrophysics Data System (ADS)
Agreiter, Berthold; Breu, Ruth
The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.
PREVENTION GUIDELINES SYSTEM/DATABASE
The Prevention Guidelines System gives public health practitioners quick access to the most current CDC recommendations and guidelines for the prevention, control, treatment and detection of infectious and chronic diseases, environmental hazards, natural or human-generated disast...
J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device
NASA Astrophysics Data System (ADS)
Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin
2011-10-01
This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.
Design of an Efficient CAC for a Broadband DVB-S/DVB-RCS Satellite Access Network
NASA Astrophysics Data System (ADS)
Inzerilli, Tiziano; Montozzi, Simone
2003-07-01
This paper deals with efficient utilization of network resources in an advanced broadband satellite access system. It proposes a technique for admission control of IP streams with guaranteed QoS which does not interfere with the particular BoD (Bandwidth on Demand) algorithm that handles access to uplink bandwidth, an essential part of a DVB- RCS architecture. This feature of the admission control greatly simplify its integration in the satellite network. The purpose of this admission control algorithm in particular is to suitably and dynamically configure the overall traffic control parameters, in the access terminal of the user and service segment, with a simple approach which does not introduces limitations and/or constraints to the BoD algorithm. Performance of the proposed algorithm is evaluated thorugh Opnet simulations using an ad-hoc platform modeling DVB-based satellite access.The results presented in this paper were obtained within SATIP6 project, which is sponsored within the 5th EU Research Programme, IST. The aims of the project are to evaluate and demonstrate key issues of the integration of satellite-based access networks into the Internet in order to support multimedia services over wide areas. The satellite link layer is based on DVB-S on the forward link and DVB-RCS on the return link. Adaptation and optimization of the DVB-RCS access standard in order to support QoS provision are central issues of the project. They are handled through an integration of Connection Admission Control (CAC), Traffic Shaping and Policing techniques.
NASA Astrophysics Data System (ADS)
Loveless, R.; Erhard, P.; Ficenec, J.; Gather, K.; Heath, G.; Iacovacci, M.; Kehres, J.; Mobayyen, M.; Notz, D.; Orr, R.; Orr, R.; Sephton, A.; Stroili, R.; Tokushuku, K.; Vogel, W.; Whitmore, J.; Wiggers, L.
1989-12-01
The ZEUS collaboration is building a system to monitor, control and document the hardware of the ZEUS detector. This system is based on a network of VAX computers and microprocessors connected via ethernet. The database for the hardware values will be ADAMO tables; the ethernet connection will be DECNET, TCP/IP, or RPC. Most of the documentation will also be kept in ADAMO tables for easy access by users.
Commercialization and Field Distribution of Smart Pedestrian Call Signals
DOT National Transportation Integrated Search
2010-06-01
The research on this project resulted in a new design for an accessible pedestrian system (APS) that uses Ethernet communications to implement a distributed control system. Present APS designs represent a safety risk factor by APS systems having unde...
75 FR 76426 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-08
..., access control lists, file system permissions, intrusion detection and prevention systems and log..., address, mailing address, country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN..., address, mailing address, country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN...
Implementing Patient Access to Electronic Health Records Under HIPAA: Lessons Learned
Wang, Tiffany; Pizziferri, Lisa; Volk, Lynn A; Mikels, Debra A; Grant, Karen G; Wald, Jonathan S; Bates, David W
2004-01-01
In 2001, the Institute of Medicine (IOM) and the Health Insurance Portability and Accountability Act (HIPAA) emphasized the need for patients to have greater control over their health information. We describe a Boston healthcare system's approach to providing patients access to their electronic health records (EHRs) via Patient Gateway, a secure, Web-based portal. Implemented in 19 clinic sites to date, Patient Gateway allows patients to access information from their medical charts via the Internet in a secure manner. Since 2002, over 19,000 patients have enrolled in Patient Gateway, more than 125,000 patients have logged into the system, and over 37,000 messages have been sent by patients to their practices. There have been no major security concerns. By providing access to EHR data, secure systems like Patient Gateway allow patients a greater role in their healthcare process, as envisioned by the IOM and HIPAA. PMID:18066391
Wireless Augmented Reality Prototype (WARP)
NASA Technical Reports Server (NTRS)
Devereaux, A. S.
1999-01-01
Initiated in January, 1997, under NASA's Office of Life and Microgravity Sciences and Applications, the Wireless Augmented Reality Prototype (WARP) is a means to leverage recent advances in communications, displays, imaging sensors, biosensors, voice recognition and microelectronics to develop a hands-free, tetherless system capable of real-time personal display and control of computer system resources. Using WARP, an astronaut may efficiently operate and monitor any computer-controllable activity inside or outside the vehicle or station. The WARP concept is a lightweight, unobtrusive heads-up display with a wireless wearable control unit. Connectivity to the external system is achieved through a high-rate radio link from the WARP personal unit to a base station unit installed into any system PC. The radio link has been specially engineered to operate within the high- interference, high-multipath environment of a space shuttle or space station module. Through this virtual terminal, the astronaut will be able to view and manipulate imagery, text or video, using voice commands to control the terminal operations. WARP's hands-free access to computer-based instruction texts, diagrams and checklists replaces juggling manuals and clipboards, and tetherless computer system access allows free motion throughout a cabin while monitoring and operating equipment.
Virtual memory support for distributed computing environments using a shared data object model
NASA Astrophysics Data System (ADS)
Huang, F.; Bacon, J.; Mapp, G.
1995-12-01
Conventional storage management systems provide one interface for accessing memory segments and another for accessing secondary storage objects. This hinders application programming and affects overall system performance due to mandatory data copying and user/kernel boundary crossings, which in the microkernel case may involve context switches. Memory-mapping techniques may be used to provide programmers with a unified view of the storage system. This paper extends such techniques to support a shared data object model for distributed computing environments in which good support for coherence and synchronization is essential. The approach is based on a microkernel, typed memory objects, and integrated coherence control. A microkernel architecture is used to support multiple coherence protocols and the addition of new protocols. Memory objects are typed and applications can choose the most suitable protocols for different types of object to avoid protocol mismatch. Low-level coherence control is integrated with high-level concurrency control so that the number of messages required to maintain memory coherence is reduced and system-wide synchronization is realized without severely impacting the system performance. These features together contribute a novel approach to the support for flexible coherence under application control.
CEV Seat Attenuation System System Design Tasks
NASA Technical Reports Server (NTRS)
Goodman, Jerry R.; McMichael, James H.
2007-01-01
The Apollo crew / couch restraint system was designed to support and restrain three crew members during all phases of the mission from launch to landing. The crew couch used supported the crew for launch, landing and in-flight operations, and was foldable and removable for EVA ingress/egress through side hatch access and for in-flight access under the seat and in other areas of the crew compartment. The couch and the seat attenuation system was designed to control the impact loads imposed on the crew during landing and to remain non-functional during all other flight phases.
Is the digitization of laparoscopic movement using accessible alternative technologies possible?
Lorias Espinoza, Daniel; Gutiérrez Gnecchi, José Antonio; Martínez, Arturo Minor
2012-05-01
It is widely documented that laparoscopic surgeons require training, and an objective evaluation of the training that they receive. The most advanced evaluation systems integrate the digitization of the movement of laparoscopic tools. A great number of these systems, however, do not permit the use of real tools and their high cost limits their academic impact. Likewise, it is documented that new and accessible systems need to be developed. The aim of this article is to explore the possibility of digitizing the movement of laparoscopic tools in a three-dimensional workspace, using accessible alternative technology. Our proposal uses a commercial Wii video game control in conjunction with a program for determining kinematic variables during the execution of a recognition task.
Cloud-assisted mobile-access of health data with privacy and auditability.
Tong, Yue; Sun, Jinyuan; Chow, Sherman S M; Li, Pan
2014-03-01
Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and auditability for misusing health data. Specifically, we propose to integrate key management from pseudorandom number generator for unlinkability, a secure indexing method for privacy-preserving keyword search which hides both search and access patterns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with auditability to prevent potential misbehavior, in both normal and emergency cases.
D0 General Support: The Use of Programmable Logic Controllers (PLCS) at D0
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hance, R.; /Fermilab
With the exception of control of heating, ventilation, and air conditioning (HVAC) ventilation fans, and their shutdown in the case of smoke in the ducts, all implementations of Programmable Logic Controllers (PLCs) in Dzero have been made within the fundamental premise that no uncertified PLC apparatus shall be entrusted with the safety of equipment or personnel. Thus although PLCs are used to control and monitor all manner of intricate equipment, simple hardware interlocks and relief devices provide basic protection against component failure, control failure, or inappropriate control operation. Nevertheless, this report includes two observations as follows: (1) It may bemore » prudent to reconfigure the link between the Pyrotronics system and the HVAC system such that the Pyrotronics system provides interlocks to the ventilation fans instead of control inputs to the uncertified HVAC PLCs. Although the Pyrotronics system is certified and maintained to life safety standards, the HVAC system is not. A hardware or software failure of the HVAC system probably should not be allowed to result in the situation where the ventilation fans in a smoke filled duct continue to operate. Dan Markley is investigating this matter. (2) It may also be prudent to examine the network security of those systems connected to the Fermilab WAN (HVAC, Cryo, and Solenoid Controls). Even though the impact of a successful hack might only be to operations, it might nevertheless be disruptive and could be expensive. The risks should perhaps be analyzed. One of the most attractive features of these systems, from a user's viewpoint, is their unlimited networking. The unlimited networking that makes the systems so convenient to legitimate access also makes them vulnerable to illegitimate access.« less
Beyond the online catalog: developing an academic information system in the sciences.
Crawford, S; Halbrook, B; Kelly, E; Stucki, L
1987-01-01
The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed. PMID:3315052
Beyond the online catalog: developing an academic information system in the sciences.
Crawford, S; Halbrook, B; Kelly, E; Stucki, L
1987-07-01
The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed.
ERIC Educational Resources Information Center
Borden, P. A.; And Others
Summaries are presented of five conference papers on communication, control, and computer access for handicapped individuals. Papers have the following titles and authors: "Accessibility of Graphically Based User Interface Computer Systems for Individuals with Visual Impairments" (Charles Lee and Gregg Vanderheiden); "Data Base vs. Information…
An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems
NASA Astrophysics Data System (ADS)
Vashishtha, Jyoti; Sinha, Aakash
2006-05-01
The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.
Multiple Phase Transitions in the Culture Dissemination
NASA Astrophysics Data System (ADS)
Wang, Bing; Han, Yuexing; Chen, Luonan; Aihara, Kazuyuki
We study the coevolution process in the Axelrod’s model with the consideration of agents’ abilities to access to the information. With a parameter to control the ability of communication, we observe two kinds of phase transitions both for cultural domains and network fragments, respectively. With the simulation results, we find the relationship between the critical value and the controlled parameter. The results indicate that the powerful ability to access to the information benefits the dissemination of culture in the system.
Virtual Interactive Classroom: A New Technology for Distance Learning Developed
NASA Technical Reports Server (NTRS)
York, David W.; Babula, Maria
1999-01-01
The Virtual Interactive Classroom (VIC) allows Internet users, specifically students, to remotely control and access data from scientific equipment. This is a significant advantage to school systems that cannot afford experimental equipment, have Internet access, and are seeking to improve science and math scores with current resources. A VIC Development Lab was established at Lewis to demonstrate that scientific equipment can be controlled by remote users over the Internet. Current projects include a wind tunnel, a room camera, a science table, and a microscope.
NASA Technical Reports Server (NTRS)
2006-01-01
Access 5 analyzed the differences between UAS and manned aircraft operations under five categories of abnormal or emergency situations: Link Failure, Lost Communications, Onboard System Failures, Control Station Failures and Abnormal Weather. These analyses were made from the vantage point of the impact that these operations have on the US air traffic control system, with recommendations for new policies and procedures included where appropriate.
76 FR 74753 - Authority To Manufacture and Distribute Postage Evidencing Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-01
... revision of the rules governing the inventory control processes of Postage Evidencing Systems (PES... destruction or disposal of all Postage Evidencing Systems and their components to enable accurate accounting...) Postage Evidencing System repair process--any physical or electronic access to the internal components of...
TGIS, TIG, Program Development, Transportation & Public Facilities, State
accessible, accurate, and controlled inventory of public roadway features and linear coordinates for the Roadway Data System (RDS) network (Alaska DOT&PF's Linear Reference System or LRS) to meet Federal and
Code of Federal Regulations, 2011 CFR
2011-07-01
... shall control air emissions from the individual drain system using one or a combination of the following... closure device. (3) Junction box control requirements. Each junction box shall be equipped with controls as follows: (i) The junction box shall be equipped with a closure device (e.g., manhole cover, access...
Code of Federal Regulations, 2013 CFR
2013-07-01
... shall control air emissions from the individual drain system using one or a combination of the following... closure device. (3) Junction box control requirements. Each junction box shall be equipped with controls as follows: (i) The junction box shall be equipped with a closure device (e.g., manhole cover, access...
Code of Federal Regulations, 2012 CFR
2012-07-01
... shall control air emissions from the individual drain system using one or a combination of the following... closure device. (3) Junction box control requirements. Each junction box shall be equipped with controls as follows: (i) The junction box shall be equipped with a closure device (e.g., manhole cover, access...
Code of Federal Regulations, 2014 CFR
2014-07-01
... shall control air emissions from the individual drain system using one or a combination of the following... closure device. (3) Junction box control requirements. Each junction box shall be equipped with controls as follows: (i) The junction box shall be equipped with a closure device (e.g., manhole cover, access...
Printable, scannable biometric templates for secure documents and materials
NASA Astrophysics Data System (ADS)
Cambier, James L.; Musgrave, Clyde
2000-04-01
Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.
A web-based biosignal data management system for U-health data integration.
Ro, Dongwoo; Yoo, Sooyoung; Choi, Jinwook
2008-11-06
In the ubiquitous healthcare environment, the biosignal data should be easily accessed and properly maintained. This paper describes a web-based data management system. It consists of a device interface, a data upload control, a central repository, and a web server. For the user-specific web services, a MFER Upload ActiveX Control was developed.
Distributed PACS using distributed file system with hierarchical meta data servers.
Hiroyasu, Tomoyuki; Minamitani, Yoshiyuki; Miki, Mitsunori; Yokouchi, Hisatake; Yoshimi, Masato
2012-01-01
In this research, we propose a new distributed PACS (Picture Archiving and Communication Systems) which is available to integrate several PACSs that exist in each medical institution. The conventional PACS controls DICOM file into one data-base. On the other hand, in the proposed system, DICOM file is separated into meta data and image data and those are stored individually. Using this mechanism, since file is not always accessed the entire data, some operations such as finding files, changing titles, and so on can be performed in high-speed. At the same time, as distributed file system is utilized, accessing image files can also achieve high-speed access and high fault tolerant. The introduced system has a more significant point. That is the simplicity to integrate several PACSs. In the proposed system, only the meta data servers are integrated and integrated system can be constructed. This system also has the scalability of file access with along to the number of file numbers and file sizes. On the other hand, because meta-data server is integrated, the meta data server is the weakness of this system. To solve this defect, hieratical meta data servers are introduced. Because of this mechanism, not only fault--tolerant ability is increased but scalability of file access is also increased. To discuss the proposed system, the prototype system using Gfarm was implemented. For evaluating the implemented system, file search operating time of Gfarm and NFS were compared.
A privacy protection for an mHealth messaging system
NASA Astrophysics Data System (ADS)
Aaleswara, Lakshmipathi; Akopian, David; Chronopoulos, Anthony T.
2015-03-01
In this paper, we propose a new software system that employs features that help the organization to comply with USA HIPAA regulations. The system uses SMS as the primary way of communication to transfer information. Lack of knowledge about some diseases is still a major reason for some harmful diseases spreading. The developed system includes different features that may help to communicate amongst low income people who don't even have access to the internet. Since the software system deals with Personal Health Information (PHI) it is equipped with an access control authentication system mechanism to protect privacy. The system is analyzed for performance to identify how much overhead the privacy rules impose.
Applications of Intelligent Technology to Power System Supervisory Control and Protection Systems
NASA Astrophysics Data System (ADS)
Nagata, Takeshi
Power system supervisory control and protection systems provide utilities with capabilities that are key to a planning business function, i.e., delivering power in a reliable and safe manner. A quality system solution is central to effective operation of a utility's most critical and costly generation, transmission, and distribution assets. The challenging issues for these systems today are not the same as they were few years ago. Today, there is much more placed on integration, use of new IT technologies, and access to information for more purposes. This article presents the topics of intelligent technology to the power system supervisory control and protection systems.
Application of a microcomputer-based system to control and monitor bacterial growth.
Titus, J A; Luli, G W; Dekleva, M L; Strohl, W R
1984-02-01
A modular microcomputer-based system was developed to control and monitor various modes of bacterial growth. The control system was composed of an Apple II Plus microcomputer with 64-kilobyte random-access memory; a Cyborg ISAAC model 91A multichannel analog-to-digital and digital-to-analog converter; paired MRR-1 pH, pO(2), and foam control units; and in-house-designed relay, servo control, and turbidimetry systems. To demonstrate the flexibility of the system, we grew bacteria under various computer-controlled and monitored modes of growth, including batch, turbidostat, and chemostat systems. The Apple-ISAAC system was programmed in Labsoft BASIC (extended Applesoft) with an average control program using ca. 6 to 8 kilobytes of memory and up to 30 kilobytes for datum arrays. This modular microcomputer-based control system was easily coupled to laboratory scale fermentors for a variety of fermentations.
Application of a Microcomputer-Based System to Control and Monitor Bacterial Growth
Titus, Jeffrey A.; Luli, Gregory W.; Dekleva, Michael L.; Strohl, William R.
1984-01-01
A modular microcomputer-based system was developed to control and monitor various modes of bacterial growth. The control system was composed of an Apple II Plus microcomputer with 64-kilobyte random-access memory; a Cyborg ISAAC model 91A multichannel analog-to-digital and digital-to-analog converter; paired MRR-1 pH, pO2, and foam control units; and in-house-designed relay, servo control, and turbidimetry systems. To demonstrate the flexibility of the system, we grew bacteria under various computer-controlled and monitored modes of growth, including batch, turbidostat, and chemostat systems. The Apple-ISAAC system was programmed in Labsoft BASIC (extended Applesoft) with an average control program using ca. 6 to 8 kilobytes of memory and up to 30 kilobytes for datum arrays. This modular microcomputer-based control system was easily coupled to laboratory scale fermentors for a variety of fermentations. PMID:16346462
Building a Secure Library System.
ERIC Educational Resources Information Center
Benson, Allen C.
1998-01-01
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Association between use of a health information exchange system and hospital admissions.
Vest, J R; Kern, L M; Campion, T R; Silver, M D; Kaushal, R
2014-01-01
Relevant patient information is frequently difficult to obtain in emergency department (ED) visits. Improved provider access to previously inaccessible patient information may improve the quality of care and reduce hospital admissions. Health information exchange (HIE) systems enable access to longitudinal, community-wide patient information at the point of care. However, the ability of HIE to avert admissions is not well demonstrated. We sought to determine if HIE system usage is correlated with a reduction in admissions via the ED. We identified 15,645 adults from New York State with an ED visit during a 6-month period, all of whom consented to have their information accessible in the HIE system, and were continuously enrolled in two area health plans. Using claims we determined if the ED encounter resulted in an admission. We used the HIE's system log files to determine usage during the encounter. We determined the association between HIE system use and the likelihood of admission to the hospital from the ED and potential cost savings. The HIE system was accessed during 2.4% of encounters. The odds of an admission were 30% lower when the system was accessed after controlling for confounding (odds ratio = 0.70; 95%C I= 0.52, 0.95). The annual savings in the sample was $357,000. These findings suggest that the use of an HIE system may reduce hospitalizations from the ED with resultant cost savings. This is an important outcome given the substantial financial investment in interventions designed to improve provider access to patient information in the US.
Association Between Use of a Health Information Exchange System and Hospital Admissions
Vest, J.R.; Kern, L.M.; Campion, T.R.; Silver, M.D.; Kaushal, R.
2014-01-01
Summary Objective Relevant patient information is frequently difficult to obtain in emergency department (ED) visits. Improved provider access to previously inaccessible patient information may improve the quality of care and reduce hospital admissions. Health information exchange (HIE) systems enable access to longitudinal, community-wide patient information at the point of care. However, the ability of HIE to avert admissions is not well demonstrated. We sought to determine if HIE system usage is correlated with a reduction in admissions via the ED. Methods We identified 15,645 adults from New York State with an ED visit during a 6-month period, all of whom consented to have their information accessible in the HIE system, and were continuously enrolled in two area health plans. Using claims we determined if the ED encounter resulted in an admission. We used the HIE’s system log files to determine usage during the encounter. We determined the association between HIE system use and the likelihood of admission to the hospital from the ED and potential cost savings. Results The HIE system was accessed during 2.4% of encounters. The odds of an admission were 30% lower when the system was accessed after controlling for confounding (odds ratio = 0.70; 95%C I= 0.52, 0.95). The annual savings in the sample was $357,000. Conclusion These findings suggest that the use of an HIE system may reduce hospitalizations from the ED with resultant cost savings. This is an important outcome given the substantial financial investment in interventions designed to improve provider access to patient information in the US. PMID:24734135
Network-based production quality control
NASA Astrophysics Data System (ADS)
Kwon, Yongjin; Tseng, Bill; Chiou, Richard
2007-09-01
This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.
NASA Astrophysics Data System (ADS)
Donoho, N.; Graumann, A.; McNamara, D. P.
2015-12-01
In this presentation we will highlight access and availability of NOAA satellite data for near real time (NRT) and retrospective product users. The presentation includes an overview of the current fleet of NOAA satellites and methods of data distribution and access to hundreds of imagery and products offered by the Environmental Satellite Processing Center (ESPC) and the Comprehensive Large Array-data Stewardship System (CLASS). In particular, emphasis on the various levels of services for current and past observations will be presented. The National Environmental Satellite, Data, and Information Service (NESDIS) is dedicated to providing timely access to global environmental data from satellites and other sources. In special cases, users are authorized direct access to NESDIS data distribution systems for environmental satellite data and products. Other means of access include publicly available distribution services such as the Global Telecommunication System (GTS), NOAA satellite direct broadcast services and various NOAA websites and ftp servers, including CLASS. CLASS is NOAA's information technology system designed to support long-term, secure preservation and standards-based access to environmental data collections and information. The National Centers for Environmental Information (NCEI) is responsible for the ingest, quality control, stewardship, archival and access to data and science information. This work will also show the latest technology improvements, enterprise approach and future plans for distribution of exponentially increasing data volumes from future NOAA missions. A primer on access to NOAA operational satellite products and services is available at http://www.ospo.noaa.gov/Organization/About/access.html. Access to post-operational satellite data and assorted products is available at http://www.class.noaa.gov
Tierney, William M; Alpert, Sheri A; Byrket, Amy; Caine, Kelly; Leventhal, Jeremy C; Meslin, Eric M; Schwartz, Peter H
2015-01-01
Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data. We designed a program that captures patients' preferences for provider access to an urban health system's EHR. Patients could allow or restrict providers' access to all data (diagnoses, medications, test results, reports, etc.) or only highly sensitive data (sexually transmitted infections, HIV/AIDS, drugs/alcohol, mental or reproductive health). Except for information in free-text reports, we redacted EHR data shown to providers according to patients' preferences. Providers could "break the glass" to display redacted information. We prospectively studied this system in one primary care clinic, noting redactions and when users "broke the glass," and surveyed providers about their experiences and opinions. Eight of nine eligible clinic physicians and all 23 clinic staff participated. All 105 patients who enrolled completed the preference program. Providers did not know which of their patients were enrolled, nor their preferences for accessing their EHRs. During the 6-month prospective study, 92 study patients (88 %) returned 261 times, during which providers viewed their EHRs 126 times (48 %). Providers "broke the glass" 102 times, 92 times for patients not in the study and ten times for six returning study patients, all of whom had restricted EHR access. Providers "broke the glass" for six (14 %) of 43 returning study patients with redacted data vs. zero among 49 study patients without redactions (p = 0.01). Although 54 % of providers agreed that patients should have control over who sees their EHR information, 58 % believed restricting EHR access could harm provider-patient relationships and 71 % felt quality of care would suffer. Patients frequently preferred restricting provider access to their EHRs. Providers infrequently overrode patients' preferences to view hidden data. Providers believed that restricting EHR access would adversely impact patient care. Applying Fair Information Practice principles to EHRs will require balancing patient preferences, providers' needs, and health care quality.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nicklaus, Dennis J.
2013-10-13
We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less
Attacking the information access problem with expert systems
NASA Technical Reports Server (NTRS)
Ragusa, James M.; Orwig, Gary W.
1991-01-01
The results of applications research directed at finding an improved method of storing and accessing information are presented. Twelve microcomputer-based expert systems shells and five laser-optical formats have been studied, and the general and specific methods of interfacing these technologies are being tested in prototype systems. Shell features and interfacing capabilities are discussed, and results from the study of five laser-optical formats are recounted including the video laser, compact, and WORM disks, and laser cards and film. Interfacing, including laser disk device driver interfacing, is discussed and it is pointed out that in order to control the laser device from within the expert systems application, the expert systems shell must be able to access the device driver software. Potential integrated applications are investigated and an initial list is provided including consumer services, travel, law enforcement, human resources, marketing, and education and training.
Mobula, Linda Meta; Sarfo, Stephen; Arthur, Lynda; Burnham, Gilbert; Plange-Rhule, Jacob; Ansong, Daniel; Gavor, Edith; Ofori-Adjei, David
2018-02-07
Background: There is evidence to suggest that the prevalence of non-communicable diseases (NCDs), in particular cardiovascular diseases and diabetes, are being recognized as forming a substantial proportion of the burden of disease among populations in Low- and Middle-Income Countries (LMICs). Access to treatment is likely a key barrier to the control and prevention of NCD outcomes. Differential pricing, an approach used to price drugs based on the purchasing power of patients in different socioeconomic segments, has been shown to be beneficial and leads to improved access and affordability. Methods: This is a quasi-experimental study, with a pragmatic trial design, to be conducted over the course of three years. A mixed methods design will be used to evaluate the effects of health systems strengthening and differential pricing on the management of diabetes, hypertension and selected cancers in Ghana. A public private partnership was established between all sites that will receive multi-level interventions, including health systems strengthening and access to medicines interventions. Study populations and sites: Study participants will include individuals with new or recently diagnosed hypertension and diabetes (n=3,300), who present to two major referral hospitals, Komfo Anokye Teaching Hospital and Tamale Teaching Hospital, as well as three district hospitals, namely Kings Medical Centre, Agogo Presbyterian District Hospital, and Atua Government Hospital. Discussion: The objective of this study aims to test approaches intended to improve access to drugs for the treatment of hypertension and diabetes, and improve disease control. Patients with these conditions will benefit from health systems strengthening interventions (education, counseling, improved management of disease), and increased access to innovative medicines via differential pricing. Pilot programs also will facilitate health system strengthening at the participating institutions, which includes training of clinicians and updating of guidelines and production of protocols for the treatment of diabetes, hypertension and cancer.
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-01-01
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-06-14
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
Lopez-Iturri, Peio; Aguirre, Erik; Trigo, Jesús Daniel; Astrain, José Javier; Azpilicueta, Leyre; Serrano, Luis; Villadangos, Jesús; Falcone, Francisco
2018-01-29
In the context of hospital management and operation, Intensive Care Units (ICU) are one of the most challenging in terms of time responsiveness and criticality, in which adequate resource management and signal processing play a key role in overall system performance. In this work, a context aware Intensive Care Unit is implemented and analyzed to provide scalable signal acquisition capabilities, as well as to provide tracking and access control. Wireless channel analysis is performed by means of hybrid optimized 3D Ray Launching deterministic simulation to assess potential interference impact as well as to provide required coverage/capacity thresholds for employed transceivers. Wireless system operation within the ICU scenario, considering conventional transceiver operation, is feasible in terms of quality of service for the complete scenario. Extensive measurements of overall interference levels have also been carried out, enabling subsequent adequate coverage/capacity estimations, for a set of Zigbee based nodes. Real system operation has been tested, with ad-hoc designed Zigbee wireless motes, employing lightweight communication protocols to minimize energy and bandwidth usage. An ICU information gathering application and software architecture for Visitor Access Control has been implemented, providing monitoring of the Boxes external doors and the identification of visitors via a RFID system. The results enable a solution to provide ICU access control and tracking capabilities previously not exploited, providing a step forward in the implementation of a Smart Health framework.
McCarty, Elizabeth; Morress, Claire
2009-08-01
Children with a diagnosis of cerebral palsy often have significant physical limitations that prevent exploration and full participation in the environment. Assistive technology systems can provide opportunities for children with physical limitations to interact with their world, enabling play, communication, and daily living skills. Efficient access to and control of the technology is critical for successful use; however, establishing consistent access is often difficult because of the nature of the movement patterns exhibited by children with cerebral palsy. This article describes a 3-phase model of evaluation and intervention developed and used by Assistive Technology Services at the Aaron W. Perlman Center, Cincinnati Children's Hospital Medical Center, to establish successful access to technology systems in children with cerebral palsy.
5. VIEW TO SOUTH IN CONTROL ROOM ABOVE PUMP CHAMBER, ...
5. VIEW TO SOUTH IN CONTROL ROOM ABOVE PUMP CHAMBER, SHOWING PUMP MOTOR AND STEEL BULKHEADS IN FLOOR FOR ACCESS TO PUMPS - Providence Sewage Treatment System, Reservoir Avenue Pumping Station, Reservoir & Pontiac Avenues, Providence, Providence County, RI
Canonical formalism for modelling and control of rigid body dynamics.
Gurfil, P
2005-12-01
This paper develops a new paradigm for stabilization of rigid-body dynamics. The state-space model is formulated using canonical elements, known as the Serret-Andoyer (SA) variables, thus far scarcely used for engineering applications. The main feature of the SA formalism is the reduction of the dynamics via the underlying symmetry stemming from conservation of angular momentum and rotational kinetic energy. The controllability of the system model is examined using the notion of accessibility, and is shown to be accessible from all points. Based on the accessibility proof, two nonlinear asymptotic feedback stabilizers are developed: a damping feedback is designed based on the Jurdjevic-Quinn method, and a Hamiltonian controller is derived by using the Hamiltonian as a natural Lyapunov function for the closed-loop dynamics. It is shown that the Hamiltonian control is both passive and inverse optimal with respect to a meaningful performance index. The performance of the new controllers is examined and compared using simulations of realistic scenarios from the satellite attitude dynamics field.
Network support for turn-taking in multimedia collaboration
NASA Astrophysics Data System (ADS)
Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.
1997-01-01
The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.
Resilient Control and Intrusion Detection for SCADA Systems
2014-05-01
Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human
A new titration system of a novel split-type superconducting magnet NMR spectrometer.
Kitagawa, Isao; Tanaka, Hideki; Okada, Michiya; Kitaguchi, Hitoshi; Kohzuma, Takamitsu
2008-12-01
A new titration system for studying protein-ligand interactions has been developed. In this system, the sample solution is circulated in the route formed by an access path in a split superconducting magnet to maintain a constant protein concentration during the titration experiments. A concentration-control procedure for the ligand/protein ratio is devised, and the ligand/protein ratio is well controlled by this apparatus.
Network Upgrade for the SLC: PEP II Network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crane, M.; Call, M.; Clark, S.
2011-09-09
The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status informationmore » is included.« less
46 CFR 189.55-5 - Plans and specifications required for new construction.
Code of Federal Regulations, 2012 CFR
2012-10-01
... of the alarm and extinguishing systems, the fire extinguishers, means of access to different... dampers and the number identifying each system. (2) Ventilation diagram including dampers and other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains...
46 CFR 189.55-5 - Plans and specifications required for new construction.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., the arrangement of the alarm and extinguishing systems, the fire extinguishers, means of access to... other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains, carbon dioxide, clean agent, foam, and sprinkling systems. (e) Marine engineering. For...
46 CFR 189.55-5 - Plans and specifications required for new construction.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., the arrangement of the alarm and extinguishing systems, the fire extinguishers, means of access to... other fire control features. (3) Details of alarm systems. (4) Details of extinguishing systems, including fire mains, carbon dioxide, clean agent, foam, and sprinkling systems. (e) Marine engineering. For...
75 FR 69645 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
..., pager, Defense Switched Network (DSN) phone, other fax, other mobile, other pager, city, zip code, post... system may used to populate and maintain persona data elements in DoD component networks and systems.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...
13 CFR 102.33 - Security of systems of records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...
SLIMMER--A UNIX System-Based Information Retrieval System.
ERIC Educational Resources Information Center
Waldstein, Robert K.
1988-01-01
Describes an information retrieval system developed at Bell Laboratories to create and maintain a variety of different but interrelated databases, and to provide controlled access to these databases. The components discussed include the interfaces, indexing rules, display languages, response time, and updating procedures of the system. (6 notes…
ERIC Educational Resources Information Center
Schneiderman, Helen, Ed.
1994-01-01
Environmental control units, or ECUs, are devices or systems which allow for alternate access to electronic or electrical devices and those objects, like draperies and doors, which may be adapted for use with electricity. Such devices offer the person with a mobility limitation the opportunity to control his or her environment, thus enhancing the…
Centralized Accounting and Electronic Filing Provides Efficient Receivables Collection.
ERIC Educational Resources Information Center
School Business Affairs, 1983
1983-01-01
An electronic filing system makes financial control manageable at Bowling Green State University, Ohio. The system enables quick access to computer-stored consolidated account data and microfilm images of charges, statements, and other billing documents. (MLF)
Hu, Peter F; Xiao, Yan; Ho, Danny; Mackenzie, Colin F; Hu, Hao; Voigt, Roger; Martz, Douglas
2006-06-01
One of the major challenges for day-of-surgery operating room coordination is accurate and timely situation awareness. Distributed and secure real-time status information is key to addressing these challenges. This article reports on the design and implementation of a passive status monitoring system in a 19-room surgical suite of a major academic medical center. Key design requirements considered included integrated real-time operating room status display, access control, security, and network impact. The system used live operating room video images and patient vital signs obtained through monitors to automatically update events and operating room status. Images were presented on a "need-to-know" basis, and access was controlled by identification badge authorization. The system delivered reliable real-time operating room images and status with acceptable network impact. Operating room status was visualized at 4 separate locations and was used continuously by clinicians and operating room service providers to coordinate operating room activities.
Finite-dimensional modeling of network-induced delays for real-time control systems
NASA Technical Reports Server (NTRS)
Ray, Asok; Halevi, Yoram
1988-01-01
In integrated control systems (ICS), a feedback loop is closed by the common communication channel, which multiplexes digital data from the sensor to the controller and from the controller to the actuator along with the data traffic from other control loops and management functions. Due to asynchronous time-division multiplexing in the network access protocols, time-varying delays are introduced in the control loop, which degrade the system dynamic performance and are a potential source of instability. The delayed control system is represented by a finite-dimensional, time-varying, discrete-time model which is less complex than the existing continuous-time models for time-varying delays; this approach allows for simpler schemes for analysis and simulation of the ICS.
Virtual collaborative environments: programming and controlling robotic devices remotely
NASA Astrophysics Data System (ADS)
Davies, Brady R.; McDonald, Michael J., Jr.; Harrigan, Raymond W.
1995-12-01
This paper describes a technology for remote sharing of intelligent electro-mechanical devices. An architecture and actual system have been developed and tested, based on the proposed National Information Infrastructure (NII) or Information Highway, to facilitate programming and control of intelligent programmable machines (like robots, machine tools, etc.). Using appropriate geometric models, integrated sensors, video systems, and computing hardware; computer controlled resources owned and operated by different (in a geographic sense as well as legal sense) entities can be individually or simultaneously programmed and controlled from one or more remote locations. Remote programming and control of intelligent machines will create significant opportunities for sharing of expensive capital equipment. Using the technology described in this paper, university researchers, manufacturing entities, automation consultants, design entities, and others can directly access robotic and machining facilities located across the country. Disparate electro-mechanical resources will be shared in a manner similar to the way supercomputers are accessed by multiple users. Using this technology, it will be possible for researchers developing new robot control algorithms to validate models and algorithms right from their university labs without ever owning a robot. Manufacturers will be able to model, simulate, and measure the performance of prospective robots before selecting robot hardware optimally suited for their intended application. Designers will be able to access CNC machining centers across the country to fabricate prototypic parts during product design validation. An existing prototype architecture and system has been developed and proven. Programming and control of a large gantry robot located at Sandia National Laboratories in Albuquerque, New Mexico, was demonstrated from such remote locations as Washington D.C., Washington State, and Southern California.
NASA Technical Reports Server (NTRS)
Kingsbury, Brent K.
1986-01-01
Described is the implementation of a networked, UNIX based queueing system developed on contract for NASA. The system discussed supports both batch and device requests, and provides the facilities of remote queueing, request routing, remote status, queue access controls, batch request resource quota limits, and remote output return.
75 FR 76428 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-08
..., country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other... to populate and maintain personal data elements in DoD Component networks and systems, such as.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...
An E-Hospital Security Architecture
NASA Astrophysics Data System (ADS)
Tian, Fang; Adams, Carlisle
In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.
ERIC Educational Resources Information Center
Hill, Linda L.; Crosier, Scott J.; Smith, Terrence R.; Goodchild, Michael; Iannella, Renato; Erickson, John S.; Reich, Vicky; Rosenthal, David S. H.
2001-01-01
Includes five articles. Topics include requirements for a content standard to describe computational models; architectures for digital rights management systems; access control for digital information objects; LOCKSS (Lots of Copies Keep Stuff Safe) that allows libraries to run Web caches for specific journals; and a Web site from the U.S.…
External access to ALICE controls conditions data
NASA Astrophysics Data System (ADS)
Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.
2014-06-01
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.
NASA Astrophysics Data System (ADS)
Stevens, T.; Olsen, L. M.; Ritz, S.; Morahan, M.; Aleman, A.; Cepero, L.; Gokey, C.; Holland, M.; Cordova, R.; Areu, S.; Cherry, T.; Tran-Ho, H.
2012-12-01
Discovering Earth science data can be complex if the catalog holding the data lacks structure. Controlled keyword vocabularies within metadata catalogues can improve data discovery. NASA's Global Change Master Directory's (GCMD) Keyword Management System (KMS) is a recently released a RESTful web service for managing and providing access to controlled keywords (science keywords, service keywords, platforms, instruments, providers, locations, projects, data resolution, etc.). The KMS introduces a completely new paradigm for the use and management of the keywords and allows access to these keywords as SKOS Concepts (RDF), OWL, standard XML, and CSV. A universally unique identifier (UUID) is automatically assigned to each keyword, which uniquely identifies each concept and its associated information. A component of the KMS is the keyword manager, an internal tool that allows GCMD science coordinators to manage concepts. This includes adding, modifying, and deleting broader, narrower, or related concepts and associated definitions. The controlled keyword vocabulary represents over 20 years of effort and collaboration with the Earth science community. The maintenance, stability, and ongoing vigilance in maintaining mutually exclusive and parallel keyword lists is important for a "normalized" search and discovery, and provides a unique advantage for the science community. Modifications and additions are made based on community suggestions and internal review. To help maintain keyword integrity, science keyword rules and procedures for modification of keywords were developed. This poster will highlight the use of the KMS as a beneficial service for the stewardship and access of the GCMD keywords. Users will learn how to access the KMS and utilize the keywords. Best practices for managing an extensive keyword hierarchy will also be discussed. Participants will learn the process for making keyword suggestions, which subsequently help in building a controlled keyword vocabulary to improve earth science data discovery and access.
Stocker, Gernot; Rieder, Dietmar; Trajanoski, Zlatko
2004-03-22
ClusterControl is a web interface to simplify distributing and monitoring bioinformatics applications on Linux cluster systems. We have developed a modular concept that enables integration of command line oriented program into the application framework of ClusterControl. The systems facilitate integration of different applications accessed through one interface and executed on a distributed cluster system. The package is based on freely available technologies like Apache as web server, PHP as server-side scripting language and OpenPBS as queuing system and is available free of charge for academic and non-profit institutions. http://genome.tugraz.at/Software/ClusterControl
Access control mechanism of wireless gateway based on open flow
NASA Astrophysics Data System (ADS)
Peng, Rong; Ding, Lei
2017-08-01
In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.
Multi-static networked 3D ladar for surveillance and access control
NASA Astrophysics Data System (ADS)
Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.
2007-04-01
A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.
Device Oriented Project Controller
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dalesio, Leo; Kraimer, Martin
2013-11-20
This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions havemore » been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.« less
Impact of Advanced (Open) Access Scheduling on Patients With Chronic Diseases
Degani, N
2013-01-01
Background The goal of advanced access scheduling is to eliminate wait times for physician visits by ensuring access to same-day appointments, regardless of urgency or health care need. The intent is to reduce delays in access, leading to improvements in clinical care and patient satisfaction, and reductions in the use of urgent care. Objective To evaluate whether implementation of an advanced access scheduling system reduced other types of health service utilization and/or improved clinical measures and patient satisfaction among adults with chronic diseases. Data Sources and Review Methods A literature search was performed on January 29, 2012, for studies published from 1946 (OVID) or 1980 (EMBASE) to January 29, 2012. Systematic reviews, randomized controlled trials, and observational studies were eligible if they evaluated advanced access implementation in adults with chronic diseases and reported health resource utilization, patient outcomes, or patient satisfaction. Results were summarized descriptively. Results One systematic review in a primary care population and 4 observational studies (5 papers) in chronic disease and/or geriatric populations were identified. The systematic review concluded that advanced access did not improve clinical outcomes, but there was no evidence of harm. Findings from the observational studies in chronic disease populations were consistent with those of the systematic review. Advanced access implementation was not consistently associated with changes in clinical outcomes, patient satisfaction, or health service utilization. Limitations All studies were retrospective: 3 studies (4 papers) included historical controls only, and 1 included contemporaneous controls. Findings were inconsistent across studies for a number of outcomes. Conclusions Based on low to very low quality evidence, advanced access did not have a statistically (or clinically) significant impact on health service utilization among patients with diabetes and/or coronary artery disease (CAD). Very low quality evidence showed a significant reduction in the proportion of patients with diabetes and CAD admitted to hospital whose length of stay was greater than 3 days. Evidence was inconsistent for changes in clinical outcomes for patients with diabetes or CAD. Very low quality evidence showed no increase in patient satisfaction with an advanced access scheduling system. Plain Language Summary Timeliness of health care access—reducing wait times and delays for those receiving and providing care—is a key measure of health system quality. However, in international comparison studies, Canada ranked either last or next to last when it came to timely access to regular doctors. Efforts in Ontario to address delays in access have included the implementation of the Advanced Access and Efficiency for Primary Care initiative through the Quality Improvement and Innovation Partnership, later incorporated into Health Quality Ontario. Advanced access is a physician appointment scheduling system that aims to eliminate wait times for physician visits and ensure same-day access for all patients, regardless of urgency or health care need. While it can generally be agreed that timely access to health care is necessary for all patients, same-day access may not always be required. Indeed, advanced access may adversely affect the care of patients with chronic diseases if clinics implement strict same-day appointment rules and patients cannot pre-book follow-up appointments. This review evaluated the effect of advanced access scheduling on clinical outcomes, patient satisfaction, and health service utilization in patients with selected chronic diseases, as part of the Optimizing Chronic Disease Management in the Outpatient (Community) Setting mega-analysis. In patients with diabetes or coronary artery disease, advanced access implementation had little or no impact on acute health care use (hospitalizations, emergency department visits, and/or urgent care visits) and had inconsistent effects on clinical outcomes (blood glucose, low-density lipoprotein [LDL] cholesterol, and blood pressure). Two studies reported reduced monitoring of patients with chronic diseases after implementation of advanced access. Another study reported improved patient management (regular blood glucose and cholesterol testing) after advanced access implementation, but this was attributed to improved provider continuity rather than to reduced appointment wait times. There was no increase in patient satisfaction with the advanced access scheduling system. The quality of the evidence ranged from low to very low. PMID:24133569
NASA Technical Reports Server (NTRS)
Karl, D. R.
1972-01-01
An evaluation was made of the feasibility of utilizing a simplified man machine interface concept to manage and control a complex space system involving multiple redundant computers that control multiple redundant subsystems. The concept involves the use of a CRT for display and a simple keyboard for control, with a tree-type control logic for accessing and controlling mission, systems, and subsystem elements. The concept was evaluated in terms of the Phase B space shuttle orbiter, to utilize the wide scope of data management and subsystem control inherent in the central data management subsystem provided by the Phase B design philosophy. Results of these investigations are reported in four volumes.
Project management; considerations for success.
Maas, Jos
2013-01-01
During the past two years the author was a project leader for three Information Communication Technology (ICT) security related systems projects for a newly built healthcare facility. These projects were: a CCTV system, an Access Control system and an Identity & Access Management system. During those two years he gained experiences on how to coop with ICT projects related to security and healthcare as well as some pitfalls to be contended with along the way. With this article, he shares his experiences so that colleagues can benefit from them when they are a project leaders for their health facility and need to better decide how or how not to address their project and project issues.
NASA Technical Reports Server (NTRS)
Moore, Reagan W.; Jagatheesan, Arun; Rajasekar, Arcot; Wan, Michael; Schroeder, Wayne
2004-01-01
The "Grid" is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are being built around the world as the next generation data handling systems for sharing, publishing, and preserving data residing on storage systems located in multiple administrative domains. A data grid provides logical namespaces for users, digital entities and storage resources to create persistent identifiers for controlling access, enabling discovery, and managing wide area latencies. This paper introduces data grids and describes data grid use cases. The relevance of data grids to digital libraries and persistent archives is demonstrated, and research issues in data grids and grid dataflow management systems are discussed.
NASA Astrophysics Data System (ADS)
Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung
2010-12-01
This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.
49 CFR 571.207 - Standard No. 207; Seating systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Motor Vehicle Safety Standards § 571.207 Standard No. 207; Seating systems. S1. Purpose and scope. This... equipped with the device and, if access to the control is required in order to exit from the vehicle, to...
Access Control Is More than Security.
ERIC Educational Resources Information Center
Fickes, Michael
2002-01-01
Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)
Application-Defined Decentralized Access Control
Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett
2014-01-01
DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493
Cunningham, James; Ainsworth, John
2017-01-01
The rise of distributed ledger technology, initiated and exemplified by the Bitcoin blockchain, is having an increasing impact on information technology environments in which there is an emphasis on trust and security. Management of electronic health records, where both conformation to legislative regulations and maintenance of public trust are paramount, is an area where the impact of these new technologies may be particularly beneficial. We present a system that enables fine-grained personalized control of third-party access to patients' electronic health records, allowing individuals to specify when and how their records are accessed for research purposes. The use of the smart contract based Ethereum blockchain technology to implement this system allows it to operate in a verifiably secure, trustless, and openly auditable environment, features crucial to health information systems moving forward.
75 FR 19946 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-16
... of records in the system: Delete entry and replace with ``Individual's name, organizational and home..., contact listing files, organizational telephone directories, and listing of office personnel.'' [[Page... are used to control access to the system data, and procedures are in place to deter and detect...
The use of twin-screen-based WIMPS in spacecraft control
NASA Astrophysics Data System (ADS)
Klim, R. D.
1990-10-01
The ergonomic problems of designing a sophisticated Windows Icons Mouse Pop-up (WIMP) based twin screen workstation are outlined. These same problems will be encountered by future spacecraft controllers. The design of a modern, advanced workstation for use on a distributed multicontrol center in a multisatellite control system is outlined. The system uses access control mechanisms to ensure that only authorized personnel can undertake certain operations on the workstation. Rules governing the use of windowing features, screen attributes, icons, keyboard and mouse in spacecraft control are discussed.
Randolph, John David; Lloyd, Peter Downes; Love, Lonnie Joe; Kwon, Dong Soo; Blank, James Allen; Davis, Hurley Thomas
2001-01-01
An apparatus for performing a task in a confined space having an access port. The apparatus comprise: a confinement box securable to the access port of the confined space; a shell extending from the confinement box; a teleoperated arm movable between a retracted position, in which the teleoperated arm is disposed within the shell, and a deployed position, in which the teleoperated arm extends through the access port and into the confined space to perform the task; and a control system for commanding the teleoperated arm. The arm links and joint connectors of the teleoperated arm assembly are the conduits for the process
Eight microprocessor-based instrument data systems in the Galileo Orbiter spacecraft
NASA Technical Reports Server (NTRS)
Barry, R. C.
1980-01-01
Instrument data systems consist of a microprocessor, 3K bytes of Read Only Memory and 3K bytes of Random Access Memory. It interfaces with the spacecraft data bus through an isolated user interface with a direct memory access bus adaptor, and/or parallel data from instrument devices such as registers, buffers, analog to digital converters, multiplexers, and solid state sensors. These data systems support the spacecraft hardware and software communication protocol, decode and process instrument commands, generate continuous instrument operating modes, control the instrument mechanisms, acquire, process, format, and output instrument science data.
Securing Ground Data System Applications for Space Operations
NASA Technical Reports Server (NTRS)
Pajevski, Michael J.; Tso, Kam S.; Johnson, Bryan
2014-01-01
The increasing prevalence and sophistication of cyber attacks has prompted the Multimission Ground Systems and Services (MGSS) Program Office at Jet Propulsion Laboratory (JPL) to initiate the Common Access Manager (CAM) effort to protect software applications used in Ground Data Systems (GDSs) at JPL and other NASA Centers. The CAM software provides centralized services and software components used by GDS subsystems to meet access control requirements and ensure data integrity, confidentiality, and availability. In this paper we describe the CAM software; examples of its integration with spacecraft commanding software applications and an information management service; and measurements of its performance and reliability.
Kagan, Ilya; Cohen, Rachel; Fish, Miri; Mezare, Henia Perry
2014-01-01
This article describes the development and implementation of the Nursing Quality Indicators Scale and a quality control system for hospital nursing care, which allows universal access to all external and internal audit results, thus ensuring complete data transparency. Standardized indicators make departments' performance comparable. Key to the new system is nurses' self-audit and responsibility for making quality improvements at the ward level.
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
Kuhn, Stefan; Schlörer, Nils E
2015-08-01
nmrshiftdb2 supports with its laboratory information management system the integration of an electronic lab administration and management into academic NMR facilities. Also, it offers the setup of a local database, while full access to nmrshiftdb2's World Wide Web database is granted. This freely available system allows on the one hand the submission of orders for measurement, transfers recorded data automatically or manually, and enables download of spectra via web interface, as well as the integrated access to prediction, search, and assignment tools of the NMR database for lab users. On the other hand, for the staff and lab administration, flow of all orders can be supervised; administrative tools also include user and hardware management, a statistic functionality for accounting purposes, and a 'QuickCheck' function for assignment control, to facilitate quality control of assignments submitted to the (local) database. Laboratory information management system and database are based on a web interface as front end and are therefore independent of the operating system in use. Copyright © 2015 John Wiley & Sons, Ltd.
Accessible microscopy workstation for students and scientists with mobility impairments.
Duerstock, Bradley S
2006-01-01
An integrated accessible microscopy workstation was designed and developed to allow persons with mobility impairments to control all aspects of light microscopy with minimal human assistance. This system, named AccessScope, is capable of performing brightfield and fluorescence microscopy, image analysis, and tissue morphometry requisite for undergraduate science courses to graduate-level research. An accessible microscope is necessary for students and scientists with mobility impairments to be able to use a microscope independently to better understand microscopical imaging concepts and cell biology. This knowledge is not always apparent by simply viewing a catalog of histological images. The ability to operate a microscope independently eliminates the need to hire an assistant or rely on a classmate and permits one to take practical laboratory examinations by oneself. Independent microscope handling is also crucial for graduate students and scientists with disabilities to perform scientific research. By making a personal computer as the user interface for controlling AccessScope functions, different upper limb mobility impairments could be accommodated by using various computer input devices and assistive technology software. Participants with a range of upper limb mobility impairments evaluated the prototype microscopy workstation. They were able to control all microscopy functions including loading different slides without assistance.
Planning assistance for the NASA 30/20 GHz program. Network control architecture study.
NASA Technical Reports Server (NTRS)
Inukai, T.; Bonnelycke, B.; Strickland, S.
1982-01-01
Network Control Architecture for a 30/20 GHz flight experiment system operating in the Time Division Multiple Access (TDMA) was studied. Architecture development, identification of processing functions, and performance requirements for the Master Control Station (MCS), diversity trunking stations, and Customer Premises Service (CPS) stations are covered. Preliminary hardware and software processing requirements as well as budgetary cost estimates for the network control system are given. For the trunking system control, areas covered include on board SS-TDMA switch organization, frame structure, acquisition and synchronization, channel assignment, fade detection and adaptive power control, on board oscillator control, and terrestrial network timing. For the CPS control, they include on board processing and adaptive forward error correction control.
SODR Memory Control Buffer Control ASIC
NASA Technical Reports Server (NTRS)
Hodson, Robert F.
1994-01-01
The Spacecraft Optical Disk Recorder (SODR) is a state of the art mass storage system for future NASA missions requiring high transmission rates and a large capacity storage system. This report covers the design and development of an SODR memory buffer control applications specific integrated circuit (ASIC). The memory buffer control ASIC has two primary functions: (1) buffering data to prevent loss of data during disk access times, (2) converting data formats from a high performance parallel interface format to a small computer systems interface format. Ten 144 p in, 50 MHz CMOS ASIC's were designed, fabricated and tested to implement the memory buffer control function.
Realizing actual feedback control of complex network
NASA Astrophysics Data System (ADS)
Tu, Chengyi; Cheng, Yuhua
2014-06-01
In this paper, we present the concept of feedbackability and how to identify the Minimum Feedbackability Set of an arbitrary complex directed network. Furthermore, we design an estimator and a feedback controller accessing one MFS to realize actual feedback control, i.e. control the system to our desired state according to the estimated system internal state from the output of estimator. Last but not least, we perform numerical simulations of a small linear time-invariant dynamics network and a real simple food network to verify the theoretical results. The framework presented here could make an arbitrary complex directed network realize actual feedback control and deepen our understanding of complex systems.
Baseband-processed SS-TDMA communication system architecture and design concepts
NASA Technical Reports Server (NTRS)
Attwood, S.; Sabourin, D.
1982-01-01
The architecture and system design for a commercial satellite communications system planned for the 1990's was developed by Motorola for NASA's Lewis Research Center. The system provides data communications between individual users via trunking and customer premises service terminals utilizing a central switching satellite operating in a time-division multiple-access (TDMA) mode. The major elements of the design incorporating baseband processing include: demand-assigned multiple access reservation protocol, spectral utilization, system synchronization, modulation technique and forward error control implementation. Motorola's baseband processor design, which is being proven in a proof-of-concept advanced technology development, will perform data regeneration and message routing for individual users on-board the spacecraft.
EPICS Channel Access Server for LabVIEW
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhukov, Alexander P.
It can be challenging to interface National Instruments LabVIEW (http://www.ni.com/labview/) with EPICS (http://www.aps.anl.gov/epics/). Such interface is required when an instrument control program was developed in LabVIEW but it also has to be part of global control system. This is frequently useful in big accelerator facilities. The Channel Access Server is written in LabVIEW, so it works on any hardware/software platform where LabVIEW is available. It provides full server functionality, so any EPICS client can communicate with it.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
... System. OMB Control Number: Pending. Type of Review: New collection, request for a new OMB Control Number... been issued the required two factor authentication tokens can access the FS SAS. The FS SAS allows...
NERISK: AN EXPERT SYSTEM TO ENHANCE THE INTEGRATION OF PESTICIDES WITH ARTHROPOD BIOLOGICAL CONTROL
An expert system termed NERISK was developed to evaluate the effects of pesticides on arthropod predators and parasitoids in a variety of agroecosystems. ased on a shell system (RECOG) with minor coding modifications, the system was designed to let even a novice user access the v...
28 CFR 16.85 - Exemption of U.S. Parole Commission-limited access.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Scheduling and Control System (JUSTICE/PRC-001). (2) Inmate and Supervision Files System (JUSTICE/PRC-003). (3) Labor and Pension Case, Legal File, and General Correspondence System (JUSTICE/PRC-004). (4... OF MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16.85 Exemption of U...
28 CFR 16.85 - Exemption of U.S. Parole Commission-limited access.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Scheduling and Control System (JUSTICE/PRC-001). (2) Inmate and Supervision Files System (JUSTICE/PRC-003). (3) Labor and Pension Case, Legal File, and General Correspondence System (JUSTICE/PRC-004). (4... OF MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16.85 Exemption of U...
28 CFR 16.85 - Exemption of U.S. Parole Commission-limited access.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Scheduling and Control System (JUSTICE/PRC-001). (2) Inmate and Supervision Files System (JUSTICE/PRC-003). (3) Labor and Pension Case, Legal File, and General Correspondence System (JUSTICE/PRC-004). (4... OF MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16.85 Exemption of U...
28 CFR 16.85 - Exemption of U.S. Parole Commission-limited access.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Scheduling and Control System (JUSTICE/PRC-001). (2) Inmate and Supervision Files System (JUSTICE/PRC-003). (3) Labor and Pension Case, Legal File, and General Correspondence System (JUSTICE/PRC-004). (4... OF MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16.85 Exemption of U...
OLMS: Online Learning Management System for E-Learning
ERIC Educational Resources Information Center
Ippakayala, Vinay Kumar; El-Ocla, Hosam
2017-01-01
In this paper we introduce a learning management system that provides a management system for centralized control of course content. A secure system to record lectures is implemented as a key feature of this application. This feature would be accessed through web camera and mobile recording. These features are mainly designed for e-learning…
Secure Remote Access Issues in a Control Center Environment
NASA Technical Reports Server (NTRS)
Pitts, Lee; McNair, Ann R. (Technical Monitor)
2002-01-01
The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.
Automated Computer Access Request System
NASA Technical Reports Server (NTRS)
Snook, Bryan E.
2010-01-01
The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).
Advanced teleprocessing systems
NASA Astrophysics Data System (ADS)
Kleinrock, L.; Gerla, M.
1982-09-01
This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Liu, Xuemei; Ge, Baofeng
2012-04-01
This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.
Meena, Yogesh Kumar; Cecotti, Hubert; Wong-Lin, Kongfatt; Dutta, Ashish; Prasad, Girijesh
2018-04-01
Virtual keyboard applications and alternative communication devices provide new means of communication to assist disabled people. To date, virtual keyboard optimization schemes based on script-specific information, along with multimodal input access facility, are limited. In this paper, we propose a novel method for optimizing the position of the displayed items for gaze-controlled tree-based menu selection systems by considering a combination of letter frequency and command selection time. The optimized graphical user interface layout has been designed for a Hindi language virtual keyboard based on a menu wherein 10 commands provide access to type 88 different characters, along with additional text editing commands. The system can be controlled in two different modes: eye-tracking alone and eye-tracking with an access soft-switch. Five different keyboard layouts have been presented and evaluated with ten healthy participants. Furthermore, the two best performing keyboard layouts have been evaluated with eye-tracking alone on ten stroke patients. The overall performance analysis demonstrated significantly superior typing performance, high usability (87% SUS score), and low workload (NASA TLX with 17 scores) for the letter frequency and time-based organization with script specific arrangement design. This paper represents the first optimized gaze-controlled Hindi virtual keyboard, which can be extended to other languages.
Evaluation of Various Navigation System Concepts
1982-03-01
Naigatimon aar01 N DAutomatic x xx Parallel 0fn x x x x x’ "OLeg t dung. n Mrankuhld M ni raia x N x to~g TAN is I OmuI,2 2mN 0 x "to - - -x...and must permit design of indicators and controls which can be directly interpreted or operated by the pilot at his normal station aboard the...the responsibility of control. The organization that controls the system can theoretically limit access to the system. Because VOVO/DME, Loran-C, and
Purdue ionomics information management system. An integrated functional genomics platform.
Baxter, Ivan; Ouzzani, Mourad; Orcun, Seza; Kennedy, Brad; Jandhyala, Shrinivas S; Salt, David E
2007-02-01
The advent of high-throughput phenotyping technologies has created a deluge of information that is difficult to deal with without the appropriate data management tools. These data management tools should integrate defined workflow controls for genomic-scale data acquisition and validation, data storage and retrieval, and data analysis, indexed around the genomic information of the organism of interest. To maximize the impact of these large datasets, it is critical that they are rapidly disseminated to the broader research community, allowing open access for data mining and discovery. We describe here a system that incorporates such functionalities developed around the Purdue University high-throughput ionomics phenotyping platform. The Purdue Ionomics Information Management System (PiiMS) provides integrated workflow control, data storage, and analysis to facilitate high-throughput data acquisition, along with integrated tools for data search, retrieval, and visualization for hypothesis development. PiiMS is deployed as a World Wide Web-enabled system, allowing for integration of distributed workflow processes and open access to raw data for analysis by numerous laboratories. PiiMS currently contains data on shoot concentrations of P, Ca, K, Mg, Cu, Fe, Zn, Mn, Co, Ni, B, Se, Mo, Na, As, and Cd in over 60,000 shoot tissue samples of Arabidopsis (Arabidopsis thaliana), including ethyl methanesulfonate, fast-neutron and defined T-DNA mutants, and natural accession and populations of recombinant inbred lines from over 800 separate experiments, representing over 1,000,000 fully quantitative elemental concentrations. PiiMS is accessible at www.purdue.edu/dp/ionomics.
Tracking and data relay satellite system - NASA's new spacecraft data acquisition system
NASA Technical Reports Server (NTRS)
Schneider, W. C.; Garman, A. A.
1979-01-01
This paper describes NASA's new spacecraft acquisition system provided by the Tracking and Data Relay Satellite System (TDRSS). Four satellites in geostationary orbit and a ground terminal will provide complete tracking, telemetry, and command service for all of NASA's orbital satellites below a 12,000 km altitude. Western Union will lease the system, operate the ground terminal and provide operational satellite control. NASA's network control center will be the focal point for scheduling user services and controlling the interface between TDRSS and the NASA communications network, project control centers, and data processing. TDRSS single access user spacecraft data systems will be designed for time shared data relay support, and reimbursement policy and rate structure for non-NASA users are being developed.
Implementation of EPICS based vacuum control system for variable energy cyclotron centre, Kolkata
NASA Astrophysics Data System (ADS)
Roy, Anindya; Bhole, R. B.; Nandy, Partha P.; Yadav, R. C.; Pal, Sarbajit; Roy, Amitava
2015-03-01
The vacuum system of the Room Temperature (K = 130) Cyclotron of Variable Energy Cyclotron Centre is comprised of vacuum systems of main machine and Beam Transport System. The vacuum control system is upgraded to a PLC based Automated system from the initial relay based Manual system. The supervisory control of the vacuum system is implemented in Experimental Physics and Industrial Control System (EPICS). An EPICS embedded ARM based vacuum gauge controller is developed to mitigate the requirement of vendor specific gauge controller for gauges and also for seamless integration of the gauge controllers with the control system. A set of MS-Windows ActiveX components with embedded EPICS Channel Access interface are developed to build operator interfaces with less complex programming and to incorporate typical Windows feature, e.g., user authentication, file handling, better fonts, colors, mouse actions etc. into the operator interfaces. The control parameters, monitoring parameters, and system interlocks of the system are archived in MySQL based EPICS MySQL Archiver developed indigenously. In this paper, we describe the architecture, the implementation details, and the performance of the system.
Implementation of EPICS based vacuum control system for variable energy cyclotron centre, Kolkata.
Roy, Anindya; Bhole, R B; Nandy, Partha P; Yadav, R C; Pal, Sarbajit; Roy, Amitava
2015-03-01
The vacuum system of the Room Temperature (K = 130) Cyclotron of Variable Energy Cyclotron Centre is comprised of vacuum systems of main machine and Beam Transport System. The vacuum control system is upgraded to a PLC based Automated system from the initial relay based Manual system. The supervisory control of the vacuum system is implemented in Experimental Physics and Industrial Control System (EPICS). An EPICS embedded ARM based vacuum gauge controller is developed to mitigate the requirement of vendor specific gauge controller for gauges and also for seamless integration of the gauge controllers with the control system. A set of MS-Windows ActiveX components with embedded EPICS Channel Access interface are developed to build operator interfaces with less complex programming and to incorporate typical Windows feature, e.g., user authentication, file handling, better fonts, colors, mouse actions etc. into the operator interfaces. The control parameters, monitoring parameters, and system interlocks of the system are archived in MySQL based EPICS MySQL Archiver developed indigenously. In this paper, we describe the architecture, the implementation details, and the performance of the system.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
... governing local control of communicable diseases, preventive medicine and safety programs, developmental... that is being stored. Access to the computer system containing the records in this system is limited to...
An Introduction to Database Structure and Database Machines.
ERIC Educational Resources Information Center
Detweiler, Karen
1984-01-01
Enumerates principal management objectives of database management systems (data independence, quality, security, multiuser access, central control) and criteria for comparison (response time, size, flexibility, other features). Conventional database management systems, relational databases, and database machines used for backend processing are…
The Use of a Computer-Controlled Random Access Slide Projector for Rapid Information Display.
ERIC Educational Resources Information Center
Muller, Mark T.
A 35mm random access slide projector operated in conjunction with a computer terminal was adapted to meet the need for a more rapid and complex graphic display mechanism than is currently available with teletypewriter terminals. The model projector can be operated manually to provide for a maintenance checkout of the electromechanical system.…
ERIC Educational Resources Information Center
Sandler, Mark
1985-01-01
Discusses several concerns about nature of online public access catalogs (OPAC) that have particular import to reference librarians: user passivity and loss of control growing out of "human-machine interface" and the larger social context; and the tendency of computerized bibliographic systems to obfuscate human origins of library…
ERIC Educational Resources Information Center
Heilprin, Laurence B.
The literature of knowledge is a very large system in the cybernetic sense of intractibility to control. Improving access to it needs some simplifying theory. A step in this direction is a hypothesis constructed from basic concepts. These include cybernetic concepts of variety and requisite variety; a version of the mathematical concept of…
NASA Astrophysics Data System (ADS)
Wright, S. A.; Bennett, G. E.; Andrews, T.; Melis, T. S.; Topping, D. J.
2005-05-01
Currently, in-situ monitoring of water quality parameters (e.g. water temperature, conductivity, turbidity) in the Colorado River ecosystem typically consists of deploying instruments in the river, retrieving them at a later date, downloading the datalogger, then examining the data; an arduous process in the remote settings of Grand Canyon. Under this protocol, data is not available real-time and there is no way to detect problems with the instrumentation until after retrieval. The next obvious stage in the development of in-situ monitoring in Grand Canyon was the advent of one-way telemetry, i.e. streaming data in real-time from the instrument to the office and/or the world-wide-web. This protocol allows for real-time access to data and the identification of instrumentation problems, but still requires a site visit to address instrument malfunctions, i.e. the user does not have the ability to remotely control the instrument. At some field sites, such as the Colorado River in Grand Canyon, site visitation is restricted by remoteness and lack of traditional access routes (i.e. roads). Even at less remote sites, it may still be desirable to have two-way communication with instruments in order to, for example, diagnose and potentially fix instrumentation problems, change sampling parameters to save battery power, etc., without having to visit the site. To this end, the U.S. Geological Survey, Grand Canyon Monitoring and Research Center, is currently developing and testing a high-speed, two-way communication system that allows for real-time data access and remote control of instrumentation. The approach tested relies on internet access and may be especially useful in areas where land-line or cellular connections are unavailable. The system is composed of off-the-shelf products, uses a commercial broadband satellite service, and is designed in a generic way such that any instrument that communicates through RS-232 communication (i.e. a serial port) is compatible with the system. We are currently testing the system at two sites on the Colorado River in Grand Canyon and at one critical monitoring site on the Paria River where we have deployed suites of instruments for monitoring flow, sediment concentration, temperature, and conductivity. One aspect of the system that may be particularly useful for ecohydrological applications is the ability to remotely control on-site pump samplers, which allows for the collection of a water sample by the press of a button in the office.
76 FR 18191 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-01
... action would be effective without further notice on May 2, 2011 unless comments are received which result... replace with ``DMDC 10 DoD.'' * * * * * System location: Delete entry and replace with ``Defense Manpower... facilities or using facilities interfacing with Defense Manpower Data Center Physical Access Control Systems...
78 FR 14283 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... Defense. S500.55 System name: Information Technology Access and Control Records (December 2, 2008, 73 FR... without change, including any personal identifiers or contact information. FOR FURTHER INFORMATION CONTACT.... SUPPLEMENTARY INFORMATION: The Defense Logistics Agency's system of record subject to the Privacy Act of 1974 (5...
The Lincoln Training System: A Summary Report.
ERIC Educational Resources Information Center
Butman, Robert C.; Frick, Frederick C.
The current status of the Lincoln Training System (LTS) is reported. This document describes LTS as a computer supported microfiche system which: 1) provides random access to voice quality audio and to graphics; 2) supports student-controlled interactive processes; and 3) functions in a variety of environments. The report offers a detailed…
ERIC Educational Resources Information Center
Kennedy, Mike
2000-01-01
Examines how the use of electronic access-control system enables college and universities to provide a safer environment for students and staff. The advantages of no-key doors, adapting entry card systems for multiple uses, and successfully retaining lock and key systems when facilities do not lend themselves to electronic security are discussed.…
Aquatic access for the disabled.
Walk, E E; Himel, H N; Batra, E K; Baruch, L; O'Connor, M B; Tanner, A E; Edlich, R F
1992-01-01
Innovations in rehabilitation engineering can now provide aquatic access for the disabled. In the regional burn center, the Bodi-Gard cart shower system (Hospital Therapy Products, Inc., Wood Dale, Ill.) uses three flexible hoses to provide precise hydrotherapy and debridement. Its main mixing valve controls temperature and pressure and is easily disinfected by an in-line chamber. This shower system is complemented by the foldable Bodi-Gard mobile seat shower system (Hospital Therapy Products, Inc.). This system, which is covered by a disposable liner, surrounds the patient with eight water jets that empty into any floor drain. The Bather 2001 (Silcraft Corp., Traverse City, Mich.) is a fiberglass hydrotherapy bathtub with a unique Aqua-Seal door (Silcraft Corp.) that can be raised to provide patient access. Its unique closed-loop disinfection system prevents contamination of its internal components. The Nolan Tublift (Aquatic Access, Louisville, Ky.) is a lightweight, removable lift that uses water power to gently raise and lower its seat. It can be manually swiveled to allow access from a wheelchair. Transfer benches span the tub wall to provide access to the shower and bathtub. Although they are a less expensive alternative to the Tublift, they allow water to spill outside the tub, which may create a slippery bathroom floor. The Nolan Poolift (Guardian Products, Arleta, Calif.) is a water-powered pool lift, which automatically rotates as it descends. It is capable of lifting up to 135 kg with a home water pressure of 55 psi. In contrast, the water-powered Aquatic Access Poolift is a less expensive pool lift, which rotates manually with assistance.(ABSTRACT TRUNCATED AT 250 WORDS)
T-LECS: The Control Software System for MOIRCS
NASA Astrophysics Data System (ADS)
Yoshikawa, T.; Omata, K.; Konishi, M.; Ichikawa, T.; Suzuki, R.; Tokoku, C.; Katsuno, Y.; Nishimura, T.
2006-07-01
MOIRCS (Multi-Object Infrared Camera and Spectrograph) is a new instrument for the Subaru Telescope. We present the system design of the control software system for MOIRCS, named T-LECS (Tohoku University - Layered Electronic Control System). T-LECS is a PC-Linux based network distributed system. Two PCs equipped with the focal plane array system operate two HAWAII2 detectors, respectively, and another PC is used for user interfaces and a database server. Moreover, these PCs control various devices for observations distributed on a TCP/IP network. T-LECS has three interfaces; interfaces to the devices and two user interfaces. One of the user interfaces is to the integrated observation control system (Subaru Observation Software System) for observers, and another one provides the system developers the direct access to the devices of MOIRCS. In order to help the communication between these interfaces, we employ an SQL database system.
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang
2017-07-24
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Router Agent Technology for Policy-Based Network Management
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston
2011-01-01
This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.
Interactive water monitoring system accessible by cordless telephone
NASA Astrophysics Data System (ADS)
Volpicelli, Richard; Andeweg, Pierre; Hagar, William G.
1985-12-01
A battery-operated, microcomputer-controlled monitoring device linked with a cordless telephone has been developed for remote measurements. This environmental sensor is self-contained and collects and processes data according to the information sent to its on-board computer system. An RCA model 1805 microprocessor forms the basic controller with a program encoded in memory for data acquisition and analysis. Signals from analog sensing devices used to monitor the environment are converted into digital signals and stored in random access memory of the microcomputer. This remote sensing system is linked to the laboratory by means of a cordless telephone whose base unit is connected to regular telephone lines. This offshore sensing system is simply accessed by a phone call originating from a computer terminal in the laboratory. Data acquisition is initiated upon request: Information continues to be processed and stored until the computer is reprogrammed by another phone call request. Information obtained may be recalled by a phone call after the desired environmental measurements are finished or while they are in progress. Data sampling parameters may be reset at any time, including in the middle of a measurement cycle. The range of the system is limited only by existing telephone grid systems and by the transmission characteristics of the cordless phone used as a communications link. This use of a cordless telephone, coupled with the on-board computer system, may be applied to other field studies requiring data transfer between an on-site analytical system and the laboratory.
SigmaCLIPSE = presentation management + NASA CLI PS + SQL
NASA Technical Reports Server (NTRS)
Weiss, Bernard P., Jr.
1990-01-01
SigmaCLIPSE provides an expert systems and 'intelligent' data base development program for diverse systems integration environments that require support for automated reasoning and expert systems technology, presentation management, and access to 'intelligent' SQL data bases. The SigmaCLIPSE technology and and its integrated ability to access 4th generation application development and decision support tools through a portable SQL interface, comprises a sophisticated software development environment for solving knowledge engineering and expert systems development problems in information intensive commercial environments -- financial services, health care, and distributed process control -- where the expert system must be extendable -- a major architectural advantage of NASA CLIPS. SigmaCLIPSE is a research effort intended to test the viability of merging SQL data bases with expert systems technology.
Aguirre, Erik
2018-01-01
In the context of hospital management and operation, Intensive Care Units (ICU) are one of the most challenging in terms of time responsiveness and criticality, in which adequate resource management and signal processing play a key role in overall system performance. In this work, a context aware Intensive Care Unit is implemented and analyzed to provide scalable signal acquisition capabilities, as well as to provide tracking and access control. Wireless channel analysis is performed by means of hybrid optimized 3D Ray Launching deterministic simulation to assess potential interference impact as well as to provide required coverage/capacity thresholds for employed transceivers. Wireless system operation within the ICU scenario, considering conventional transceiver operation, is feasible in terms of quality of service for the complete scenario. Extensive measurements of overall interference levels have also been carried out, enabling subsequent adequate coverage/capacity estimations, for a set of Zigbee based nodes. Real system operation has been tested, with ad-hoc designed Zigbee wireless motes, employing lightweight communication protocols to minimize energy and bandwidth usage. An ICU information gathering application and software architecture for Visitor Access Control has been implemented, providing monitoring of the Boxes external doors and the identification of visitors via a RFID system. The results enable a solution to provide ICU access control and tracking capabilities previously not exploited, providing a step forward in the implementation of a Smart Health framework. PMID:29382148
A Magneto-Inductive Sensor Based Wireless Tongue-Computer Interface
Huo, Xueliang; Wang, Jia; Ghovanloo, Maysam
2015-01-01
We have developed a noninvasive, unobtrusive magnetic wireless tongue-computer interface, called “Tongue Drive,” to provide people with severe disabilities with flexible and effective computer access and environment control. A small permanent magnet secured on the tongue by implantation, piercing, or tissue adhesives, is utilized as a tracer to track the tongue movements. The magnetic field variations inside and around the mouth due to the tongue movements are detected by a pair of three-axial linear magneto-inductive sensor modules mounted bilaterally on a headset near the user’s cheeks. After being wirelessly transmitted to a portable computer, the sensor output signals are processed by a differential field cancellation algorithm to eliminate the external magnetic field interference, and translated into user control commands, which could then be used to access a desktop computer, maneuver a powered wheelchair, or control other devices in the user’s environment. The system has been successfully tested on six able-bodied subjects for computer access by defining six individual commands to resemble mouse functions. Results show that the Tongue Drive system response time for 87% correctly completed commands is 0.8 s, which yields to an information transfer rate of ~130 b/min. PMID:18990653
National Airspace System. Operational Requirements.
1984-10-01
1. Access to manned NAS tacilities shall be control’ed at all times to prevent intc.rruptio;i of service., distraction of specialists, and theft of...user requirements which cannot otherwise be accomplished. ALTRVs are approved by the appropriate FAA facility. AREA CONTROL1 FACILITY (ACF) - A
A novel and lightweight system to secure wireless medical sensor networks.
He, Daojing; Chan, Sammy; Tang, Shaohua
2014-01-01
Wireless medical sensor networks (MSNs) are a key enabling technology in e-healthcare that allows the data of a patient's vital body parameters to be collected by the wearable or implantable biosensors. However, the security and privacy protection of the collected data is a major unsolved issue, with challenges coming from the stringent resource constraints of MSN devices, and the high demand for both security/privacy and practicality. In this paper, we propose a lightweight and secure system for MSNs. The system employs hash-chain based key updating mechanism and proxy-protected signature technique to achieve efficient secure transmission and fine-grained data access control. Furthermore, we extend the system to provide backward secrecy and privacy preservation. Our system only requires symmetric-key encryption/decryption and hash operations and is thus suitable for the low-power sensor nodes. This paper also reports the experimental results of the proposed system in a network of resource-limited motes and laptop PCs, which show its efficiency in practice. To the best of our knowledge, this is the first secure data transmission and access control system for MSNs until now.
McClelland, Shearwood; Page, Brandi R; Jaboin, Jerry J; Chapman, Christina H; Deville, Curtiland; Thomas, Charles R
2017-01-01
African Americans experience the highest burden of cancer incidence and mortality in the United States and have been persistently less likely to receive interventional care, even when such care has been proven superior to conservative management by randomized controlled trials. The presence of disparities in access to radiation therapy (RT) for African American cancer patients has rarely been examined in an expansive fashion. An extensive literature search was performed using the PubMed database to examine studies investigating disparities in RT access for African Americans. A total of 55 studies were found, spanning 11 organ systems. Disparities in access to RT for African Americans were most prominently study in cancers of the breast (23 studies), prostate (7 studies), gynecologic system (5 studies), and hematologic system (5 studies). Disparities in RT access for African Americans were prevalent regardless of organ system studied and often occurred independently of socioeconomic status. Fifty of 55 studies (91%) involved analysis of a population-based database such as Surveillance, Epidemiology and End Result (SEER; 26 studies), SEER-Medicare (5 studies), National Cancer Database (3 studies), or a state tumor registry (13 studies). African Americans in the United States have diminished access to RT compared with Caucasian patients, independent of but often in concert with low socioeconomic status. These findings underscore the importance of finding systemic and systematic solutions to address these inequalities to reduce the barriers that patient race provides in receipt of optimal cancer care.
Efficient Access Control in Multimedia Social Networks
NASA Astrophysics Data System (ADS)
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
Integrated command, control, communications and computation system functional architecture
NASA Technical Reports Server (NTRS)
Cooley, C. G.; Gilbert, L. E.
1981-01-01
The functional architecture for an integrated command, control, communications, and computation system applicable to the command and control portion of the NASA End-to-End Data. System is described including the downlink data processing and analysis functions required to support the uplink processes. The functional architecture is composed of four elements: (1) the functional hierarchy which provides the decomposition and allocation of the command and control functions to the system elements; (2) the key system features which summarize the major system capabilities; (3) the operational activity threads which illustrate the interrelationahip between the system elements; and (4) the interfaces which illustrate those elements that originate or generate data and those elements that use the data. The interfaces also provide a description of the data and the data utilization and access techniques.
Group Membership Based Authorization to CADC Resources
NASA Astrophysics Data System (ADS)
Damian, A.; Dowler, P.; Gaudet, S.; Hill, N.
2012-09-01
The Group Membership Service (GMS), implemented at the Canadian Astronomy Data Centre (CADC), is a prototype of what could eventually be an IVOA standard for a distributed and interoperable group membership protocol. Group membership is the core authorization concept that enables teamwork and collaboration amongst astronomers accessing distributed resources and services. The service integrates and complements other access control related IVOA standards such as single-sign-on (SSO) using X.509 proxy certificates and the Credential Delegation Protocol (CDP). The GMS has been used at CADC for several years now, initially as a subsystem and then as a stand-alone Web service. It is part of the authorization mechanism for controlling the access to restricted Web resources as well as the VOSpace service hosted by the CADC. We present the role that GMS plays within the access control system at the CADC, including the functionality of the service and how the different CADC services make use of it to assert user authorization to resources. We also describe the main advantages and challenges of using the service as well as future work to increase its robustness and functionality.
The automatic control system and stand-by facilities of the TDMA-40 equipment
NASA Astrophysics Data System (ADS)
Gudenko, D. V.; Pankov, G. Kh.; Pauk, A. G.; Tsirlin, V. M.
1980-10-01
When a controlling station in a satellite communications system is out of order, a complex algorithm must be carried out for automatic operation of the stand-by equipment. A processor has been developed to perform this algorithm, as well as operations involving the stand-by facilities of the receiving-transmitting equipment of the station. The design principles and solutions to problems in developing the equipment for the monitoring and controlling systems are described. These systems are based on multistation access using time division multiplexing. Algorithms are presented for the operation of the synchronizing processor and the control processor of the equipment. The automatic control system and stand-by facilities make it possible to reduce the service personnel and to design an unattended station.
NASA Astrophysics Data System (ADS)
Pechousek, J.; Prochazka, R.; Mashlan, M.; Jancik, D.; Frydrych, J.
2009-01-01
The digital proportional-integral-derivative (PID) velocity controller used in the Mössbauer spectrometer implemented in field programmable gate array (FPGA) is based on the National Instruments CompactRIO embedded system and LabVIEW graphical programming tools. The system works as a remote system accessible via the Ethernet. The digital controller operates in real-time conditions, and the maximum sampling frequency is approximately 227 kS s-1. The system was tested with standard sample measurements of α-Fe and α-57Fe2O3 on two different electromechanical velocity transducers. The nonlinearities of the velocity scales in the relative form are better than 0.2%. The replacement of the standard analog PID controller by the new system brings the possibility of optimizing the control process more precisely.
28 CFR 16.98 - Exemption of the Drug Enforcement Administration (DEA)-limited access.
Code of Federal Regulations, 2010 CFR
2010-07-01
... enable him to avoid compliance with the Drug Abuse Prevention and Control Act of 1970 (Pub. L. 91-513...) because many of the records in this system are derived from other domestic record systems and therefore it...
77 FR 28407 - Special Nuclear Material Control and Accounting Systems for Nuclear Power Plants
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-14
... and Management System (ADAMS): You may access publicly-available documents online in the NRC Library... revised ANSI N15.8 in February 2009. ANSI N15.8-2009 provides guidance on the fundamentals of an SNM...
The New Generation of Information Systems.
ERIC Educational Resources Information Center
Grunwald, Peter
1990-01-01
A new generation of home-use electronic information systems could help transform American schooling. These services reach beyond computer enthusiasts, using various combinations of mass marketing techniques, attractive graphics, easy-to-use controls, localized information, low-cost access, and dedicated terminals. Representative samples include…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This manual is a guide to use the file protection mechanisms available on the Martin Marietta Energy Systems, Inc. Scientific and Technical Computing (STC) System VAXes. User identification codes (UICs) and general identifiers are discussed as a basis for understanding UIC-based and access control list (ACL) protection. 5 figs.
Review of modern biometric user authentication and their development prospects
NASA Astrophysics Data System (ADS)
Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.
2015-09-01
This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.
NASA Astrophysics Data System (ADS)
Alessio, F.; Barandela, M. C.; Callot, O.; Duval, P.-Y.; Franek, B.; Frank, M.; Galli, D.; Gaspar, C.; Herwijnen, E. v.; Jacobsson, R.; Jost, B.; Neufeld, N.; Sambade, A.; Schwemmer, R.; Somogyi, P.
2010-04-01
LHCb has designed and implemented an integrated Experiment Control System. The Control System uses the same concepts and the same tools to control and monitor all parts of the experiment: the Data Acquisition System, the Timing and the Trigger Systems, the High Level Trigger Farm, the Detector Control System, the Experiment's Infrastructure and the interaction with the CERN Technical Services and the Accelerator. LHCb's Run Control, the main interface used by the experiment's operator, provides access in a hierarchical, coherent and homogeneous manner to all areas of the experiment and to all its sub-detectors. It allows for automated (or manual) configuration and control, including error recovery, of the full experiment in its different running modes. Different instances of the same Run Control interface are used by the various sub-detectors for their stand-alone activities: test runs, calibration runs, etc. The architecture and the tools used to build the control system, the guidelines and components provided to the developers, as well as the first experience with the usage of the Run Control will be presented
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.
Eom, Jieun; Lee, Dong Hoon; Lee, Kwangsu
2016-12-01
In recent years, many countries have been trying to integrate electronic health data managed by each hospital to offer more efficient healthcare services. Since health data contain sensitive information of patients, there have been much research that present privacy preserving mechanisms. However, existing studies either require a patient to perform various steps to secure the data or restrict the patient to exerting control over the data. In this paper, we propose patient-controlled attribute-based encryption, which enables a patient (a data owner) to control access to the health data and reduces the operational burden for the patient, simultaneously. With our method, the patient has powerful control capability of his/her own health data in that he/she has the final say on the access with time limitation. In addition, our scheme provides emergency medical services which allow the emergency staffs to access the health data without the patient's permission only in the case of emergencies. We prove that our scheme is secure under cryptographic assumptions and analyze its efficiency from the patient's perspective.
Crew Access Arm Installation onto Mobile Launcher
2018-02-26
With a control panel visible in the foreground, a technician begins installation of the Orion crew access arm (CAA) to the mobile launcher (ML) tower at NASA's Kennedy Space Center in Florida. NASA's Exploration Ground Systems organization has been overseeing installation of umbilicals and other launch accessories on the 380-foot-tall ML in preparation for stacking the first launch of the Space launch System, or SLS, rocket with an Orion spacecraft. The CAA is designed to rotate from its retracted position and line up with Orion's crew hatch providing entry for astronauts and technicians.
Remacle, Marc; Prasad, Vyas M N
2018-03-01
This purpose of this case series is to present the first four cases utilizing micro-phonosurgical instrumentation designed specifically for use with a semi-flexible 'robotic' system-the Medrobotics Flex system and to evaluate the accessibility and feasibility of this platform in the context of transoral robotic surgery (TORS) for laryngeal surgery. Four patients (3 female, 1 male; age range 49-79 years) were operated by the senior author at CHL-a tertiary hospital centre between 2016 and 2017. The 'robot' was deployed in all cases to assess its accessibility and ability to perform surgery in the larynx. All four patients were successfully treated using the system along with newly developed instrumentation specifically focused on phonosurgery. This series has demonstrated accessibility and ability for laryngeal surgery using a novel semi-rigid operator-controlled 'robotic' system. We encountered no device failures and were able to perform all the selected cases uneventfully.
NASA Technical Reports Server (NTRS)
Ingels, Frank; Owens, John; Daniel, Steven
1989-01-01
The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.
Hooper, Bethany; Verdonck, Michele; Amsters, Delena; Myburg, Michelle; Allan, Emily
2017-09-06
Environmental control systems (ECS) are devices that enable people with severe physical limitations to independently control household appliances. Recent advancements in the area of environmental control technology have led to the development of ECS that can be controlled through mainstream smart-devices. There is limited research on ECS within Australia and no known research addressing smart-device ECS. The current study sought to explore users' experiences with smart-device ECS within Australia. The study followed a single embedded case study method. Participants (n = 5) were existing ECS users with a cervical spinal cord injury. Data were collected through semi-structured interviews with participants, reflexive journals and field notes. An inductive approach was used to analyze the data thematically. The experience of using a smart-device ECS presented both opportunities and costs to users. The opportunities included: independent control, choice, peace of mind, connection, effective resource use, and control over smart-phone functions and applications. The associated costs included: financial, time, frustration, and technical limitations. While findings are similar to previous research into traditional ECS this study indicates that smart-device ECS also offered a new opportunity for users to access mainstream smart-device functions and applications. Future research should investigate methods and resources that practitioners could utilize to better support new users of smart-device ECS. Implications for Rehabilitation As with traditional environmental control systems, users of smart environmental control systems report increased independence, choice and control. Smart-device environmental control systems provide users with access to mainstream smart-device functions and applications, which facilitate connection to family and the outside world. The costs to the user of smart-device environmental control systems include monetary and time investment, dealing with technical limitations and resulting frustration. Prescribers and installers must consider ways to mitigate these costs experienced by users.
MED31/437: A Web-based Diabetes Management System: DiabNet
Zhao, N; Roudsari, A; Carson, E
1999-01-01
Introduction A web-based system (DiabNet) was developed to provide instant access to the Electronic Diabetes Records (EDR) for end-users, and real-time information for healthcare professionals to facilitate their decision-making. It integrates portable glucometer, handheld computer, mobile phone and Internet access as a combined telecommunication and mobile computing solution for diabetes management. Methods: Active Server Pages (ASP) embedded with advanced ActiveX controls and VBScript were developed to allow remote data upload, retrieval and interpretation. Some advisory and Internet-based learning features, together with a video teleconferencing component make DiabNet web site an informative platform for Web-consultation. Results The evaluation of the system is being implemented among several UK Internet diabetes discussion groups and the Diabetes Day Centre at the Guy's & St. Thomas' Hospital. Many positive feedback are received from the web site demonstrating DiabNet is an advanced web-based diabetes management system which can help patients to keep closer control of self-monitoring blood glucose remotely, and is an integrated diabetes information resource that offers telemedicine knowledge in diabetes management. Discussion In summary, DiabNet introduces an innovative online diabetes management concept, such as online appointment and consultation, to enable users to access diabetes management information without time and location limitation and security concerns.
Pegasus power system facility upgrades
NASA Astrophysics Data System (ADS)
Lewicki, B. T.; Kujak-Ford, B. A.; Winz, G. R.
2008-11-01
Two key Pegasus systems have been recently upgraded: the Ohmic-transformer IGCT bridge control system, and the plasma-gun injector power system. The Ohmic control system contains two new microprocessor controlled components to provide an interface between the PWM controller and the IGCT bridges. An interface board conditions the command signals from the PWM controller. A splitter/combiner board routes the conditioned PWM commands to an array of IGCT bridges and interprets IGCT bridge status. This system allows for any PWM controller to safely control IGCT bridges. Future developments will include a transition to a polyphasic bridge control. This will allow for 3 to 4 times the present pulse length and provide a much higher switching frequency. The plasma gun injector system now includes active current feedback control on gun bias current via PWM buck type power supplies. Near term goals include a doubling or tripling of the applied bias voltage. Future arc bias system power supplies may include a simpler boost type system which will allow access to even higher voltages using existing low voltage energy storage systems.
49 CFR 1007.11 - Public notice of records systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... BOARD, DEPARTMENT OF TRANSPORTATION GENERAL RULES AND REGULATIONS RECORDS CONTAINING INFORMATION ABOUT... use; (5) The policies and practices of the Board regarding storage, retrieval, access controls...
49 CFR 1007.11 - Public notice of records systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... BOARD, DEPARTMENT OF TRANSPORTATION GENERAL RULES AND REGULATIONS RECORDS CONTAINING INFORMATION ABOUT... use; (5) The policies and practices of the Board regarding storage, retrieval, access controls...
49 CFR 1007.11 - Public notice of records systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... BOARD, DEPARTMENT OF TRANSPORTATION GENERAL RULES AND REGULATIONS RECORDS CONTAINING INFORMATION ABOUT... use; (5) The policies and practices of the Board regarding storage, retrieval, access controls...
49 CFR 1007.11 - Public notice of records systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... BOARD, DEPARTMENT OF TRANSPORTATION GENERAL RULES AND REGULATIONS RECORDS CONTAINING INFORMATION ABOUT... use; (5) The policies and practices of the Board regarding storage, retrieval, access controls...
49 CFR 1007.11 - Public notice of records systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... BOARD, DEPARTMENT OF TRANSPORTATION GENERAL RULES AND REGULATIONS RECORDS CONTAINING INFORMATION ABOUT... use; (5) The policies and practices of the Board regarding storage, retrieval, access controls...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2012 CFR
2012-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2014 CFR
2014-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2013 CFR
2013-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
NASA Astrophysics Data System (ADS)
Kershaw, P.
2016-12-01
CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective integration with services and resources which they must protect. Effective policy and governance structures are needed for ongoing operations Federated identity infrastructures often exist only at the national level making it difficult for international research collaborations to exploit them.